Steven Sim has more than 25 years’ experience in cybersecurity with large end-user enterprises and critical infrastructure. He has undertaken a global CISO role…
Evaluating
-
-
LinuxNetwork SecurityNewsOperating SystemPC & LaptopServerSoftware
Evaluating the relative cost of edge computing
Edge computing is a distributed computing paradigm that includes infrastructure and applications outside of centralized, dedicated, and cloud datacenters located as close as necessary…
-
A CISO presented with a key analytic shortcoming during an intrusion event may be more likely to overlook data quality or ethical issues in…
-
A few years ago, I failed to ask the right questions when purchasing a vehicle that boasted “full self-driving.” Today, that car still does…
-
Today’s security teams are under enormous pressure. Organizations continue to embrace digital transformation initiatives, expanding the digital attack surface that security teams are responsible…
-
LinuxNetwork SecurityNewsOperating SystemPC & LaptopServerSoftware
3 benefits of engaging hyperscalers when evaluating SAP RISE
Since SAP RISE came to the market, it seems that SAP’s goal is to force organizations into a relatively unproven and inflexible RISE model.…
- 1
- 2