Security and data breaches aren’t all bad news; they’re also opportunities to build on lessons learned and correct deficiencies, as Chris explains.
Search Results: data security (2134)
Latest updates to HYCU’s Protege platform add support for Azure Gov Cloud, disaster recovery to AWS, cross-cloud recovery.
In this Data Modernization Battleground moment, CMO Jacqueline Woods explains how companies can transition to the cloud with Teradata.
In this Data Modernization Battleground moment, Teradata CMO Jacqueline Woods discusses how younger companies utilize the cloud as a means of accessing data in a simplified format.
Okera authorizes secure data access for the world’s most demanding companies and regulatory agencies. We help data-driven enterprises of all sizes accelerate innovation, minimize data security risks, and demonstrate regulatory compliance. The Okera Dynamic Access Platform dynamically enforces universal data access control policies to protect confidential, personally identifiable, and regulated data from inappropriate access and misuse. We partner with AWS, Microsoft Azure, and Google, and are a trusted Snowflake Data Access Governance Accelerated partner.
From victim and media notification to legal liabilities and government considerations, the many issues that arise after a security breach are more easily addressed with the help of a lawyer. Frank explains why.
Paul Swider covers various ways that the healthcare industry is pursuing reforms using ESG (environmental, social, and governance) data and frameworks.
In this Data Modernization Battleground Moment, Wayne explains how the data landscape has dramatically shifted, specifically around volume, velocity, and variability.
In this Data Modernization Battleground Moment, Kenny says that as a CIO, he considers security, data quality, policies, and governance. Specifically, he focuses on who needs the collected data, which will help to define where it comes from, and where it should be placed.
The first article in a series on the top 10 things to do if you’ve been breached discusses RACI (responsible, accountable, consulted, informed), a framework for defining roles and responsibilities in projects or processes.
Analyst Chrus Hughes takes a look at EPSS, a new approach to evaluating vulnerability that takes into account not only criticality and scores, but also exploitability.
Wayne recaps Data Modernization Battleground sessions with Teradata and Okera, which discussed their data analytics for multi-cloud and data security solutions.
Cybersecurity has evolved beyond the “office of ‘no'” to a true business enabler that requires an on-going vigilant effort to keep a resilient security posture
Microservices enable organizations to handle the growing complexity of data storage, but, as Pablo explains, they need frameworks to function optimally.
Bill Doerrfeld speaks with oak9 Co-founder Aakash Shah about ways to reduce known and unknown vulnerabilities brought on by open-source software.
Since the public sector is known to be risk adverse, In the Cloud Wars Expo Moment, Nicholas Smith discusses the public sector’s tendency to be risk-averse, which is why Oracle bakes security into all of its cloud stacks.
In this Cloud Wars Expo Moment, Joe Wilson, CTO for Americas, Workday, explains the never-ending need for privacy and security in the hospitality industry, and why the company offers five core principles in its technologies.
Data is the lifeblood of every business today but requires strategy, security, and governance to drive insights and accelerate transformation.
Wayne explains how smart CIOs go about keeping their boards informed and enthusiastic about data modernization projects.
It’s common for the C-suite to look at cybersecurity efforts with fear, uncertainty, and doubt (FUD). Here’s why that needs to stop, and how to do it.


















