Janina Bauer, sustainability leader at Celonis, discusses how the company is leveraging partnerships to expand its sustainability portfolio and meet customer requirements.
Search Results: risk management (773)
Yooz announced today the company has received a Great Place to Work Certification™ for a consecutive year, following its 2021 recognition.
CISO Robert Wood details three techniques to analyze security breaches so that organizations can prevent them in the future.
By distributing AI computation to local sensors and devices where the data is actually generated, Edge AI powers real-time capabilities for everything from medical devices to self-driving cars to energy grid monitoring, as Toni explains.
Bill Doerrfeld summarizes the key points from Sonatype’s “The State of the Software Supply Chain” report to help IT technology divisions better understand how to address open-source security today.
El uso de soluciones de código abierto crece más de un 33% interanual, también las amenazas y ciberataques inherentes a estas soluciones.
Snowflake is leveraging its market-shaking data cloud innovations momentum into the red-hot applications-development space by helping customers deploy and monetize data-intensive applications directly into Snowflake’s Data Cloud.
Kieron reports from Celosphere 2022, where Celonis showcased several new apps that make process mining more accessible.
Reporting from Celosphere 2022, Tom Smith covers the process mining stalwart’s new apps, which take a process-centric approach to solving sustainability problems.
Chris provides takeaways from the Cyber Safety Review Board’s recent Log4j incident report.
Bill Doerrfeld speaks with oak9 Co-founder Aakash Shah about ways to reduce known and unknown vulnerabilities brought on by open-source software.
As the role of technology increases in businesses, partner options have exploded. Janet explains why taking your time while vetting your choices makes all the difference.
In Ep. 9 of the Cutting Edge podcast, Leonard Lee explains why customers have a growing concern about privacy at the edge, and offers some intriguing solutions to the issue that edge computing can provide.
Wayne explains how smart CIOs go about keeping their boards informed and enthusiastic about data modernization projects.
Our latest installment on startup funding highlights tec companies working on rebate management, SMB finances, eye health, cloud app dev, and data analytics.
The Women in Tech session inspired hundreds of attendees as they learned about and discussed topics from taking risks to fostering an inclusive workplace.
Operating on legacy finance systems can slow down your organization. When users are forced to consistently use manual processes, your…
From improving medical inventory management to optimizing supply chains to helping relationships grow, innovations flowed at the 43North startup competition.
Toni Witt explains health pros and cons of VR, and why work-from-home and Metaverse aficionados must approach it with as much moderation they do 2D screens, social media, and the like.
What’s in a vulnerability score? Chris Hughes explains what these are, where they come from, and how cybersecurity professionals should approach them.


















