The PLEXIGLAS manufacturer selected Workspot’s cloud desktop technology to provide secure, high-speed access to design apps for engineers at partner firms.
Chris Hughes details examples of keeping workforce development front and center in an organization’s attempt to adopt DevSecOps and drive effective security and digital modernization.
In The Cutting Edge podcast, Ep. 6, Leonard Lee covers what makes the Industrial Edge different, and why it matters to an organization’s future.
By leveraging the cloud, the aptly-named Workspot lets employees access their full desktop — in a variety of forms — from wherever they’re working.
In Cloud Wars Horizon Minute, Ep. 28, Tom Smith introduces Workspot’s technology, which effectively secures desktops that users access in the cloud.
In this Cloud Wars Expo News Desk interview, Aviatrix CEO Steve Mullaney addresses the challenges of securing cloud environments.
Application Security (AppSec) is a robust domain with myriad specialties, tools, and best practices. Here’s what to focus on first.
In this News Desk interview conducted on-site at Cloud Wars Expo, Aaron Back chats with IBM’s Head of Cloud.
As organizations are increasingly adopting multiple clouds, they need to be prepared to onboard hybrid multi-cloud technologies securely.
Snapshots of our Acceleration Economy Network analysts Wayne Sadin, Kenny Mullican, Tony Uphoff, Aaron Back, Scott Vaughan, Toni Witt, Kieron Allen, Ronak Mathur, Paul Swider, and Chris Hughes leading Cloud Wars Expo live sessions, interviews, and panels
In this Cybersecurity Minute, Ep. 23, Chris Hughes details the CIS software supply chain security benchmark, which was developed alongside Aqua Security.
In My Metaverse Minute, Ep. 23, Kieron examines a new survey of workers who stated concerns around privacy in virtual office environments.
Aaron Back reviews his time at Cloud Wars Expo and how it differed from his previous conference experiences — in a good way.
When managing threats, no organization has the same exact needs. Robert Wood shares four factors to look at to help find solutions that fit, no matter the scenario.
Wayne takes Episode 39 of this CXO Minute to explain why quantum encryption is needed now, even if quantum computing is still years away.
In Episode 22 of Cybersecurity Minute, Chris Hughes explains how malicious actors are using the Brute Ratel tool to undetectably breach security.
Chris Hughes singles out Zero Trust, Multi-Cloud IAM, compliance innovation, and other cybersecurity trends that surfaced at Cloud Wars Expo.
Chris shares his Cloud Wars Expo takeaways, including an emphasis on industry-specific clouds, stronger data security, and supply chains.
The discovery includes malicious code with more than 17,000 harmful downloads, says Chris Hughes in Cybersecurity Minute, Episode 21.
The cloud-native approach will modernize enterprise software architecture — but what are the security implications? Bill Doerrfeld explains.