Latest updates to HYCU’s Protege platform add support for Azure Gov Cloud, disaster recovery to AWS, cross-cloud recovery.
Search Results: cybersecurity (1521)
In this Data Modernization Battleground moment, CMO Jacqueline Woods explains how companies can transition to the cloud with Teradata.
In Ep. 26 of the Growth Swarm podcast, John, Bob, Scott, and Tony discuss reasons behind today’s economic uncertainty, and why the cloud offers extraordinary alternatives for businesses to create their own futures.
Robert explains why communication is key to getting security, legal, sales, and engineering teams on board with a DevSecOps strategy shift.
Los ciberatacantes a menudo tienden a persistir en un entorno, moviéndose lateralmente entre sistemas, esto es clave para mitigar el riesgo.
The release of SAP Build — a solution the company says will “unleash” great new capabilities, value, and innovation for customers — is the latest example of its transformation into a cloud-first company after about 45 years of being focused on its massive installed base of on-premises customers.
In this Data Modernization Battleground moment, Teradata CMO Jacqueline Woods discusses how younger companies utilize the cloud as a means of accessing data in a simplified format.
In Ep. 3 of the Acceleration Economy Minute, Kieron references the work of fellow AE cybersecurity analysts who discuss how and why organizations must expand on their approach to defense.
Threat hunting is often thought of as something one does to uncover as yet undetected threats in an organization. But there’s also attack-specific threat hunting, which, analyst Chris Hughes explains, is essential when responding to security breaches.
El low-code es una buena manera de hacer que los no tecnólogos ingresen al espacio tecnológico al democratizar el desarrollo de software.
From victim and media notification to legal liabilities and government considerations, the many issues that arise after a security breach are more easily addressed with the help of a lawyer. Frank explains why.
Analyst Bill Doerrfeld discusses the benefits and drawbacks of low-code/no-code with CEO Prashanth Chandrasekar, giving examples of how the approach both widens businesses’ horizons and limits them.
Paul Swider covers various ways that the healthcare industry is pursuing reforms using ESG (environmental, social, and governance) data and frameworks.
Celonis detailed another partnership with ERGO Group in a co-creation context — this one targeting functionality intended for the insurance industry — on the final day of its Celosphere 2022 customer conference in Munich.
In this Data Modernization Battleground Moment, Wayne explains how the data landscape has dramatically shifted, specifically around volume, velocity, and variability.
Frente a un incidente de cyber-seguridad hay muchos ángulos que cubrir. El apoyo legal es vital para una óptima gestión.
Kieron reports from Celosphere 2022, where Celonis showcased several new apps that make process mining more accessible.
Celonis’ new Process Sphere provides cross-process visibility; Business Miner gives more users access to the company’s core technology.
Analyst Chrus Hughes takes a look at EPSS, a new approach to evaluating vulnerability that takes into account not only criticality and scores, but also exploitability.
The Metaverse has spawned new commerce models, including direct-to-avatar (DTA), which some believe is the next iteration of direct-to-consumer and could one day dominate retail.















