Emma Crockett

Emma Crockett is a writer for Datamation and Enterprise Storage Forum based in Nashville, Tennessee. She writes research-based articles about data science and data storage. When she is not writing, she is searching for the best lattes in Nashville and playing with her dog, Dante.

Develop & Implement a Network Security Plan in 6 Easy Steps

A network security plan describes the rules for network access, outlines the network security environment, and explains network security policies throughout a company’s infrastructure. Network security plans help a company protect their network,...

External vs. Internal Vulnerability Scans: What’s the Difference?

An internal scan is conducted within a company’s network to ensure safety inside of the network, while an external scan is completed outside of the company’s network to ensure there are no...

What is Vulnerability Scanning & Why Should You Do It?

Vulnerability scanning is software that finds cybersecurity vulnerabilities in a company’s infrastructure, network, and software. Vulnerability scanning can also detect and patch these vulnerabilities, so cybercriminals cannot access a company’s network. For this...

How to Secure a Network: 9 Steps to Setup a Secure Network

Network security protects a company’s network, infrastructure, and data to prevent cyberattacks and data breaches. The best way to protect a company’s network is to use a variety of cybersecurity strategies and tools...

SIEM Q&A With Manikandan Thangaraj of ManageEngine

Security information and event management (SIEM) is a cybersecurity solution that helps companies detect network threats and ensure compliance. With cybersecurity threats on the rise, SIEM is a key tool for organizations...

Best Vulnerability Scanning Tools

Software developers look to vulnerability scanning to detect vulnerabilities, enhance trust with partners, and increase security efficiency. The ideal vulnerability scanning tool should offer a scalable amount to scan for growing and...

Guide to Penetration Testing vs. Vulnerability Scanning

Penetration tests allow a company to see its cybersecurity vulnerabilities from a cybercriminal’s perspective, while vulnerability scanning is software that finds and patches cybersecurity vulnerabilities. Both are important components of an overall...

How to Conduct a Network Security Risk Assessment

A network security risk assessment allows a company to view its infrastructure from a cybercriminal’s perspective and helps spot network security issues so they can be addressed.  When conducting a risk assessment, start...

Red Hat and Lockheed Martin Collaborating on Edge AI for Military Missions

DETROIT — Red Hat and Lockheed Martin are working to improve artificial intelligence (AI) at the edge for military applications. Lockheed Martin is adopting Red Hat Device Edge to help it support U.S....

Cisco and British Columbia Institute of Technology Partnering to Develop Cybersecurity Talent

VANCOUVER — Cisco and the British Columbia Institute of Technology (BCIT) are working together to help educate the “next generation” of cybersecurity professionals. Cisco and BCIT are partnering to expand BCIT’s Industrial Network...

Accenture and Google Cloud Expanding Partnership Around Data and AI

NEW YORK — Google Cloud and Accenture are expanding their partnership to increase developing data and artificial intelligence (AI) solutions for customers. Accenture and Google Cloud are collaborating to help customers build a...

Data Science Q&A With Alan Jacobson of Alteryx

Companies are using data science to study their data and make better business decisions through programming, modeling, data analytics, visualization, machine learning (ML), and artificial intelligence (AI). Based in Irvine, California, Alteryx is...

Latest Articles