Remove topics security-insights
article thumbnail

Course Enterprise Architecture – Step 1 – Strategy

Xebia

architecture #enterprisearchitecture #masterofscience Enterprise Architecture – Step 1 – Strategy Enterprise Architecture as a topic is evolving and gaining in interest at various organizations in the Netherlands and abroad. are breaking down this topic. Please feel free to provide feedback, so that we can learn.

Course 130
article thumbnail

Cybersecurity Snapshot: Get the Latest on Deepfake Threats, Open Source Risks, AI System Security and Ransomware Gangs

Tenable

Tasked with securing your org’s new AI systems? Plus, open source security experts huddled at a conference this week – find out what they talked about. That’s the topic of the paper “ Securing AI: Similar or Different? Check out a new Google paper with tips and best practices. And much more!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Do You Have An Enterprise Data Strategy?

Perficient

Key topics of this data strategy include: What data should be ingested, acquired, managed, exported, archived, and deleted? A data management strategy is the strong foundation needed for consistent business insights, constant cost savings, new revenue generation, and accelerated business growth. How should data be structured?

Strategy 115
article thumbnail

Handling personal identifiable information in your data

Xebia

In one of my previous blog posts we discussed a number of data and security-related topics. One of the topics that were discussed was about handling personal identifiable information (PII) data and complying with regulations like GDPR. It has a couple of features that help you improve your security and privacy.

Data 130
article thumbnail

How To Secure Your IT, OT and IoT Assets With an Exposure Management Platform: Complete Visibility with Asset Inventory and Discovery

Tenable

Visibility serves as the cornerstone of security, offering organizations the means to monitor, analyze, and safeguard their digital infrastructure effectively. Moreover, real-time visibility enables security teams to proactively mitigate threats before they can escalate into a full-blown crisis.

IoT 70
article thumbnail

How to Analyze Your Code for Security Vulnerabilities

DevOps.com

PDT on June 22nd-23rd that dives deep into application security in the modern tech space. Security experts share insights on topics ranging from how to measure AppSec success to what role AppSec plays in digital transformation. Software developers, security […].

How To 137
article thumbnail

Cybersecurity Snapshot: A Look Back at Key 2023 Cyber Data for GenAI, Cloud Security, Vulnerability Management, OT, Cyber Regulations and more

Tenable

Learn how the cyber world changed in areas including artificial intelligence, CNAPP, IAM security, government oversight and OT security. As we bid adieu to 2023, we highlight major trends that impacted cybersecurity professionals in the past 12 months. In short, the optimism over AI’s promise for cyber defense was palpable this year.