Thu.Feb 13, 2020

article thumbnail

The Power Of Technology-Driven Innovation

Forrester IT

Peter F. Drucker once said, “If you want to do something new, you have to stop doing something old”, and yet most firms stick with what they know and focus on incremental improvements. And while incremental growth is a critical piece of the puzzle, the more important element of growth is differentiation. If you want […].

450
450
article thumbnail

Key components of the CEO's agenda for the digital enterprise

Tech Republic Security

CEOs are generally from a finance/business track, rather than a technology one--why their traditional agenda and practices must change.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSA Conference 2020: An Intelligence Nerd’s Shopping List

Forrester IT

RSA Conference is an incredible opportunity for vendors to showcase their products and services to the security and risk community. Vendors, my shopping list does not include vaporware or snake oil. Everyone attending knows the internet is a scary place and threats are around every digital corner. Skip the scary statistics, and tell me how […].

article thumbnail

Why password management is critical to mitigating data breaches

Tech Republic Data Center

The Identity Theft Resource Center warns that businesses of all sizes should be vigilant about data security. The COO offers advice about passwords, cloud security, and patch management.

Data 154
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Rock ‘N’ Role — The Art Of Managing Employee Roles And Access For Dynamic Business Models

Forrester IT

The highly orchestrated symphony of grouping employees into well-defined roles with specific and granular access to enterprise apps/services is breaking down under the frenetic rock n’ roll era of dynamic business. The instruments of creative destruction – digital transformation (DX), Cloud migrations, DevOps and Agile methodologies – are powering the new sound.

Devops 276
article thumbnail

Chinese cyber criminals are getting more organized and dangerous

Tech Republic Security

Hackers are adopting organized crime tactics to make billions from victims all over the globe.

207
207

More Trending

article thumbnail

Only 17% of global organizations are considered cyber resilience "leaders"

Tech Republic Security

New Accenture study says organizations need to think beyond securing just their own enterprises and take better steps to secure their vendor ecosystems.

Study 161
article thumbnail

Cloud Threat Report Shows Need for Consistent DevSecOps

Information Week

Organizations continue to make choices for the sake of speed in innovation, which can leave them unnecessarily vulnerable.

Report 148
article thumbnail

Report: 9 times out of 10, hackers can attack website visitors

Tech Republic Security

A Positive Technologies study finds 82% of web application vulnerabilities lie in the source code.

Report 191
article thumbnail

RSA Conference 2020: What I’m Looking for this Year

Forrester IT

Counting down the days! My RSA Conference schedule is set, and I’ve stocked up on hand sanitizer. Here’s my game plan: · Look for innovation in data security. I keep coming back to “the basics” of understanding data and context about data, which isn’t so basic or easy. I’ll be on the look out for […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

IoT device security: 5 tips for enterprises

Tech Republic Security

There are now billions of IoT devices in businesses across the world, prompting the need for increased security measures to protect them.

Security 151
article thumbnail

IT Management Perils and Pitfalls

Future of CIO

Information and technology nowadays are permeating every corner of the organization and recharging the digital business with the power to respond to changes quickly and innovate relentlessly. However, many IT organizations still get stuck in the old IT thinking which cannot move fast enough in the digital era, becoming irrelevant due to outdated management disciplines, overly rigid processes, or enlarged skill gaps.

article thumbnail

Man tries to sell Jimmy Wales on blockchain for Wikipedia's security problems--Wales doesn't buy it

Tech Republic Security

Commentary: It takes hubris to tell Jimmy Wales, the founder of Wikipedia, how to store data.

Security 105
article thumbnail

The Best “Popularity” Quotes of “Digital Master” Feb, 2020

Future of CIO

" Digital Master ” is a series of guidebooks (28 + books) to perceive the multi-faceted impact digital is making to the businesses and society, help forward-thinking organizations navigate through the journey in a systematic way, and avoid “rogue digital.” It perceives the emergent trends of digital leadership, provides advice on how to run a digital organization to unleash its full potential and improve agility, maturity, and provide insight about Change Management.

Trends 52
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Difference between WCAG, Section 508 and ADA – Tools of Web Accessibility 

Kitaboo

The web is for everyone. No matter what geographic location, language or nationality one belongs to. A web accessibility policy refers to extending differently-abled persons the same access to digital services, products, and resources, as an able-bodied person. This means taking into account the needs of people with disabilities such as low vision, partial blindness or color blindness while developing websites and web platforms so that these are accessible to even those grappling with such situ

Tools 107
article thumbnail

The Monthly “Digital Fit” Book Tuning: The “Perfect” Fit Feb. 2020

Future of CIO

The purpose of “ Digital Fit: Manifest Future of Business with Multidimensional Fit“ is to share insight about multidimensional enterprise fit from digital characteristics, organizational structure, change, knowledge, and talent perspectives; evoke critical and paradoxical thinking about digital “fit vs. misfit,” spark healthy debates on how to define and develop true digital fit, and build a fitting working environment to inspire creativity and accelerate digital transformation.

Energy 52