How to choose a cloud data management architecture
Donald Feinberg, vice-president and distinguished analyst in Gartner’s ITL Data and Analytics (D&A) group, explores the different kinds of cloud architecture for data management, and
Donald Feinberg, vice-president and distinguished analyst in Gartner’s ITL Data and Analytics (D&A) group, explores the different kinds of cloud architecture for data management, and
Globally, data breaches are estimated to cost in excess of $4.2m per incident today. And they’re happening on an unprecedented scale as organizations build out
While cloud migration isn’t as controversial as it used to be for many organizations, issues about security linger. That’s why it’s important for security teams to
Medical devices increasingly represent a weakness in security for most healthcare organizations, which typically use hundreds of diverse devices from dozens of manufacturers. Equipment ranging
While organizations proceed with their digital transformation efforts, and investments, threat actors are also becoming much more sophisticated and increasingly well organized. The objective isn’t
IoT networks are under attack, with potentially dire consequences for organizations that fail to protect them with adequate security and control measures. Last summer, the
Cloud computing hasn’t always been synonymous with great security. However, despite early fears that it was less secure than data centres, the cloud is now
A cybersecurity professor has insisted he was not hunting for a vulnerability when he found a denial-of-service bug on an in-flight entertainment screen during a
Does your organization need NIST, CSC, ISO, or FAIR frameworks? Here’s how to start making sense of security frameworks. Cybersecurity professionals often face the curse
The National Institute of Standards and Technology (NIST), an agency of the US , formulated the core definitions of cloud computing back in 2011, including
A top-of-mind question for business leaders across all industries is how to eliminate the risk of a data breach. In addition to removing sensitive data
As 2018 draws to a close, the state of the cyber workforce can be summed up in two words: “Help Wanted!” The numbers prove it: