In this Cloud Wars Expo Industry Cloud Battleground Moment, Carrie Tharp explains how Google Cloud emphasizes security and privacy in the hospitality industry.
security
CDO & Practitioner Analyst Wayne Sadin digs deep into the Bible of sustainability to discuss how companies should handle greenhouse gas emissions and the interplay between data and sustainability.
The capabilities of Snyk for automatic discovery & remediation have positioned it to shift security left. However, vendor solutions only go so far.
A sustainable future is not out of reach but depends on how we continue efforts to build resilient cybersecurity frameworks which support the critical infrastructures, IoT, and open-source solutions we all depend on.
Frank shares a few essential ways to get the right people, set the ground rules, and stay informed so you can successfully navigate your breach response.
CISO Robert Wood details three techniques to analyze security breaches so that organizations can prevent them in the future.
Security and data breaches aren’t all bad news; they’re also opportunities to build on lessons learned and correct deficiencies, as Chris explains.
Latest updates to HYCU’s Protege platform add support for Azure Gov Cloud, disaster recovery to AWS, cross-cloud recovery.
Robert explains why communication is key to getting security, legal, sales, and engineering teams on board with a DevSecOps strategy shift.
Threat hunting is often thought of as something one does to uncover as yet undetected threats in an organization. But there’s also attack-specific threat hunting, which, analyst Chris Hughes explains, is essential when responding to security breaches.
From victim and media notification to legal liabilities and government considerations, the many issues that arise after a security breach are more easily addressed with the help of a lawyer. Frank explains why.
Cybersecurity has evolved beyond the “office of ‘no'” to a true business enabler that requires an on-going vigilant effort to keep a resilient security posture
Since the public sector is known to be risk adverse, In the Cloud Wars Expo Moment, Nicholas Smith discusses the public sector’s tendency to be risk-averse, which is why Oracle bakes security into all of its cloud stacks.
As Bill explains, continuous delivery/deployment scenarios require special and specific security — especially in industries that handle sensitive personal and financial data.
In this Cloud Wars Expo Moment, Joe Wilson, CTO for Americas, Workday, explains the never-ending need for privacy and security in the hospitality industry, and why the company offers five core principles in its technologies.
In Ep. 9 of the Cutting Edge podcast, Leonard Lee explains why customers have a growing concern about privacy at the edge, and offers some intriguing solutions to the issue that edge computing can provide.
Data is the lifeblood of every business today but requires strategy, security, and governance to drive insights and accelerate transformation.
Cybersecurity analyst Robert Wood explains how secure defaults save time and energy for engineers and development teams.
For many, blockchain is inseparable from Bitcoin — but hold onto that viewpoint and you’ll risk falling behind. Blockchain technology goes way beyond cryptocurrency, into areas such as identity security, supply chain, IoT, and governance.
Janet Schijns looks at the impact a partner can have, both positive and negative, on your firm’s data project, and offers tips on vetting and choosing the right ones.