Security

Security | News, how-tos, features, reviews, and videos

UiPath Logo
ai artificial intelligence technology abstract layered background

teamwork collaboration / leadership / development / developers / abstract data

4 reasons to prioritize developers' infrastructure needs

In the rush to deliver new digital solutions, companies often ignore the needs and requirements of development infrastructures and cut corners in devops processes, resulting in missed problems and costly fixes down the road.

ransomware

The year of ransomware: Don’t be the next victim

Reducing your susceptibility to an attack will make you a less attractive target to financially motivated cyber-criminals.

vcapr avery dennison
video

AI in perspective: The risks, along with AI’s role to improve defenses

As AI deployments proliferate for better decision making, they also present risks across a large spectrum – from job displacement and socioeconomic inequality, to automated bias, to data poisoning, privacy violations, and AI threats...

A person leaps between platforms surrounded by sharks. [danger / risk / challenges]

Redefining IT risk in post-pandemic world

With technology ever more critical to enterprise success and survival, IT leaders are taking a larger, more strategic role in assessing business challenges and opportunities.

Rhonda Gass, CIO, Stanley Black & Decker

Digital acceleration at Stanley Black & Decker places data at the center

CIO Rhonda Gass explains how a cloud data platform, technology business management framework, and agile architecture are keys to the $14B global company’s digital transformation.

Tech Spotlight   >   Cloud [IFW / Overview]   >   Clouds reflected in a towering modern skyscraper.

The great cloud computing surge

Driven in part by the pandemic, cloud computing adoption has reached new heights. These five articles take a close look at the implications.

okta podcast series megaphone
Sponsor Podcast Okta

Episode 5: Putting Your CIAM Model to Work on a Continuous Basis

Episode 5: In this fifth and final episode of our 5-episode podcast, The C-level Strategic Guide for CIAM Investment, we will explore phase 4 on the CIAM Maturity Curve: Continuous. Customer identity and access management, or...

vcapr gareth ross
video

How MassMutual uses data analytics to assess risk

If data is the new oil, the insights that come from analyzing it—make that loads of it—are a goal for companies hungry to satisfy customers and boost revenues. But as IT leaders know, data science is anything but exact and it requires...

okta podcast series megaphone
Sponsor Podcast Okta

Episode 4: Adding Intelligence to Your CIAM Strategy

Episode 4: In this fourth episode of our 5-episode podcast, The C-level Strategic Guide for CIAM Investment, we will explore phase 3 on the CIAM Maturity Curve: Intelligent. To move from phase 2 (automated) to phase 3...

Co-workers use protective face masks and glass partitions in a post-COVID workspace.

Return to the office: Organizational resiliency and the new normal

The WFH pivot was remarkable, but workplace re-entry creates a new set of challenges for business leaders.

tc vcmar routh
video

Lessons from the SolarWinds attack on securing the software supply chain

The SolarWinds breach represents a tectonic shift in threat actor tactics, suggesting this kind of attack vector will be replicated. Not only were the attacker’s sophistication and technical proficiency high -- allowing them to stay...

woman with virtual reality glasses crazy crackpot technology idea by georgepeters getty 1128262833

6 'crackpot' technologies that might transform IT

Next-horizon technologies have piqued some IT leaders’ interest in terms of the business value they may ultimately drive. Others remain skeptical of the high-risk payoff.

okta podcast series megaphone
Sponsor Podcast Okta

Episode 3: You’ve Passed CIAM 101 – Now It’s Time to Automate

Episode 3: You’ve learned the basics of customer identity and access management (CIAM). And you’ve listened as experts from Okta explained the CIAM Maturity Curve, which helps organizations determine where they fall on the...

video conferencing / remote work / online meeting

Ready for the hybrid workforce

Industry experts discuss how a hybrid workforce offers potential benefits for both workers and enterprises, but also comes with new security risks.

ransomware attack

Healthcare CIOs fear (and fend off) ransomware threats amid pandemic

Hospital IT leaders are fending off more hackers looking to capitalize on the COVID-19 crisis for financial gain.

Joanna Burkey, CISO, HP

HP CISO seeks to transform cybersecurity

HP CISO Joanna Burkey sees a pivot to business partnership as vital for cybersecurity’s success. Inspiring women to join the sector is essential to this shift.

okta podcast series megaphone
Sponsor Podcast Okta

Episode 2: You’re New to CIAM – Now What?

Episode 2: So you’ve got a basic understanding of customer identity and access management (CIAM) and why it’s so important. Now it’s time to determine where you fall on Okta’s CIAM Maturity Curve and how to use that assessment to...

vcmar think tank update
video

Creating a multicloud security architecture: IDG's CIO Think Tank

IDG convened 30 senior IT executives as part of our CIO Think Tank Program to explore key opportunities and challenges with multicloud – including security issues IT leaders face in building a true multicloud architecture. Join us as...

Load More