101,451 Results for:
- Sort by:
CASB vs. CSPM vs. CWPP: Comparing cloud security tool types
17 Jun 2024Let's break down some cloud security alphabet soup. CASB, CSPM and CWPP overlap to an extent, but you'll want to pay close attention to how they accomplish different things. Read More
5 SharePoint migration tools to consider
17 Jun 2024Moving years' worth of SharePoint data out of on-premises storage to the cloud can be daunting, so choosing the correct migration tool is an essential first step. Read More
Mueller: Clean core is the 'right way' for SAP cloud migration
17 Jun 2024In this Q&A, SAP CTO Juergen Mueller explains why a clean core is critical for moving to S/4HANA cloud and how the enterprise architect can help customers get there. Read More
Post-lawsuit, Splunk and Cribl meet again in data pipelines
17 Jun 2024Weeks after a jury awarded Splunk $1 in its lawsuit against Cribl, the two vendors remain on a collision course, this time in the realm of data pipelines and federated analytics. Read More
An explanation of TCP/IP
17 Jun 2024These fundamental protocols make transferring data easier by focusing on both communication and transportation through different mediums. Read More
How deepfakes threaten biometric security controls
17 Jun 2024Biometric security controls are under attack by deepfakes -- convincing images, videos and audio created by generative AI. But all is not lost. Learn how to mitigate the risk. Read More
Why and how to manage microservices without API gateways
17 Jun 2024Managing microservices without API gateways might be uncommon, but not unheard of. Consider the benefits, downsides and available auxiliary tools before taking an alternate approach. Read More
The importance of Scrum masters
17 Jun 2024Learn about guiding questions and leadership skills to strive for success in a project management company in this video. Read More
Open source security's systemic challenges
17 Jun 2024In this installment of 'IT Ops Query,' Emily Fox talks about how reevaluating 50-year-old open source security practices could lead the community somewhere new. Read More
Alex Stamos on how to break the cycle of security mistakes
17 Jun 2024In an interview, SentinelOne's Alex Stamos discussed the importance of security by design and why it needs to be applied to emerging technologies, including generative AI. Read More