Wayne recaps Data Modernization Battleground sessions with Teradata and Okera, which discussed their data analytics for multi-cloud and data security solutions.
Search Results: data security (2020)
Cybersecurity has evolved beyond the “office of ‘no'” to a true business enabler that requires an on-going vigilant effort to keep a resilient security posture
Microservices enable organizations to handle the growing complexity of data storage, but, as Pablo explains, they need frameworks to function optimally.
Bill Doerrfeld speaks with oak9 Co-founder Aakash Shah about ways to reduce known and unknown vulnerabilities brought on by open-source software.
Since the public sector is known to be risk adverse, In the Cloud Wars Expo Moment, Nicholas Smith discusses the public sector’s tendency to be risk-averse, which is why Oracle bakes security into all of its cloud stacks.
In this Cloud Wars Expo Moment, Joe Wilson, CTO for Americas, Workday, explains the never-ending need for privacy and security in the hospitality industry, and why the company offers five core principles in its technologies.
Data is the lifeblood of every business today but requires strategy, security, and governance to drive insights and accelerate transformation.
Wayne explains how smart CIOs go about keeping their boards informed and enthusiastic about data modernization projects.
It’s common for the C-suite to look at cybersecurity efforts with fear, uncertainty, and doubt (FUD). Here’s why that needs to stop, and how to do it.
In this CloudWorld News Desk interview, Oracle Senior VP of Cloud Infrastructure Mahesh Thiagarajan explains why some users are still reluctant to engage with multi-cloud platforms.
Cybersecurity analyst Robert Wood explains how secure defaults save time and energy for engineers and development teams.
Quantifying cyber risk helps board members and other business leaders see the importance of cybersecurity investment. As Chris Hughes explains, the FAIR model offers a framework to do this.
Any effective data governance should be developed with intention and supported by the organization, which starts at the top, writes Pablo Moreno.
Doing things the way they’ve always been done is never a good strategy where technology is concerned, and security is no exception, writes Robert Wood.
Investment from Okta gives HYCU entree to a big installed base, and links leading identity management and data protection products.
What’s in a vulnerability score? Chris Hughes explains what these are, where they come from, and how cybersecurity professionals should approach them.
Poor-quality data can derail a business. Janet Schijns explains how to choose partners who will wrangle and handle the right data properly and set your firm up to successfully navigate potentially rough economic times.
In Data Modernization Minute, Ep. 29, Wayne Sadin introduces himself as the new channel host and shares some topics he will be covering in the future.
Oracle’s Nicholas Smith discusses the impact of AI/ML to patch, optimize, and fine-tune autonomous databases for public sector customers.
It’s often said that security must be baked in rather than bolted on, and this is especially true when it comes to CISO involvement in an organization’s data governance plans.