In this Cloud Data Strategy moment, Chris Hughes defines the areas of focus security leaders must consider when safeguarding data in the cloud.
As sustainability becomes a key focus for businesses and critical infrastructure, organizations must also prioritize cybersecurity and secure data standards to safeguard emerging technologies like IoT and OT devices from evolving cyber threats.
Wayne Sadin outlines why an overreliance on Microsoft Excel models is increasingly a problem for companies of all sizes and industries.
New data from cybersecurity provider Chainguard captures what’s working, and the relative difficultly levels, of various software supply chain practices.
New data from NetApp shows that even with the benefits of multi-cloud, this increasingly popular architecture introduces various forms of complexity for tech leaders.
Multi-cloud incident response is more complex than traditional incident response. Frank Domizio explains how and why organizations need to adapt.
Though it makes for complex sourcing, healthcare cloud migration can be successfully approached with some classic procurement techniques, writes Joanna Martinez.
Maturity models serve as roadmaps to help organizations successfully navigate their zero-trust journey. Rob Wood breaks down the benefits of one model’s iterative approach.
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Every company today is — or is on its way to becoming via digital transformation — a technology company, but where does all the technology come from? Partners ecosystems.
Frank Domizio shares his thoughts on cybersecurity’s place in the C-suite today, as well as the value of customer stories on software and other technology solutions.
Contextualize what you need from data teams, so that they understand the why behind your ask, Rob Wood advises, as a way to build stronger relationships.
Multi-cloud computing allows organizations to tailor their cloud strategies, reduce costs, and avoid vendor lock-in, but it also brings unique cybersecurity challenges.
Our Securing Multi-Cloud Ecosystems guidebook is a comprehensive resource demonstrating the why & how of secure multi-cloud computing.
API-driven partnership strategies fuel revenue, co-creation initiatives, and great customer experience. Get tips on building and executing a strategy for your organization.
Wayne Sadin shares takeaways from a recent panel discussion he attended, which covered topics from data management to AI and machine learning bias.
Zero trust, a cybersecurity framework that reduces uncertainty in access decisions, has gained popularity in recent years. CISO Chris Hughes explains zero trust, and why it matters, in detail.
Rob Wood looks at why pinpointing the right data, and reaching consensus between data and security teams on that data, is critical for reducing risk.
To implement zero trust, business leaders should know a cultural shift is required along with investment in the right tools and resources.
In the latest Growth Swarm podcast, John Siefert, Bob Evans, Tony Uphoff, and Scott Vaughan discuss generative AI’s potential effect on today’s advertising-driven, attention-based economy.
Strong relationships between the CISO, the chief data officer, and the others involved with data will strengthen an organization’s data strategy, says Rob Wood.