The Biden-Harris administration unveiled an updated National Cybersecurity Strategy to standardize cybersecurity practices across agencies and encourage market accountability.
Search Results: data management (1765)
With the recent announcement of ChatGPT plugins, many companies are developing ways to optimize Generative AI capabilities.
Kenny Mullican escribe las múltiples ventajas y beneficios de una estrategia multi-nube sobre la operación de la cadena de suministro.
Google Cloud has introduced a simple, powerful online tool to help businesses optimize their data-sovereignty initiatives, namely titled Sovereignty Explorer.
Wayne Sadin outlines why an overreliance on Microsoft Excel models is increasingly a problem for companies of all sizes and industries.
Though it makes for complex sourcing, healthcare cloud migration can be successfully approached with some classic procurement techniques, writes Joanna Martinez.
There is a perception that ERP automation is focused primarily on financial systems, but as Kenny Mullican writes, it can deliver value in many other functions, too.
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
API-driven partnership strategies fuel revenue, co-creation initiatives, and great customer experience. Get tips on building and executing a strategy for your organization.
With Carahsoft partnership and GSA schedule inclusion, Celonis makes process mining benefits readily available to government agencies of all sizes and types.
Zero trust, a cybersecurity framework that reduces uncertainty in access decisions, has gained popularity in recent years. CISO Chris Hughes explains zero trust, and why it matters, in detail.
When you can’t pay less for the goods and services you buy, you may find an opportunity to reduce costs in how you are buying them, writes Joanna Martinez.
An in-depth look at automated vulnerability scanning within financial software, how it works, as well as top tools and best practices to get the job done.
Chief procurement officers and CFOs don’t always see financial results the same way, but applying automation to data gathering and analysis can help them get on the same page.
Rob Wood explains why security teams need to be trained to assess risk and maintain compliance across different clouds.
As the pace of business accelerates, automating ERP processes helps companies remain competitive and achieve long-term success, says Kenny Mullican.
Effective zero trust requires a comprehensive understanding of the organization’s security landscape, a risk-based approach, and a commitment to continuous improvement. Learn how to manage the journey.
Endor Labs released a report that identifies the top 10 open source software risks, including known vulnerabilities, compromised legitimate packages, untracked dependencies, and more. Chis Hughes explains.
Con una media de más de 1,000 fuentes internas de datos en las empresas, se requiere de una gobernanza y administración de datos centralizada.
Avoiding single points of failure is critical for companies, no matter if they are hardware, software or, in the case of “indispensable programmers,” people.