What Is ETLT? Merging the Best of ETL and ELT Into a Single ETLT Data Integration Strategy

In this article, learn more about ETLT and see an overview of ETL and ELT, advantages and use cases, and more. Merging the Best of ETL and ELT Into a Single ETLT Data Integration Strategy

How Has COVID-19 Impacted Data Science?

In this article, we'll discuss how the COVID-19 pandemic is affecting the data industry and how enterprises can prepare for the data challenges to come in 2021 and beyond.

The Top 7 Big Data Security Changes for 2021

IT security managers say remote work will be the No.1 cybersecurity problem in 2021. But what big data challenges will businesses face in the next year?

When ETL Is Essential in Your Data Stack

This article covers data integration issues that ETL solves, the benefits of adding ETL, how this process works, and the types of ETL solutions available.

Top 9 Most Damaging Data Breaches at Major Companies

In this article, you'll learn the top 9 most damaging data breaches to date, spanning from some of the largest companies in the world.

Software AG Data Released After Clop Ransomware Strike

The Clop group attacked Software AG, a German conglomerate with operations in more than 70 countries, threatening to dump stolen data if the whopping $23 million ransom isn’t paid.

Barnes & Noble Hack: A Reading List for Phishers and Crooks

Customers' lists of book purchases along with email addresses and more could have been exposed during a (ransomware?) attack — and that's a problem. Barnes & Noble is warning that it has been hacked, potentially exposing personal data for shoppers – and offering phishers an early holiday gift.

Dickey's BBQ Breach: Meaty 3M Payment Card Upload Drops on Joker's Stash

After cybercriminals smoked out 3 million compromised payment cards on the Joker’s Stash marketplace, researchers linked the data to a breach at the popular barbecue franchise.

Google Cloud Buckets Exposed in Rampant Misconfiguration

A too-large percentage of cloud databases containing highly sensitive information are publicly available, an analysis shows.

Augmenting AWS Security Controls

Appropriate use of native security controls in AWS and other CSPs is fundamental to managing cloud risk and avoiding costly breaches.

Chris Vickery: AI Will Drive Tomorrow’s Data Breaches

Chris Vickery talks about his craziest data breach discoveries and why "vishing" is the next top threat no one's ready for.

Fake Minneapolis Police Breach, Zoom End-To-End Encryption Debate

Threatpost editors discuss debunked reports of a Minneapolis police department breach and Zoom announcing only paying users would get end-to-end encryption.