Data is everywhere. But can you find it?

Most regulatory acts require that owners of sensitive data must always know where the data is currently stored, what state it’s in, and how well protected it is. Two primary concerns surround the importance of having this knowledge — security and compliance, and they’re not the same thing. Security Information security refers to practices that…

5 tips for making hybrid work in IT

When COVID-19 hit, IT had to adjust its internal processes and procedures, logistics, and security policies at the same time it was helping the rest of the organization pivot to a full work-from-home environment. Then, adding additional complexity to an already difficult situation, along came The Great Resignation, where many employees, particularly baby-boomers, decided not…

Wrangling ESG data: The CIO’s next challenge

Many organizations vest responsibility for creating what are usually called environmental, social, and governance (ESG) reports in a corporate sustainability officer or similar title. But lately there has been a growing call for CIOs to play a larger role in ESG efforts, especially when it comes to meeting increasingly rigorous ESG standards and frameworks. In…

Passwordless MFA: The Single Way To Mitigate the Top 5 Threats to Your Customer Identities

https://vod-progressive.akamaized.net/exp=1651270285~acl=%2Fvimeo-prod-skyfire-std-us%2F01%2F603%2F28%2F703018738%2F3254490927.mp4~hmac=3d37e94b5147ebebf79eb9ff5cced9221a79e49078812f5d08a954330b685f97/vimeo-prod-skyfire-std-us/01/603/28/703018738/3254490927.mp4 Consumers are increasingly targeted by cybercriminals that use various techniques in account takeover (ATO) attacks. These attacks threaten the security of their online accounts and personal data. Consumers understand this, too. According to Experian’s 2021 Global Identity and Fraud Report[1], 55% of consumers say security is the most important aspect of their online experience.…

Sovereign Clouds: Partner Perspectives on Safeguarding Critical Customer Data

As VMware gains momentum with their sovereign cloud initiative , we turned to leading partners AUCloud, Datacom, STC, NxtGen, TietoEVRY, ThinkOn, and UKCloud and their customers to find out why a sovereign cloud is essential. With new national data protection and privacy laws continuing to take shape across the globe and penalties confirming the punitive power of existing regulations, it’s no surprise that highly regulated…

How Enterprises Boosted AI Through Infrastructure Upgrades

Many enterprises around the world are discovering new insights, revenue and efficiencies through the use of artificial intelligence (AI). At the same time, companies are discovering that they can accelerate their projects by adjusting their infrastructure approach. These changes have helped to create new opportunities and growth options, as well as preventing a trip to…

The Problem with Patching

Patching isn’t just an IT operations problem; it’s also a security problem. Highly organized cybercriminals are constantly searching for vulnerabilities in the software and systems on which organizations depend. For example, zero-day vulnerabilities and software supply-chain attacks were the cause of 21% of security incidents among enterprises last year, according to the Foundry 2021 Security…