The three key principles of a digital security strategy

digital-security-keys

Digital transformation represents the greatest opportunity for the enterprise in the 21st century. CEOs across the globe have digital innovation on their agenda as they seek to deliver innovative new business models, create new digital customer experiences, and optimize and automate their processes to enhance business performance. BUT…digital technologies and the rapid pace of change […]

Moving toward a consistent framework for digital security transformation

curved-metal-framework

By Curtis Price, IDC Organizations pursuing digital transformation initiatives are typically doing so to achieve a variety of possible business outcomes ranging from improved customer experience to improved operational efficiency. As enterprises plan their digital journeys, they are increasingly moving to a more distributed IT environment where corporate applications reside on premises as well as […]

Making analysts better using AIRO in security operations

improvement-concept

By Curtis Price, IDC The traditional security operations model is rapidly succumbing to the challenges and dynamics inherent in today’s cybersecurity market. Over the last few years, organizations have deployed a myriad of security technologies to combat specific threats, and as a result have inherited a collection of point product solutions with very little interoperability. […]

Automating and orchestrating “SecOps” and integrating service management

orchestra-conductor

By Curtis Price, IDC Managing an enterprise’s security posture and mitigating risk continues to be a top of mind concern for corporate executives. Enterprises are not only spending more on technologies to prevent attacks, but also establishing procedures for quickly and effectively responding to a breach. However, as organizations develop holistic security strategies that span […]

Identity management is coming to the Internet of Things

IoT-and-security-as-gears

The security of IoT Devices matters. If we’re to actually live in a world where we reap the full potential from Internet-connected devices, those devices will need to be reasonably secured. Device makers will need to take the secure design and development of their gear seriously. Device owners, meanwhile, will have to take the effective […]

Ejemplos prácticos de la tecnología blockchain

Blockchain fue creado como un libro maestro de todas las transacciones realizadas con la criptomoneda bitcoin. Pero, esta tecnología tiene una amplia variedad de aplicaciones prácticas en muchos otros escenarios empresariales. Lo más grande de blockchain es que prácticamente cualquier tipo de dato puede formar parte de este sistema de intercambio seguro. Cada registro o […]

Practical business uses for blockchain technology

blockchain-definition

Blockchain was created as the public transaction ledger for the bitcoin cryptocurrency, but blockchain technology also has a variety of practical applications in enterprise business process scenarios. The beauty of blockchain is that virtually any type of data can be put into the distributed ledger. Each record or block contains a cryptographic hash of the […]

Making the connection between personalized care and precision medicine

by Robert Wah, M.D. Over the past several weeks, my colleagues and I at DXC Technology have spoken about the landmark All of Us Research Program that will seek to gather samples from a million or more participants across a broad spectrum of the U.S. population. We’re very excited to be involved in this project, […]

Le SIAM, outil de gestion multifournisseur

young-professional-juggling

C’est le lot de toutes les équipes informatiques gérant plusieurs fournisseurs: un ticket passe, de fournisseur en fournisseur, avant qu’il ne tombe finalement entre de bonnes mains. Ce genre de situation irrite les utilisateurs et nuit à la crédibilité du département informatique en occasionnant des retards inutiles. Que diriez-vous d’une solution de gestion de services […]

Cómo administrar múltiples proveedores de manera más efectiva, con SIAM

Esto es algo que cualquier grupo de TI, que maneja múltiples proveedores, ha experimentado alguna vez: una orden de servicio que pasa de proveedor en proveedor, tres o cuatro veces, antes de llegar finalmente al correcto. Este tipo de situaciones irrita a cualquier empleado y daña la credibilidad del departamento de TI, al causar retrasos […]