Happy holidays, security professionals!

Jason Rader, Global VP & Chief Information Security Officer on Tuesday, December 22, 2020

I know the last thing you wanted to do this season was have to determine if a Nation State is in your network, established a foothold, moved laterally, accessed your data, and if any of that information requires you to do a legal disclosure.

How IT Can Support Your AI Initiatives

Juan Orlandini, Chief Technology Officer, North America & Distinguished Engineer on Monday, December 21, 2020

Whether using AI to leverage earlier diagnoses in the medical field or spot fraudulent transactions in banking and financial services, it provides organizations with powerful algorithms to extract even more value from data.

Simplifying the Conversation Around Edge Security

Insight Solutions on Friday, December 18, 2020

As the world fully realizes a major shift to a decentralized workforce, and advanced technologies bring us a growing number of endpoints in the Internet of Things (IoT), edge security has definitely taken a more prominent place in the overarching security discussion.

Security Threats — A Threat to Patient Care

Mark Walker, Security Consultant on Monday, December 14, 2020

The fundamental goal of healthcare is the well-being and care of the patient. The way healthcare organizations accomplish that is evolving to include more and more technology, connectivity, and data analysis.

The Unified Value of Agile and DevOps

Insight Solutions on Monday, December 14, 2020

As digital disruption continues to impact every industry in new and unexpected ways, modern organizations face a similar dilemma — how to nimbly respond to shifting customer needs, rising expectations and competitive pressures.

IoT: Intelligence and Innovation at the Edge

Andrew F. Nelson, Principal Architect on Monday, December 07, 2020

When it comes to processing, storing, and securing data, most people immediately think of data centers or the cloud. As enterprises increasingly rely on IoT devices, however, more actual computing is occurring at the edge.