The California Consumer Privacy Act of 2018 is a bill intended to enhance online privacy rights and consumer protection for residents of California, United States. But the bill has national and global implications. Here’s how to prepare your organization for compliance and protect your customers.
There are literally thousands of SaaS applications that can be used to manage almost every aspect of a company’s internal operations. On a bad day it may seem as if your company has purchased all of them! Here are some tips on how IT organizations can provide responsible application oversight even in the absence of direct application ownership.
The human-centric focus of healthcare has given digital health developers a different perspective on how they deploy IoT technology. Industrial developers can learn from these practices – patient first, the Quadruple Aim and the Nudge – to accelerate the success of their operation-centric efforts.
As efforts to implement comprehensive security engineering frameworks and policies grow across various enterprises, it makes sense to implement a hands-on training program focused on educating your employees with basic cybersecurity best practices – so they don’t fall for phishing scams.
Despite increasing cybercrime and dependency on digital revenues, many CEOs operate in the dark. A stunning 63 percent of CISOs don’t regularly report to their board, research by Ponemon Institute finds.
Behind the buzzword, is there a real need of and value for organizations in exploring DevSecOps? It’s important to understand why DevSecOps matters in this day and age of security breaches and what the pragmatic benefits are for your organization.
The unlocking of patient data is leading us to a future when health care will be a vastly improved experience with superior outcomes. However, there will be guard rails around consumer access to personal health records.
Lofty proclamations for what the emerging wireless standard will do for IoT don’t matter much to CIOs caring for the carpeted enterprise. But they will care about three new ways they can leverage WiFi 6 to retool for a much more reliable and cost-effective network.
Understanding data is a prerequisite to gaining control of any enterprise. But understanding is only useful if that knowledge can be shared and transmitted. Effective data modeling should be a primary focus of any enterprise architect.
Gaining control of an enterprise’s data is a key element in taming enterprise complexity. But control without understanding is a recipe for trouble. Understanding data is an obligation of every enterprise architect.
Drowning in data it couldn't use, the University of North Texas System adopted an ambitious strategy to build a data-driven culture and the ability to apply analytics to every aspect of its operations.
It’s impossible to establish a security culture within a modern enterprise if it doesn’t already exist within IT. IT organizations should have pervasive and conspicuous security cultures that can serve as examples to all other parts of a corporation. Here are six management triggers that IT leaders can use to build such cultures.
BrandPosts are written and edited by members of our sponsor
community. BrandPosts create an opportunity for an individual
sponsor to provide insight and commentary from their point-of-view
directly to our audience. The editorial team does not participate
in the writing or editing of BrandPosts.