Remove topic hardware
article thumbnail

The Hybrid Cloud Forecast: A podcast with IBM Fellows

IBM Big Data Hub

A rotating cast of IBM Fellows Initially, I thought of putting together a list of relevant topics and then find guests who could join me on episodes to dive deeper into each one. However, I quickly found that it was much easier to make a list of guests to invite and let each of them bring their own perspective on the topic.

Cloud 99
article thumbnail

GUEST ESSAY: Making the case for leveraging automation to eradicate cybersecurity burnout

The Last Watchdog

Every automation tool is like an added employee , strengthening SOCs and empowering individual analysts to find more valuable ways to employ their expertise or receive additional training on more complex topics. Install software and hardware updates to minimize vulnerabilities. Classify threat data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IBM Mainframe Skills Council brings the global community together to grow mainframe talent

IBM Big Data Hub

The survey covered several topics, including but not limited to talent acquisition, curriculum and development skills offerings, as well as priority areas of focus for students studying mainframe. IBM also introduced new strategies and technologies to address the number of specialized skills required: Simplification. Standardization.

article thumbnail

New York Becomes First State to Require CLE in Cybersecurity, Privacy and Data Protection

Hunton Privacy

Ethics-related cybersecurity, privacy and data protection credits must relate to lawyers’ ethical obligations and professional responsibilities regarding the protection of electronic data and communications, and may include, among other topics: sources of attorneys’ ethical obligations and professional responsibilities and their application to electronic (..)

article thumbnail

GUEST ESSAY: Cyber insurance 101 — for any business operating in today’s digital environment

The Last Watchdog

For instance, cyber insurance will not pay for additional software or hardware you buy after experiencing hacking. She’s been writing about tech-focused topics and trends since 2014. What’s not covered As with regular insurance policies, there are some things that most cyber insurance policies do not cover.

Insurance 222
article thumbnail

Global October Cybersecurity Events: Where You Can Find Thales

Thales Cloud Protection & Licensing

it-sa Expo&Congress in Nuremberg covers the entire range of products and services in the field of cybersecurity: hardware, software, training and consulting services, as well as Security as a Service. it-sa Expo&Congress, 25-27 October, Nuremberg, Germany. Use it when you register here.

article thumbnail

Visiting the NSA

Schneier on Security

Those first two topics are ones that I am thinking and writing about, and it was good to hear their perspective. It was all interesting.