As Bill explains, continuous delivery/deployment scenarios require special and specific security — especially in industries that handle sensitive personal and financial data.
security
In this Cloud Wars Expo Moment, Joe Wilson, CTO for Americas, Workday, explains the never-ending need for privacy and security in the hospitality industry, and why the company offers five core principles in its technologies.
In Ep. 9 of the Cutting Edge podcast, Leonard Lee explains why customers have a growing concern about privacy at the edge, and offers some intriguing solutions to the issue that edge computing can provide.
Data is the lifeblood of every business today but requires strategy, security, and governance to drive insights and accelerate transformation.
Cybersecurity analyst Robert Wood explains how secure defaults save time and energy for engineers and development teams.
For many, blockchain is inseparable from Bitcoin — but hold onto that viewpoint and you’ll risk falling behind. Blockchain technology goes way beyond cryptocurrency, into areas such as identity security, supply chain, IoT, and governance.
Janet Schijns looks at the impact a partner can have, both positive and negative, on your firm’s data project, and offers tips on vetting and choosing the right ones.
Driving down the IAM environment’s complexity should be a major priority for all organizations, especially given the common problem of attracting and retaining technical talent.
In My Metaverse Minute, Ep. 175, Kieron Allen previews the Sunday newsletter, which covers compliance and legal issues organizations must consider when launching initiatives in the Metaverse.
“Set it and forget it” assumptions can be dangerous when it comes to security. That’s why it’s important for users to understand everything their cloud tools can and cannot do.
In this Data Revolution Minute, Pablo Moreno compares the Data Science Landscape 2022 results to the 2020 findings. The study focuses on the security aspect of open-source software.
In My Metaverse Minute,Ep. 166, Kieron Allen says that privacy policies and mechanisms should be considered before the development of any Metaverse platform even begins.
In this Cloud Wars Expo Moment, Guy Bursell explains Microsoft’s approach to ensuring cloud and data security in the manufacturing industry.
In this Cloud Wars Expo News Desk interview, SAP’s Kai Finck discusses the company’s approach to supply chains, sustainability, data privacy, the partner ecosystem, and co-innovation.
With complex and distributed software ecosystems, organizations need to reach beyond traditional security measures through observability tools and practices.
As VR and AR devices open new avenues for data collection, how will data privacy be implemented in the Metaverse?
Ronak Mathur outlines use cases that demonstrate how image recognition technology, a subset of computer vision, is a critical component in nearly every industry from automotive and CPG to healthcare and retail.
By leveraging the cloud, the aptly-named Workspot lets employees access their full desktop — in a variety of forms — from wherever they’re working.
Chris Hughes singles out Zero Trust, Multi-Cloud IAM, compliance innovation, and other cybersecurity trends that surfaced at Cloud Wars Expo.
In this Future CXO Minute, Wayne discusses the Microsoft announcement for its Microsoft Security Experts offerings.