Analyst Chrus Hughes takes a look at EPSS, a new approach to evaluating vulnerability that takes into account not only criticality and scores, but also exploitability.
Search Results: cybersecurity (1483)
The Metaverse has spawned new commerce models, including direct-to-avatar (DTA), which some believe is the next iteration of direct-to-consumer and could one day dominate retail.
Wayne recaps Data Modernization Battleground sessions with Teradata and Okera, which discussed their data analytics for multi-cloud and data security solutions.
From hackathons and gamification to champion programs and callouts, there are many ways for security teams to build essential relationships with development teams.
Este artículo repasa a EPSS, un nuevo enfoque para evaluar la vulnerabilidad de un incidente de cyberseguridad, teniendo en cuenta no sólo la criticidad y las puntuaciones, sino también la explotabilidad.
Janet looks at this year’s Verizon Data Breach Investigations Report (DBIR) and singles out a few facts that can help organizations evaluate risk in partnership strategy.
In Data Modernization Minute, Ep. 32, Wayne Sadin explains Microsoft’s Power BI Suite within the context of Walmart, the world’s largest retailer. The company’s financial team has recently announced their adoption of this tool.
Chris provides takeaways from the Cyber Safety Review Board’s recent Log4j incident report.
Microservices enable organizations to handle the growing complexity of data storage, but, as Pablo explains, they need frameworks to function optimally.
Since the public sector is known to be risk adverse, In the Cloud Wars Expo Moment, Nicholas Smith discusses the public sector’s tendency to be risk-averse, which is why Oracle bakes security into all of its cloud stacks.
Despite talk of layoffs, demand for tech talent remains high, and competition to hire the right people remains fierce. Janet offers tips on recruiting in today’s climate.
In this Cloud Wars Expo Moment, Doc Vaidhyanathan explains why IBM’s financial services cloud’s focus on compliance is unique.
As Bill explains, continuous delivery/deployment scenarios require special and specific security — especially in industries that handle sensitive personal and financial data.
In this Cloud Wars Expo Moment, Joe Wilson, CTO for Americas, Workday, explains the never-ending need for privacy and security in the hospitality industry, and why the company offers five core principles in its technologies.
In Ep. 9 of the Cutting Edge podcast, Leonard Lee explains why customers have a growing concern about privacy at the edge, and offers some intriguing solutions to the issue that edge computing can provide.
Penetration testing is an inherently manual process and runs in contrast to the DevSecOps movement, so where does it fit in? Robert Wood delves into it.
In this Oracle CloudWorld analyst take, Wayne shares what he learned from OCI lead Clay Magouryrk about the division’s new products and partnerships.
Startup Aforza brings industry cloud functionality to consumer goods and, in so doing, is driving new levels of efficiency in a $2T market.
Cybersecurity analyst Robert Wood explains how secure defaults save time and energy for engineers and development teams.
The increasingly in-demand IBM Consulting has found that its clients and prospects are finding significant value in IBM’s ability to offer not only a full portfolio of modern technology — particularly in the cloud — but also deep industry expertise built over the decades.