The IT department has been called IT since the 1990s, but technology and roles have since changed. Should the name not change as well to reflect what the modern department does?
Why ING Entrusted Core Dev Needs to Low Code/No Code
Banking and financial services giant turned to Genesis’s platform to tackle certain app development.
Why ING Entrusted Core Dev Needs to Low Code/No Code
Banking and financial services giant turned to Genesis’s platform to tackle certain app development.
Why ING Entrusted Core Dev Needs to Low Code/No Code
Banking and financial services giant turned to Genesis’s platform to tackle certain app development.
SolarWinds CEO Talks Securing IT in the Wake of Sunburst
Lessons learned from the pandemic and the aftermath of the Sunburst cyberattack puts the IT trends report issued by SolarWinds in a special context.
SolarWinds CEO Talks Securing IT in the Wake of Sunburst
Lessons learned from the pandemic and the aftermath of the Sunburst cyberattack puts the IT trends report issued by SolarWinds in a special context.
SolarWinds CEO Talks Securing IT in the Wake of Sunburst
Lessons learned from the pandemic and the aftermath of the Sunburst cyberattack puts the IT trends report issued by SolarWinds in a special context.
The Cybersecurity Minefield of Cloud Entitlements
In the rush to the cloud, some organizations may have left themselves open to cybersecurity incidents. Here’s how machine learning and analytics helped one company close the gaps. Credit: kras99 – Adobe Stock Almost as quickly as we experienced the pivot to work-from-home and to move-to-the-cloud to minimize the economic impact of the pandemic, we […]
Cloud Security Basics CIOs and CTOs Should Know
Chief information officers and chief technology officers don’t tend to be cybersecurity experts and yet they may have responsibility for it. Cloud security is somewhat unique because you can’t control everything.
Cloud Security Basics CIOs and CTOs Should Know
Chief information officers and chief technology officers don’t tend to be cybersecurity experts and yet they may have responsibility for it. Cloud security is somewhat unique because you can’t control everything.