Bill reviews ThreatQuotient’s “2022 State of Cybersecurity Automation” report, which finds that the majority of organizations experience pain problems implementing these initiatives.
Search Results: data security (2026)
Tom Smith and Joanna Martinez discuss how AWS has the potential to create big supply chain benefits for small- and medium-size firms.
The public sector has a reputation for moving slowly and inefficiently, but when it comes to cybersecurity, it may be the place for private sector businesses to watch and learn.
Kieron explains the benefits of decentralized data storage, and why it’s increasingly poised as an alternative to cloud data storage.
Analyst Robert Wood explains a strategy for resolving data breaches that entails getting inside your adversary’s head.
In ep. 10, Kieron explains why cybersecurity professionals must prioritize training on cybersecurity issues and prevention.
Frank shares a few essential ways to get the right people, set the ground rules, and stay informed so you can successfully navigate your breach response.
In this special report, John Siefert, Chris Hughes, and Tom Smith discuss the role of cybersecurity in today’s market, and why now it’s about more than just mitigating threats, and not just for highly regulated industries such as the public sector and financial services.
After a breach, you’ll need help from an incident response team, either in-house or third party. Frank explains how and what to look for.
CISO Robert Wood details three techniques to analyze security breaches so that organizations can prevent them in the future.
By distributing AI computation to local sensors and devices where the data is actually generated, Edge AI powers real-time capabilities for everything from medical devices to self-driving cars to energy grid monitoring, as Toni explains.
Security and data breaches aren’t all bad news; they’re also opportunities to build on lessons learned and correct deficiencies, as Chris explains.
Latest updates to HYCU’s Protege platform add support for Azure Gov Cloud, disaster recovery to AWS, cross-cloud recovery.
In this Data Modernization Battleground moment, CMO Jacqueline Woods explains how companies can transition to the cloud with Teradata.
In this Data Modernization Battleground moment, Teradata CMO Jacqueline Woods discusses how younger companies utilize the cloud as a means of accessing data in a simplified format.
Okera authorizes secure data access for the world’s most demanding companies and regulatory agencies. We help data-driven enterprises of all sizes accelerate innovation, minimize data security risks, and demonstrate regulatory compliance. The Okera Dynamic Access Platform dynamically enforces universal data access control policies to protect confidential, personally identifiable, and regulated data from inappropriate access and misuse. We partner with AWS, Microsoft Azure, and Google, and are a trusted Snowflake Data Access Governance Accelerated partner.
From victim and media notification to legal liabilities and government considerations, the many issues that arise after a security breach are more easily addressed with the help of a lawyer. Frank explains why.
Paul Swider covers various ways that the healthcare industry is pursuing reforms using ESG (environmental, social, and governance) data and frameworks.
In this Data Modernization Battleground Moment, Wayne explains how the data landscape has dramatically shifted, specifically around volume, velocity, and variability.
In this Data Modernization Battleground Moment, Kenny says that as a CIO, he considers security, data quality, policies, and governance. Specifically, he focuses on who needs the collected data, which will help to define where it comes from, and where it should be placed.