Microsoft’s lagging security strategy and customer dissatisfaction open the door for Google Cloud to accelerate growth and challenge Microsoft’s leadership in the enterprise cloud market.
Cyber Security
If Identity and Access Management (IAM) software goes down, business continuity takes a big hit. HYCU is addressing the problem for customers of Microsoft and other IAM platforms.
A massive software outage impacting Microsoft customers underscores the need for IT resiliency, resources that can respond quickly when systems go down.
Microsoft, IBM Consulting extend partnership with cybersecurity services that provide threat monitoring and identity management in hybrid clouds.
This guidebook offers insights from CISO Chris Hughes and CIO Kenny Mullican on maximizing multicloud benefits while mitigating its downsides.
This report analyzes Microsoft’s security culture and promises of reform from CEO Satya Nadella following a widely reported breach, while highlighting the dual-edged quality of AI in cybersecurity.
Executives from Lookout and Pax8 discuss their new partnership to enhance mobile security for small and medium-sized businesses through a cloud marketplace.
Partner integrates Data Security Posture Management (DSPM) with ServiceNow’s Security Posture Control tool for a 360-degree view of a customer’s attack surface.
IBM research gives CEOs advice on how to ensure people and skills adapt to GenAI, top use cases to consider, and where they can get the most bang for the buck.
This guidebook offers insights on making zero trust a reality in our businesses, minimizing vulnerabilities that come with SaaS applications, mobile devices, and hybrid work environments.
In this report, Chris Hughes identifies five products — from CloudStrike, NetRise, Palo Alto Networks, Wiz, and Zscaler — that equip CISOs to combat the latest threats.
AnalystGPT taps into over 10,000 reports, articles, and videos by Acceleration Economy practitioner analysts to answer questions about AI, cloud, cybersecurity, and data.
Bob Evans and Chris Hughes discuss the evolving role of the CIO, and explore the relationship between a CIO and a CISO in this Digital CIO Summit moment.
The World Economic Forum (WEF) is anticipating a cyberstorm, which calls for a global, unified response across geopolitical borders.
In this CloudWorld News Desk interview, Oracle Senior VP of Cloud Infrastructure Mahesh Thiagarajan explains why some users are still reluctant to engage with multi-cloud platforms.
As a mode of communication for security teams, vulnerability reports require effective management but often involve a problematic process.
When faced with vulnerabilities, businesses often have to focus on the most severe cases. But, vulnerability management needs to go beyond these scoring frameworks.
Low-code/no-code app development has evolved to empower more users to innovate more freely and lower barriers for automated work.
It’s critical for employees to be trained to detect phishing activity to protect private business information from landing in the hands of a hacker.
With high-profile breaches occurring on a near-daily basis, CFOs must understand trends in cyber security & finance and mitigation.