Chris provides takeaways from the Cyber Safety Review Board’s recent Log4j incident report.
Search Results: risk management (767)
Bill Doerrfeld speaks with oak9 Co-founder Aakash Shah about ways to reduce known and unknown vulnerabilities brought on by open-source software.
As the role of technology increases in businesses, partner options have exploded. Janet explains why taking your time while vetting your choices makes all the difference.
In Ep. 9 of the Cutting Edge podcast, Leonard Lee explains why customers have a growing concern about privacy at the edge, and offers some intriguing solutions to the issue that edge computing can provide.
Wayne explains how smart CIOs go about keeping their boards informed and enthusiastic about data modernization projects.
Our latest installment on startup funding highlights tec companies working on rebate management, SMB finances, eye health, cloud app dev, and data analytics.
The Women in Tech session inspired hundreds of attendees as they learned about and discussed topics from taking risks to fostering an inclusive workplace.
Operating on legacy finance systems can slow down your organization. When users are forced to consistently use manual processes, your…
From improving medical inventory management to optimizing supply chains to helping relationships grow, innovations flowed at the 43North startup competition.
Toni Witt explains health pros and cons of VR, and why work-from-home and Metaverse aficionados must approach it with as much moderation they do 2D screens, social media, and the like.
Doing things the way they’ve always been done is never a good strategy where technology is concerned, and security is no exception, writes Robert Wood.
What’s in a vulnerability score? Chris Hughes explains what these are, where they come from, and how cybersecurity professionals should approach them.
Poor-quality data can derail a business. Janet Schijns explains how to choose partners who will wrangle and handle the right data properly and set your firm up to successfully navigate potentially rough economic times.
For many, blockchain is inseparable from Bitcoin — but hold onto that viewpoint and you’ll risk falling behind. Blockchain technology goes way beyond cryptocurrency, into areas such as identity security, supply chain, IoT, and governance.
At Columbus, we believe that with the right partner, IT outsourcing can shift your business from going with the flow…
It’s often said that security must be baked in rather than bolted on, and this is especially true when it comes to CISO involvement in an organization’s data governance plans.
Cuantificar los cyber-riesgos no es tarea sencilla debido al entorno habitual de TI y la falta de conocimiento técnico de los lideres. En este artículo de Chris Hughes se ilustran algunas recomendaciones que cualquier organización debe seguir.
Process mining delivers powerful results for giant companies. A German consulting startup aims to extend those benefits to the mid-market.
In episode 8 of the Cutting Edge podcast, Leonard Lee explains some of the risks and benefits of this new solution that’s popular among hardware and infrastructure vendors.
Kyndryl allies with Google Cloud to help customers move their mainframe applications to the cloud; it also deepens its Microsoft partnership.