101,451 Results for:

  • Sort by: 

CASB vs. CSPM vs. CWPP: Comparing cloud security tool types

By Amy Larsen DeCarlo 17 Jun 2024

Let's break down some cloud security alphabet soup. CASB, CSPM and CWPP overlap to an extent, but you'll want to pay close attention to how they accomplish different things. Read More

5 SharePoint migration tools to consider

By Jordan Jones, Scott Robinson 17 Jun 2024

Moving years' worth of SharePoint data out of on-premises storage to the cloud can be daunting, so choosing the correct migration tool is an essential first step. Read More

Mueller: Clean core is the 'right way' for SAP cloud migration

By Jim O'Donnell 17 Jun 2024

In this Q&A, SAP CTO Juergen Mueller explains why a clean core is critical for moving to S/4HANA cloud and how the enterprise architect can help customers get there. Read More

Post-lawsuit, Splunk and Cribl meet again in data pipelines

By Beth Pariseau 17 Jun 2024

Weeks after a jury awarded Splunk $1 in its lawsuit against Cribl, the two vendors remain on a collision course, this time in the realm of data pipelines and federated analytics. Read More

An explanation of TCP/IP

By Samantha Poutre 17 Jun 2024

These fundamental protocols make transferring data easier by focusing on both communication and transportation through different mediums. Read More

How deepfakes threaten biometric security controls

By Jerald Murphy 17 Jun 2024

Biometric security controls are under attack by deepfakes -- convincing images, videos and audio created by generative AI. But all is not lost. Learn how to mitigate the risk. Read More

Why and how to manage microservices without API gateways

By Chris Tozzi 17 Jun 2024

Managing microservices without API gateways might be uncommon, but not unheard of. Consider the benefits, downsides and available auxiliary tools before taking an alternate approach. Read More

The importance of Scrum masters

By Samantha Poutre 17 Jun 2024

Learn about guiding questions and leadership skills to strive for success in a project management company in this video. Read More

Open source security's systemic challenges

By Nicole Laskowski, Beth Pariseau 17 Jun 2024

In this installment of 'IT Ops Query,' Emily Fox talks about how reevaluating 50-year-old open source security practices could lead the community somewhere new. Read More

Alex Stamos on how to break the cycle of security mistakes

By Alexander Culafi 17 Jun 2024

In an interview, SentinelOne's Alex Stamos discussed the importance of security by design and why it needs to be applied to emerging technologies, including generative AI. Read More