The U.S. labor shortage has stubbornly persisted, with tech being one of the most affected industries. This is not necessarily due simply to the lack of candidates but to the lack of highly skilled candidates. As demand for cloud services grows, finding certified cloud-native engineers to support this demand continues to be challenging for some of […]
What Technologies Should I Include in My Digital Transformation Strategy?
If your enterprise is about to undertake a digital transformation (Dx) project, you should understand that these initiatives require a focus on more than the technology itself. To succeed with a digital transformation strategy, the business must focus on business processes, day-to-day activities and tasks, and the culture within the organization, so that the environment […]
Automated Vulnerability Detection: Mitigate Fraud and Strengthen Your Cybersecurity Defense
Cyberattacks are now a severe threat to organizations leveraging cutting-edge technology in the digital-first world. Whether phishing or malware attacks, cybercriminals increasingly exploit sensitive business information and customer identities. And what’s more worrisome is that the conventional cybersecurity architecture seems impotent against advanced attacks, since attackers are finding new ways to breach a network. Hence, there’s […]
Testing and Monitoring Data Pipelines: Part One
Suppose you’re in charge of maintaining a large set of data pipelines from cloud storage or streaming data into a data warehouse. How can you ensure that your data meets expectations after every transformation? That’s where data quality testing comes in. Data testing uses a set of rules to check if the data conforms to […]
How Kubernetes Can Help You Weather Regional Disaster Recovery
If you’re lucky, you’ve only had to worry about managing a data disaster recovery effort once or twice in your career, if at all. However, as the rate and number of natural disasters have increased, the chances of needing to navigate through a worst-case scenario have risen. As of April 11, 2023, the U.S. had […]
Why Traditional Threat Prevention Is Insufficient for Insider Threats
Security teams can be so focused on blocking cyberattacks from external actors that they forget the potential threats within their organizations. Verizon reports that insider threats cause almost 20% of all breaches. Insider threats are difficult to defend against using traditional threat prevention measures because insiders inherently require elevated trust and access to get their jobs done. […]
Cloud Architecture Mistakes: The Perils of Poor Security Architecture
In this five-part series, I’m taking a hard look at the common – and costly – mistakes organizations typically make while building a cloud architecture. Part one explained how organizations can quickly lose visibility and control over their data processing, and detailed how to avoid that mistake. Part two looked at why a DIY approach often goes wrong, […]
Why Data Privacy, Data Security, and Data Protection Go Hand in Hand
Here’s an important truth: There is no data privacy without data protection. Consumers and companies place their trust in the organizations they do business with and trust that their sensitive data will be kept private. These same organizations want to protect consumer and partner data, to preserve their brand as a trustworthy partner, grow revenues, […]
Controlling SAP HANA Data Sprawl
Enterprises running large SAP HANA instances in the cloud are seeing a new challenge appear as their databases continue to grow. Since SAP HANA has a simplified data layout and structure compared to a more complex legacy database, it was assumed this would result in less data sprawl and duplication. But does the data stay […]
Multi-Cloud in the World of AI
ChatGPT has emerged as a groundbreaking innovation, taking the collective imagination of technologists by storm, and promising to revolutionize how humans and machines interact. Companies and developers worldwide are harnessing the power of ChatGPT. Many applications are in heavy development, and it has quickly become an essential component of the artificial intelligence (AI) ecosystem. The […]