EDC
  • Home
  • Services
  • Clients
  • Partners
  • Contract Vehicles
  • Media Room
  • About Us
  • Careers
  • Contact Us
  • Artificial intelligence cyberattacks are coming — but what does that mean?

    August 28, 2017 | News

    Adding AI to today's cybercrime and cybersecurity world will fuel what is already a rapidly escalating arms race between attackers and defenders.

  • Artificial intelligence cyberattacks are coming — but what does that mean?

    | News

    Adding AI to today's cybercrime and cybersecurity world will fuel what is already a rapidly escalating arms race between attackers and defenders.

  • Uncovering discrimination in machine-learning software

    August 25, 2017 | News

    Researchers have developed a way to test algorithms to determine if the decisions they make are biased.

  • Uncovering discrimination in machine-learning software

    | News

    Researchers have developed a way to test algorithms to determine if the decisions they make are biased.

  • Microsoft adds analytical services to Azure Government

    | News

    Azure Monitor tracks base-level infrastructure metrics and logs for most services in Microsoft Azure.

  • Microsoft adds analytical services to Azure Government

    | News

    Azure Monitor tracks base-level infrastructure metrics and logs for most services in Microsoft Azure.

  • US CERT details North Korean bot

    | News

    The alert from the U.S. Computer Emergency Readiness Team explains how network defenders can detect and mitigate the Hidden Cobra DDOS botnet.

  • US CERT details North Korean bot

    | News

    The alert from the U.S. Computer Emergency Readiness Team explains how network defenders can detect and mitigate the Hidden Cobra DDOS botnet.

  • Weave your cybersecurity tactics into a cohesive strategy

    | News

    By protecting the credentials used to spread an attack, IT managers can mitigate damage after an initial breach.

  • Weave your cybersecurity tactics into a cohesive strategy

    | News

    By protecting the credentials used to spread an attack, IT managers can mitigate damage after an initial breach.

Categories

  • News
  • Thought Leadership
  • Case Study
  • State & Local
  • Data & Analytics
  • Cybersecurity
  • Emerging Tech
  • Cloud & Infrastructure
  • Public Safety
  • Management
  • Infrastructure
  • Finance
  • Workforce
  • Digital Government

Archives

  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • Home
  • Careers
  • Contract Vehicles
  • Media Room
  • About Us
  • Careers
  • Contact Us

© 2026 EDC Consulting LLC. All Rights Reserved.