Bill Doerrfeld explains reveals why old-fashioned compliance practices can’t guarantee successful outcomes; real-time data and automation can help.
Search Results: data security (2038)
As a data-driven CIO, you can deliver value to your company in several critical areas that drive business impact; manufacturing CIO Kenny Mullican explains how.
Multi-cloud provides flexibility, scalability, and cost efficiency, but securing this architecture requires a comprehensive approach. Frank Domizio explains.
A data governance framework is critical for an organization’s cybersecurity strategy. Frank Domizio explains why.
Learn all the latest in retail innovation from our expert team of practitioner-analysts including how to enhance your strategies with hyperautomation.
Data security strategy must go beyond securing a company’s data and employees to protect every data channel and counterparty. Wayne Sadin presents guidelines for managing third-party data risks.
Security data often ends up distributed across many systems, which can be an issue when searching for threats. CISO Rob Wood advocates a more centralized approach.
Robert Wood discusses the risks of data silos and provides three actionable steps for how to break them down or control their impact.
Wayne Sadin shares why the advent of generative AI puts pressure on organizations to tighten up their data and security strategies to avoid bias and protect sensitive data.
Knowing the types of data that cybercriminals target for identity theft, financial fraud, or other malicious activities helps security teams implement effective protection.
Insights from data-driven teams include application telemetry and debugging logs, which can be invaluable from a security standpoint.
Wayne Sadin explains how data governance came to be so messy, and how strategic use of cloud and cybersecurity can impose order.
Kieron Allen and Aaron Back discuss how the companies on Acceleration Economy’s new Top 10 shortlists were chosen — and who chose them.
Frank Domizio covers four features of data backup and recovery software, and why they’re essential to protect against disasters, ransomware, and other incidents.
The Top 10 providers model – a Cloud Wars staple – now includes the top four tech pillars: cloud, cybersecurity, AI/hyperautomation, and data.
John Siefert, Aaron Back, and Tom Smith introduce our new Top 10 lists for data modernization, hyperautomation, and cybersecurity.
In ep. 29, Kieron Allen explains why a digital trust strategy is essential for brands and describes how a company can successfully implement one.
In ep 29 of the Growth Swarm podcast, the hosts discuss recent key trends and look ahead to how the “four pillars” will help businesses thrive in the future.
Lookout Principal Technical Marketing Manager Daniel Feller explains how behavior analytics is a foundational element of the Lookout Cloud Security Platform, which focuses on internet security, private apps, and SaaS apps.
After a breach, you’ll want to stop data loss as soon as possible, but it comes with risks and other drawbacks. Frank shares tips to arm you with the knowledge, options, and flexibility to advise your business on the right approach.