Education and TrainingInnovationLeadershipSecuritySpring 2020 “It is a myth that in order to act like a leader you need to act powerful”, with Penny Bauder & Lisa Partridge by Penny Bauder by Penny Bauder March 24, 2020 It is a myth that you must act powerful to gain respect — many people confuse being “the one who … 0 FacebookTwitterPinterestEmail
Editors' PicksEducation and TrainingInnovationLeadershipSecurityWinter 2019 How Cookies and Rockets Changed My Life – Girl Scouts and STEM by Sylvia Acevedo by Sylvia Acevedo December 10, 2019 I was named CEO of Girl Scouts of the USA in 2017. It’s truly an honor to lead this organization … 0 FacebookTwitterPinterestEmail
CloudSecurityWinter 2019 Partnering for your success: HPE Mission Critical Solutions strengthens partnerships in 2019 by Diana Cortes by Diana Cortes December 10, 2019 Advancing on the journey started a few years ago, Hewlett Packard Enterprise has continued to transform during 2019. This journey … 0 FacebookTwitterPinterestEmail
SecurityWinter 2019 XYPRO’s 2020 Cybersecurity Predictions – Add 2 Factor Authentication and Machine Learning to Your Plans! by Steve Tcherchian by Steve Tcherchian December 10, 2019 As 2020 approaches, it’s time to discuss cybersecurity predictions that will impact the industry in the upcoming year. As a … 0 FacebookTwitterPinterestEmail
DataFall 2019Security 5 Tips to Prevent Ransomware Attacks on Backups by Raj Dutt by Raj Dutt September 24, 2019 Backup and recovery solutions are designed to protect your organization, but sophisticated malware like Locky and Crypto-ransomware are now targeting … 0 FacebookTwitterPinterestEmail
Fall 2019July-August2019SecurityTheConnection Big Breaches, Big Data, Big Context How to Empower the Next Generation of Security Threat Detection by Steve Tcherchian by Steve Tcherchian September 24, 2019 It can take months or even years before a data breach is detected. The latest statistics from Ponemon Institute’s 2018 … 0 FacebookTwitterPinterestEmail
DataFall 2019Security Six tips for choosing the right data security solution for big data environments by Anna Russell by Anna Russell September 24, 2019 Data is money. For some organisations, data has become the highest commodity, and this means consumers now hold the power. … 0 FacebookTwitterPinterestEmail
Data SolutionsJuly-August2019SecurityTheConnection PROTECTING YOUR DATA: WHO IS RESPONSIBLE? by Henry Fonseca by Henry Fonseca July 30, 2019 There are several different factors to consider when thinking about protecting your data. The subject can be complex and usually … 0 FacebookTwitterPinterestEmail
July-August2019SecurityTheConnection Protecting your business with data-centric security on HPE NonStop by Thomas Gloerfeld by Thomas Gloerfeld July 30, 2019 0 FacebookTwitterPinterestEmail
May-June2019SecurityTheConnection From Hacker to Hackathon – History in the Making! by Vuk Petrovic by Vuk Petrovic May 30, 2019 0 FacebookTwitterPinterestEmail
Mar-Apr2019SecurityTheConnection Mercury Processing Services International Secures Growth with GDPR and PCI Compliant Data-Centric Data Protection Solution by Thomas Gloerfeld by Thomas Gloerfeld March 28, 2019 0 FacebookTwitterPinterestEmail
DataInnovationSecuritySpring 2019 For Auto Makers, Data is the New Fuel for Analytics and Innovation by Carole Murphy by Carole Murphy March 18, 2019 Auto manufacturers capture massive volumes of data that, with predictive analytics, can produce valuable insights to monetize, and improve products, … 0 FacebookTwitterPinterestEmail