John Siefert, Aaron Back, and Tom Smith introduce our new Top 10 lists for data modernization, hyperautomation, and cybersecurity.
Search Results: private sector (95)
The U.S. Army, which utilizes many subcontractors, realized it was running into too much unused funding. Toni explains how turning to AI helped it find the perfect solution for its budgeting issue.
Chris provides takeaways from the Cyber Safety Review Board’s recent Log4j incident report.
Analyst Kieron Allen offers examples of how digital twins might work in the development of transportation, urban planning, and more.
For many, blockchain is inseparable from Bitcoin — but hold onto that viewpoint and you’ll risk falling behind. Blockchain technology goes way beyond cryptocurrency, into areas such as identity security, supply chain, IoT, and governance.
The Software Bill of Materials (SBOM) increases transparency and is expected to become an integral part of the software industry. Bill Doerrfeld explains why, and what organizations must do about it.
In Growth Swarm, Ep. 12, the panel builds on last week’s B2B branding discussion by examining the importance of brand in the B2C category.
The realities of the 21st-century are creating a continuum for creating and enhancing the human experience.
In this Back @ IT episode, Aaron hosts a conversation with Robert Wood to discuss how a cybersecurity framework can add value.
With the risk of Ransomware increasing, organizations need to apply this guidance to prepare and prevent attacks.
In this Cybersecurity Minute, Chris covers a recent statement from the White House about the urgency for organizations to increase fundamental cybersecurity.
In this Enterprise AI Minute, Aaron discusses how AI can be used as a proactive tool to combat against cyber warfare.
Cybersecurity impacts all areas of our daily life more than we realize. It’s a call to make security rigor a priority, not a platitude.
New video from Bob Evans with insights and perspectives around the cloud. Today’s topic: Amazon Web Services and Brazil unleash the Cloud.
Review the top cybersecurity frameworks from NIST, CIS, CSA, ISO, and AWS. By following these benchmarks, you can improve your organization’s security.
Follow these benchmarks to improve your cybersecurity.
While there are many aspects of implementing effective application security, a key element is implementing secure software development practices for internal application development activities.
Security is critical to business success, as an enabler and a competitive differentiator. Here are 5 cybersecurity priorities to address in 2022.
Adam Piercy is a Senior Solutions Architect at Hitachi Solutions. He has led the development and implementation of Microsoft Dynamics…
Recent moves by the White House suggest that compulsory cybersecurity could become a reality in some sectors.
Dealing with various concerns related to the pandemic and the importance of maintaining food supply chains has caused many companies in these industries to focus on investing in automation technology and artificial intelligence. Many of these businesses were already investing in this technology, but COVID-19 has accelerated the process.