Maturity models serve as roadmaps to help organizations successfully navigate their zero-trust journey. Rob Wood breaks down the benefits of one model’s iterative approach.
Search Results: cloud infrastructure (1498)
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Every company today is — or is on its way to becoming via digital transformation — a technology company, but where does all the technology come from? Partners ecosystems.
Zero trust, a cybersecurity framework that reduces uncertainty in access decisions, has gained popularity in recent years. CISO Chris Hughes explains zero trust, and why it matters, in detail.
Oracle has laid out its new artificial intelligence (AI) strategy. Bob Evans shares details of this plan, including more intelligence and stronger business outcomes.
Enterprises that leverage technology are more likely to weather the storms of, and even thrive during, challenging economic times. Here’s how partners can help.
A late arrival to e-commerce, Hibbett Sports closed the gap with laser CX focus, a novel fulfillment approach, and aggressive use of AI to engage customers.
An in-depth look at automated vulnerability scanning within financial software, how it works, as well as top tools and best practices to get the job done.
Effective zero trust requires a comprehensive understanding of the organization’s security landscape, a risk-based approach, and a commitment to continuous improvement. Learn how to manage the journey.
Bill Doerrfeld describe en este artículo los beneficios de usar aplicaciones de bajo código para aumentar la gobernanza de un entorno multi-nube.
Low-code/no-code platforms are becoming increasingly popular due to a scarcity of technical expertise. The addition of AI components is making these tools smarter.
Process mining offers great opportunity to fine-tune business processes but also introduces potential risks, which can be mitigated with strong governance measures.
A distributed cloud database architecture enables Couchbase to power a range of customer use cases while delivering quantifiable business impact.
Bill Doerrfeld explains reveals why old-fashioned compliance practices can’t guarantee successful outcomes; real-time data and automation can help.
Amid today’s uncertainty, top execs need to leverage frameworks, communication, and their leadership skills, say John Siefert, Bob Evans, Tony Uphoff, and Scott Vaughan in this Growth Swarm podcast.
These six cybersecurity practices can help board members create robust protocols to protect their organizations against diverse threats and attacks.
AI and automation can protect against financial and reputational losses from data theft and ransomware in financial software, writes Bill Doerrfeld.
Chris Hughes reveals alarming findings in the 2023 Open Source security and risk analysis report by Synopsys.
Scott Vaughan shares insights from a recent discussion he hosted on leading in uncertain times and dumping the “more with less” mindset.
Annual mobile phishing report from security vendor Lookout has troubling findings about volume, complexity, and impact of phishing attacks. Kieron Allen reviews the findings, and how to respond.



















