Build a Cyber-Resilient Organization CohesityMarch 27, 20220372 views People have always topped the list of what keeps enterprise executives up at night. Leaders wonder, “Is the right talent in the right places?” and “How do we maximize employee productivity and improve our customer experience?” Now two years into the pandemic, executives have a new people-related concern, “How do we stop bad actors from compromising our data and stealing it for gain?” Read more
Getting Started with Data-centric Security Dan SimmonsDecember 6, 20210305 views With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is a valuable asset, it is crucial to properly protect it. The importance of securing data, whether it is at rest or in-use, is being understood as companies realize the consequences of data breaches and non-compliance with data privacy regulations. Read more
How to Keep Employee Home Wireless Networks from Being Weakest Link your Cybersecurity Chain Yash VartakDecember 6, 20210344 views Now that we are slowly coming out of the COVID-19 Pandemic, work might never return to the “normal” of employees spending the majority of their days in an office building. Remote working, or some hybrid, is probably here to stay, says Forbes Magazine. How much did the Pandemic effect our working habits? Pew Research reported in December of 2020 that roughly 20% worked from home before the coronavirus outbreak and that number quickly ratcheting up to 71% during the outbreak. They also report that 54% would want to work from home after the outbreak ends. Read more
Democratization of AI in the Enterprise Frederic Van HarenDecember 6, 20210357 views The democratization of Artificial Intelligence (AI) makes it easier for organizations to transform their business with AI. It wasn't that long ago that applying AI to transform a business required a lot of technical expertise and hiring resources from a scarce talent pool. Let alone the expensive infrastructure to achieve such a feat. And something that only larger organizations can afford and justify as they are working on solving significant problems. Read more
Getting the most from your data-driven transformation: 10 key principles Hewlett Packard EnterpriseDecember 6, 20210332 views Best practices like determining what makes data valuable and creating company cultures that promote data sharing will enable businesses to embrace data in the modern enterprise. Read more
How to Safeguard Your Data & Applications from Ransomware CohesityDecember 6, 20210331 views It’s ugly out there. Each week, we all see the news reports about more and more companies and organizations falling victim to ransomware and the trend is accelerating. No doubt, you or your colleagues work in or are aware of organizations that have been hit by ransomware over the last few years and had the unenviable responsibility of scrambling to recover data, applications, workloads, and systems in the aftermath of an attack. Read more
Balancing Agility with Data Security Thomas GloerfeldSeptember 21, 20210282 views Agile development is known for well-paced development cadences with short, quick sprints. These fast bursts are typically focused on ensuring something of value (functioning code) gets done in a short amount of time, allowing for new features and functionality to be available in the product on a regular basis. As opposed to the traditional, slower forms of software development, with releases methodically planned and executed over many months or even years, Agile keeps the focus on speed, user feedback, and iterative refinement. Read more