ERP is in the spotlight as companies look to get more out of their existing processes. Wayne Sadin gives insight into modern ERP’s capabilities.
Compliance
Data security strategy must go beyond securing a company’s data and employees to protect every data channel and counterparty. Wayne Sadin presents guidelines for managing third-party data risks.
Robert Wood discusses the risks of data silos and provides three actionable steps for how to break them down or control their impact.
Knowing the types of data that cybercriminals target for identity theft, financial fraud, or other malicious activities helps security teams implement effective protection.
Nearly all cloud security incidents are due to customer misconfigurations. Chris Hughes explains how cybersecurity hygiene addresses the problem.
With the rise of generative AI, companies with weak data exfiltration controls are at even more risk of inadvertent disclosure of data, explains Wayne Sadin.
Kieron Allen highlights how CockroachDB Dedicated is PCI-DSS certified, making it easier for customers to protect payment card information.
Janet Schijns outlines eights services a cybersecurity channel partner can offer your company, especially if you’re not resourced to hire a CISO.
Bill Doerrfeld explains how to effectively manage diverse, geographically specific data governance and compliance standards.
Software bills of materials are important because they serve as standardized artifacts in developmental processes, as well as for security and compliance.
Kenny Mullican and Paul Swider highlight the data governance benefits of Master Data Management (MDM) in their respective industries.
CISO Chris Hughes explains why Chief Data Officers (CDOs) and Chief Information Security Officers (CISOs) need to work together to drive data governance.
In an age of proliferating APIs and SaaS apps, a control plane helps cybersecurity pros centrally manage security policies, access, and visibility, CISO Robert Wood says.
Digital transformation has brought on a new level of cybersecurity concerns around applications, and those need and those concerns warrant CEO focus, Tony Uphoff says.
Low-code/no-code platforms begot citizen developers and their innovative solutions, but a lack of formal training brings risks that must be managed.
Frank Domizio explains the benefits of cybersecurity supply chain risk management (C-SCRM) and how to pick the right tools.
Learning when to say no is an important skill for CISOs, particularly, Robert Wood explains, when it comes to trendy or complex technologies and partnerships.
Drawing on examples from the retail and healthcare industries, Janet explains why partner strategies may be the missing link for modernizing data.
Kieron Allen profiles Rubicon, a company that excels in providing a sustainable waste management solution that dramatically reduces the amount of waste in an organization and equates to cost savings.
While the realization of a cybersecurity incident of course brings primary impacts, it doesn’t stop there. In this analysis, Chris explains how and why preparation helps.