Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Search Results: data security (2026)
Wayne Sadin explores how public company and executive reports allow CIOs to delve into data lineage, opening the door for data modernization initiatives such as automation.
Wayne Sadin shares takeaways from a recent panel discussion he attended, which covered topics from data management to AI and machine learning bias.
Zero trust, a cybersecurity framework that reduces uncertainty in access decisions, has gained popularity in recent years. CISO Chris Hughes explains zero trust, and why it matters, in detail.
To implement zero trust, business leaders should know a cultural shift is required along with investment in the right tools and resources.
Informatica’s latest options give data practitioners and business users free tools and greater flexibility to ramp up their productivity with data.
Effective zero trust requires a comprehensive understanding of the organization’s security landscape, a risk-based approach, and a commitment to continuous improvement. Learn how to manage the journey.
To get the most out of training for multi-cloud environments, it’s important to vary the kinds of training offered to suit different learning styles, according to analyst Rob Wood.
Hearing fellow analysts collectively discuss key technology pillars will provide unique insights, says Kieron Allen in this CIO Summit event preview.
How organizations can balance their expanding use of AI against the need to manage the data governance process — while increasing the value and velocity of data.
Machine learning comes with many benefits for cybersecurity, but cutting-edge bad actors are looking to exploit ML for their own gain. Chris Hughest explains how to fight “adversarial ML.”
The release of the “DC-Check” framework by researchers at UCLA and the University of Cambridge has called attention to the need for standardized AI frameworks.
For more than 30 years, Trend Micro has been protecting diverse devices, applications, and data. It continues to do so while also delivering high-value cybersecurity research.
These six cybersecurity practices can help board members create robust protocols to protect their organizations against diverse threats and attacks.
Transitioning to multi-cloud will be a challenge if no one on your security team has experience with the technology, says Rob Wood.
The considerable benefits of multi-cloud architecture must be weighed against challenges like complexity and governance.
The right people, processes, and technology can help mitigate the security risks of a multi-cloud environment, says analyst Frank Domizio.
Wayne Sadin explains the origins and trajectory of the chief data officer (CDO) role, which didn’t even exist two decades ago.
Janet Schijns shares top insights from recent conversations with partners and retailers about how they can best work together.
Robert Wood takes a look at multi-cloud implementation and its implications for security.