With support for a new environmental, social, and governance reporting framework, Salesforce continues to build out its NetZero Cloud functionality.
Search Results: risk management (766)
Process mining has several potential cybersecurity applications including incident investigation, anomaly detection, and detecting insider threats.
Pepsico, Johnson & Johnson, GE Healthcare, Morgan Stanley, and Bosch gave visibility into their process mining use cases and business results at a recent Celonis event.
Salesforce’s Net Zero Cloud sustainability software gains new reporting functionality to help customers comply with key international standards.
A proactive approach to SaaS security — starting with asset management — can protect against data misuse and other potential vulnerabilities.
Google Cloud proves to be a leader in the generative AI revolution, expanding on partnerships with SAP, Salesforce, Accenture, and other global system integrators.
By using Workday’s Professional Services Automation (PSA), businesses can benefit from an integrated view of applications and data.
From intelligent resource allocation to predictive maintenance to precision demand forecasting and beyond, artificial intelligence’s impact with ecosystems is profound.
The cybersecurity innovator Snyk caters to developers, ensuring that their code is secure as it’s written, and that their open-source software is monitored continuously.
GitGuardian and Snyk join forces to strengthen cloud-native security, enhance their developer-centric approach, and drive early risk mitigation in software development.
AWS Supply Chain software leverages AI, ML, and Amazon’s experience to provide demand planning recommendations optimized for multi-site businesses.
AWS Supply Chain software, now generally available, delivers powerful functionality in demand planning, inventory management, and sustainability.
While advances in automation have greatly benefited businesses, there have still been cases where the technology makes errors. Find out how to contain their impact.
Machine learning is impacting endpoint security in areas such as enhanced threat detection, false positivity reduction, and the ability to implement proactive security measures.
A CIO has to appreciate the breadth of integrated functionality offered by ServiceNow, which has increased significantly over time, Wayne Sadin says.
Robust encryption, access controls, and user education help CISOs mitigate the risks of theft, insider threats, and cyber attacks against their organizations.
Implementation of zero trust security for geographically distributed endpoints is critical in the age of remote work.
Oracle Student Cloud, among other industry cloud solutions, helps partners assist universities in better managing administrative processes and student engagement.
EDA delivers numerous benefits in flexibility, scalibility, and responsiveness, but it also carries unique security considerations.
Rob Wood explains why cybersecurity ML models need clean and ample data, proper input ranges, and robust data platforms, such as the security data lake.