Knowing the types of data that cybercriminals target for identity theft, financial fraud, or other malicious activities helps security teams implement effective protection.
Search Results: cloud database (1108)
Bob Evans shares how SAP is taking on the ultimate transformation, after Hasso Plattner, Founder and Chairman, steps down from the company.
A power shift is taking place at SAP as founder and chairman Hasso Plattner steps down, allowing CEO Christian Klein to fully takeover as the single driving force behind SAP.
GitGuardian, a Cybersecurity Top 10 Shortlist company, offers a secrets detection platform that ensures source-code security for the DevSecOps era.
Prof. Wil van der Aalst explores current and potential use case for the latest form of the process mining technology he invented. He sees a bright future in supply chains and manufacturing.
The “object centric” upgrade to process mining that Celonis launched last year streamlines analysis of both internal and supply chain apps.
AI collects a lot of data, but it’s hard for many people to utilize, which is where augmented reality as a real-time, on-prem interface could supercharge its utility.
Analyst and CISO Frank Domizio lays out how the accelerating use of artificial intelligence (AI) in cybersecurity can ultimately improve a company’s security posture.
ChatGPT’s ability to produce code has been overlooked in the media frenzy, but generative AI can make developers more productive, and focused, according to Bill Doerrfeld.
Businesses are deploying the Redis Enterprise real-time data platform in two key ways to accelerate data use, lower costs, and simplify the IT environment. Sponsored by Redis.
The future of software development is evolving to become more low-code, says Bill Doerrfeld, who explains with practical use cases that illustrate the benefits.
Bill Doerrfeld explains how to effectively manage diverse, geographically specific data governance and compliance standards.
Contextual analysis makes Application Security (AppSec) more efficient by identifying the most exploitable vulnerabilities, CISO Chris Hughes says.
SaaS products need secure foundations so that CIOs and CISOs can design successful and productive applications that mitigate risk for the organization.
Cloud data backup leader HYCU is taking a development-centric approach to scaling backup services for the thousands of SaaS apps in use.
Improper data management and access practices are “the business world’s second-hand cigarette smoke,” writes Scott Vaughan, who offers tips to avoid this scenario.
In this Cybersecurity Minute, Robert Wood explains why codebases need proper security stages that address potential leaks.
Cloud native. AI-driven. Democratized access. Automation Anywhere meets the key automation requirements of business and tech leaders.
Wayne Sadin and Kieron Allen lay out the key factors that landed 10 companies on our Data Modernization shortlist.
The Top 10 providers model – a Cloud Wars staple – now includes the top four tech pillars: cloud, cybersecurity, AI/hyperautomation, and data.