sigmund Im cQ6hQo10 unsplash
Applications & Technology

How CTEM Could Help Consolidate the Cyber Stack

February 27, 2024 Holt Hackney 0

By Brian Martin For a long time, cybersecurity has been in reactive mode, focused on scanning for vulnerabilities and trying to remediate them as quickly as possible. Most organisations struggled with this approach because as […]

dreamstime m 47022087
Security

Gartner Identifies the Top Cybersecurity Trends for 2024

February 26, 2024 Holt Hackney 0

Generative AI (GenAI), unsecure employee behavior, third-party risks, continuous threat exposure, boardroom communication gaps and identity-first approaches to security are the driving forces behind the top cybersecurity trends for 2024, according to Gartner, Inc. “GenAI is occupying […]

dreamstime m 97042768
Applications & Technology

The Architect’s Contract

February 22, 2024 Holt Hackney 0

By Paul Preiss, of IASA Global Today, it has been 22 years that I have been studying architects. 22 years of delight and chagrin, of hope, belief and wishing. Mpre than two decades of seeing […]

adi goldstein EUsVwEOsblE unsplash
Applications & Technology

Integration Patterns in Software Development

February 20, 2024 Holt Hackney 0

By Alok Mehta – CIO Business Systems.  Kemper Insurance. and Uma Medikondla – Director, Software Development.  Kemper Insurance Applications are integrated with each other; without that we cannot meet users’ requirements. For example, when a […]

hacker 2371490 1280 e1502993846714 1
Security

Cybersecurity Preparedness: What Guidance to Follow?

February 16, 2024 Holt Hackney 0

By Asélle Ibraimova, Christian Leuthner & Catherine Castaldo, of ReedSmith With cybersecurity becoming a board-level issue, compliance officers, lawyers, board members, and business drivers are looking for official guidance or recommendations on cybersecurity measures to protect business, customers, and […]