Bob Evans details his one-on-one interview with IBM’s CEO Arvind Krishna, who offers insights into IBM’s focus on AI and hybrid cloud and his optimism towards the impact of enterprise technology.
Search Results: open-source software (189)
La automatización de la ciberseguridad parece fácil y adecuado, aunque lograrlo es desafiante: se requiere un cambio de paradigma de gestión.
Analyst Robert Wood shares the three areas CISOs should focus on to improve their performance: data, supply chain risk, and team cultures.
Prevenir las vulnerabilidades del uso de OSS requiere entender sus dependencias.
Bill reviews ThreatQuotient’s “2022 State of Cybersecurity Automation” report, which finds that the majority of organizations experience pain problems implementing these initiatives.
Burned out security and software teams are hard to retain and increase the odds of a breach. Bill speaks with Object First’s David Bennett, about how he tackles the issue as an object storage solution startup CEO.
Analyst Bill Doerrfeld discusses the benefits and drawbacks of low-code/no-code with CEO Prashanth Chandrasekar, giving examples of how the approach both widens businesses’ horizons and limits them.
Chris provides takeaways from the Cyber Safety Review Board’s recent Log4j incident report.
Microservices enable organizations to handle the growing complexity of data storage, but, as Pablo explains, they need frameworks to function optimally.
As Bill explains, continuous delivery/deployment scenarios require special and specific security — especially in industries that handle sensitive personal and financial data.
What’s in a vulnerability score? Chris Hughes explains what these are, where they come from, and how cybersecurity professionals should approach them.
Many organizations and companies are tentative about adopting underregulated and sometimes risky Web3 technologies. Enter Chainalysis, an industry backbone that makes the process safer and more streamlined for newcomers.
There’s a big push for SBOMs (software bills of material) as it’s becoming clear how crucial they are to cybersecurity. Read our guidebook to learn everything about SBOMs, including what they are and why they’re necessary, and how they work.
Janet Schijns looks at the impact a partner can have, both positive and negative, on your firm’s data project, and offers tips on vetting and choosing the right ones.
Pulling off a data modernization requires finding and working with the right tech-savvy partners. Janet Schijns writes about two state governments that reaped major benefits by doing just that.
Bill Doerrfeld shares tips that help address the unique cybersecurity implications of deploying and managing software across various cloud-based environments.
Se ha detectado un código malicioso en una de las aplicaciones desarrolladas en Huggingface que están disponibles gratuitamente al público en el Hub de Huggingface, lo que ha llevado a algunas voces a cuestionar si el software open-source es seguro o no.
In this Data Revolution Minute, Pablo Moreno explains Google’s release of TensorStore, which is a framework designed to hold and process N-dimensional data. He says this is a perfect solution for training AI.
Acceleration Economy analyst and Paragon Films CIO Kenny Mullican shares data modernization tips from the tech executive’s perspective.
Bill Doerrfeld revisits the past decade of rising software vulnerabilities, which reinforces the need to patch compromised servers, use active threat monitoring, and prepare for quick responses to future zero-day exploits.