-
Relying on a cloud vendor to protect digital assets isn't enough. Firms need an enhanced strategy that involves all employees in the effort.
By Bob ViolinoMay 1 -
Half of the organizations surveyed said existing tools aren’t effective in the cloud and an overabundance of tools makes it almost impossible to prioritize IT and security investments.
By Bob ViolinoApril 25 -
Many are using graph database technology to provide the necessary relationship mapping, combined with master data management, data federation and artificial intelligence.
By Bob ViolinoApril 23 -
Many company leaders feel prepared for the upheaval that emerging technologies represent, but few are ready for the operational, competitive, cultural and security shifts already taking place,
By Bob ViolinoApril 18 -
Nearly half of IT security pros think in the next year they will either struggle to deal with the increase of cyberattacks or that it will be impossible to defend against them, study finds.
By Bob ViolinoApril 17 -
A growing emphasis on measuring the performance of every operation across an organization to get a daily view of their performance is driving demand.
By Bob ViolinoApril 5 -
Organizations need to continue to build an agile data environment that can accommodate traditional BI platforms in concert with a modern information environment.
By Bob ViolinoMarch 28 -
Fingerprint and face scanners are the most common types of biometric implementations used on corporate devices and services.
By Bob ViolinoMarch 26 -
80% of IT companies get support from top management for cloud-based cybersecurity initiatives. That’s far more than any other industry.
By Bob ViolinoMarch 22 -
More human processes are being automated, including the writing of software, which computers will soon start to do themselves, says Future Today Institute.
By Bob ViolinoMarch 21