Kieron Allen profiles three startups — Persefoni, Climatiq, and EcoVadis — that help companies achieve decarbonization goals via streamlined sustainability data analysis.
Search Results: data security (2050)
Fortinet has staked out sustainability leadership through board-level focus, carbon neutrality pledge, and zeroing in on the cybersecurity skills gap.
HYCU founder and CEO Simon Taylor shares his perspective on hybrid/multi-cloud, ransomware, and keeping customers’ data safe.
Pushing its sweeping co-creation model with global banks to new levels, IBM will help these financial institutions become more secure, compliant, and resilient but also boost performance.
Kicking off a roundtable series on the top cybersecurity companies, John Siefert is joined by Aaron Back, Chris Hughes, and Lookout Chief Strategy Officer Aaron Cockerill to discuss the company’s unique origins and solutions to cybersecurity.
En este artículo Wayne Sadin resume la por qué Teradata y Okera Data Tools destacan en el mercado de análisis de datos con su estrategia.
In this Cloud Wars Horizon Demo Day moment, John Siefert is joined by Aaron Back and Chris Hughes to discuss how businesses must prepare for inevitable data breaches.
The adoption of cloud services is steadily rising across the healthcare industry as organizations push for better access to medical data.
Bill reviews ThreatQuotient’s “2022 State of Cybersecurity Automation” report, which finds that the majority of organizations experience pain problems implementing these initiatives.
Tom Smith and Joanna Martinez discuss how AWS has the potential to create big supply chain benefits for small- and medium-size firms.
The public sector has a reputation for moving slowly and inefficiently, but when it comes to cybersecurity, it may be the place for private sector businesses to watch and learn.
Kieron explains the benefits of decentralized data storage, and why it’s increasingly poised as an alternative to cloud data storage.
Analyst Robert Wood explains a strategy for resolving data breaches that entails getting inside your adversary’s head.
In ep. 10, Kieron explains why cybersecurity professionals must prioritize training on cybersecurity issues and prevention.
Frank shares a few essential ways to get the right people, set the ground rules, and stay informed so you can successfully navigate your breach response.
In this special report, John Siefert, Chris Hughes, and Tom Smith discuss the role of cybersecurity in today’s market, and why now it’s about more than just mitigating threats, and not just for highly regulated industries such as the public sector and financial services.
After a breach, you’ll need help from an incident response team, either in-house or third party. Frank explains how and what to look for.
CISO Robert Wood details three techniques to analyze security breaches so that organizations can prevent them in the future.
By distributing AI computation to local sensors and devices where the data is actually generated, Edge AI powers real-time capabilities for everything from medical devices to self-driving cars to energy grid monitoring, as Toni explains.
Security and data breaches aren’t all bad news; they’re also opportunities to build on lessons learned and correct deficiencies, as Chris explains.