What’s in a vulnerability score? Chris Hughes explains what these are, where they come from, and how cybersecurity professionals should approach them.
Search Results: risk (1568)
Poor-quality data can derail a business. Janet Schijns explains how to choose partners who will wrangle and handle the right data properly and set your firm up to successfully navigate potentially rough economic times.
Analyst Wayne Sadin reports from Oracle CloudWorld on CEO Safra Catz’s keynote, which included presentations from other companies undergoing digital transformation.
For many, blockchain is inseparable from Bitcoin — but hold onto that viewpoint and you’ll risk falling behind. Blockchain technology goes way beyond cryptocurrency, into areas such as identity security, supply chain, IoT, and governance.
Many organizations and companies are tentative about adopting underregulated and sometimes risky Web3 technologies. Enter Chainalysis, an industry backbone that makes the process safer and more streamlined for newcomers.
At Columbus, we believe that with the right partner, IT outsourcing can shift your business from going with the flow…
It’s often said that security must be baked in rather than bolted on, and this is especially true when it comes to CISO involvement in an organization’s data governance plans.
Cuantificar los cyber-riesgos no es tarea sencilla debido al entorno habitual de TI y la falta de conocimiento técnico de los lideres. En este artículo de Chris Hughes se ilustran algunas recomendaciones que cualquier organización debe seguir.
Process mining delivers powerful results for giant companies. A German consulting startup aims to extend those benefits to the mid-market.
On the heels of a cloud alliance with Microsoft, Kyndryl allies with Google Cloud, giving mainframe customers more cloud choices, as Tom Smith explains in episode 57 of the Cloud Wars Horizon Minute.
In episode 8 of the Cutting Edge podcast, Leonard Lee explains some of the risks and benefits of this new solution that’s popular among hardware and infrastructure vendors.
Microsoft has higher revenue, but in this article Bob Evans explains why the more upbeat, customer-centric, and innovative Google Cloud is the one to watch.
Kyndryl allies with Google Cloud to help customers move their mainframe applications to the cloud; it also deepens its Microsoft partnership.
Data process automation may seem like the perfect solution to enable efficient data analysis and speedy decision-making, but not all data processes are cut out for this approach.
In Episode 51, Wayne uses a bet he once made with a CISO as a jumping-off point to discuss how the C-suite should approach cybersecurity.
Community Summit is in full swing with an energetic keynote on innovation, an abundance of educational sessions for user groups, and inspirational discussions at Women in Tech.
Episode 21 of the Growth Swarm podcast covers the essential considerations, including real-time data, for CXOs who are leading digital transformation projects.
From ideas to Women in Tech to community developments, Day 2 of Community Summit was filled with ideas and insights for Microsoft users.
Driving down the IAM environment’s complexity should be a major priority for all organizations, especially given the common problem of attracting and retaining technical talent.
In Cybersecurity Minute, Ep. 31, Chris Hughes says it’s clear that the Senate’s Securing Open Source Software Act emphasizes how critical open-source software is to national security and society.