The release of the “DC-Check” framework by researchers at UCLA and the University of Cambridge has called attention to the need for standardized AI frameworks.
Search Results: data security (2052)
For more than 30 years, Trend Micro has been protecting diverse devices, applications, and data. It continues to do so while also delivering high-value cybersecurity research.
These six cybersecurity practices can help board members create robust protocols to protect their organizations against diverse threats and attacks.
Transitioning to multi-cloud will be a challenge if no one on your security team has experience with the technology, says Rob Wood.
The considerable benefits of multi-cloud architecture must be weighed against challenges like complexity and governance.
The right people, processes, and technology can help mitigate the security risks of a multi-cloud environment, says analyst Frank Domizio.
Wayne Sadin explains the origins and trajectory of the chief data officer (CDO) role, which didn’t even exist two decades ago.
Janet Schijns shares top insights from recent conversations with partners and retailers about how they can best work together.
Robert Wood takes a look at multi-cloud implementation and its implications for security.
Implementing a multi-cloud architecture across different geographies opens up unique security risks. Bill Doerrfeld recommends concrete measures to protect your business.
Technology leaders may encounter resistance from their teams regarding multi-cloud transitions. Rob Wood advises how to handle it and move forward.
Developers need guidance from CISOs to protect corporate data stores, ensure compliance, and spot disgruntled employees, and more, analysts Chris Hughes and Paul Swider explain.
ERP is in the spotlight as companies look to get more out of their existing processes. Wayne Sadin gives insight into modern ERP’s capabilities.
Acceleration Economy analyst Tom Smith shares his top session picks for all three days of the upcoming Digital CIO Summit in this discussion with Aaron Back.
Organizations aiming to be “data intelligent” must have a foundation of data governance in place that spans all facets of the business. Why? Customer dazzle which leads to revenue growth.
Kieron Allen reviews a Databricks Lakehouse platform extension that lets developers build apps leveraging Databricks and Visual Studio functionality.
Nearly all cloud security incidents are due to customer misconfigurations. Chris Hughes explains how cybersecurity hygiene addresses the problem.
Chief Data Officers self-report massive sprawl in their data sources, highlighting the importance of centralization and governance.
Christian Anschuetz and Bob Evans look at the biggest cybersecurity risk for organizations—human error—and discuss how to increase awareness.
Kieron Allen highlights how CockroachDB Dedicated is PCI-DSS certified, making it easier for customers to protect payment card information.