In this Cloud Wars Expo Moment, Chris Hughes explains why the user experience should inform the systems designed by cybersecurity professionals.
“Set it and forget it” assumptions can be dangerous when it comes to security. That’s why it’s important for users to understand everything their cloud tools can and cannot do.
With the ability to enforce data access policies on a platform agnostic basis, Okera simplifies data analytics access management.
Startup Okera takes a centralized approach to managing access to analytics data. Customers validate the software provides massive scalability.
Bill Doerrfeld revisits the past decade of rising software vulnerabilities, which reinforces the need to patch compromised servers, use active threat monitoring, and prepare for quick responses to future zero-day exploits.
As Chris Hughes explains, the recent U.S. government response to increased software supply chain attacks will force the cybersecurity industry to innovate.
Analyst Wayne Sadin offers ways for legacy organizations to update their data strategy so that they can keep up with cloud native organizations.
In Ep. 30, Chris Hughes reviews the recent phishing campaign that affected more than 130 companies and explains how hardware-based tokens and other modern SaaS security solutions can help.
Government is yet another area in need of more accessible software development to upkeep the well-being of communities. Bill Doerrfeld explains how low-code/no-code could be the answer.
When it comes to cyber risk quantification, cybersecurity as an industry has become abysmal. How can organizations overcome these challenges?
In My Metaverse Minute,Ep. 166, Kieron Allen says that privacy policies and mechanisms should be considered before the development of any Metaverse platform even begins.
As organizations implement zero trust initiatives, risk scoring becomes an essential factor that can influence user behavior and endpoint security, writes Robert Wood.
Though it offers many advantages, Cloud ERP still raises many security concerns for some companies. The following best practices can help.
In Episode 18 of the Growth Swarm podcast, John Siefert, Bob Evans, Tony Uphoff, and Scott Vaughan discuss customer centricity, security, co-creation, and other multi-cloud concerns.
Worker shortages are nothing new, but the methods by which organizations can retain and recruit has evolved, as these eight tips address the IT talent gap demonstrate.
Vulnerability management is always a daunting task. In multi-cloud scenario, it’s even more challenging, as Chris Hughes explains in the context of AppSec.
In Cybersecurity Minute, Ep. 29, Chris examines a recent data breach compromising the security software provider’s proprietary information.
From automation and better telemedicine to innovative third-party solutions, a variety of modern cloud security capabilities are advancing new possibilities in the healthcare industry.
In this Cloud Wars Expo Moment, Guy Bursell explains Microsoft’s approach to ensuring cloud and data security in the manufacturing industry.
In this Cloud Wars Expo News Desk interview, SAP’s Kai Finck discusses the company’s approach to supply chains, sustainability, data privacy, the partner ecosystem, and co-innovation.