ChannelLife UK - Industry insider news for technology resellers

Opinion stories - Page 96

Gettyimages 1250474241

Why selective data transformation is the best way to transition to S/4HANA

Mon, 5th Jul 2021
#
sap
#
opinion
#
sap s/4hana
Ineffective migrations can significantly impact business success, particularly if there are delays resulting from the transition to SAP S/4HANA.
Gettyimages 1160790409

Five best practices to improve threat report action & analysis

Fri, 2nd Jul 2021
#
breach prevention
#
cybersecurity
#
fireeye
While many organisations use a TIP to make data actionable for detection and protection, far fewer use a TIP for forensics.
Gettyimages 1203522802

How businesses can take advantage of intelligent process automation

Wed, 30th Jun 2021
#
data analytics
#
martech
#
planning
Of all the changes brought about by the COVID-19 pandemic, one of the most far-reaching has been a reworking of core business processes.
Gettyimages 1061357610

Are you GDPR compliant?

Wed, 30th Jun 2021
#
risk & compliance
#
data privacy
#
tanium
While the GDPR is established in the European Union, businesses of all sizes across the globe need to comply if they meet certain criteria.
Cybersecurity29

Ignorance is bliss — for hackers

Wed, 30th Jun 2021
#
cybersecurity
#
microsoft
#
solarwinds
Failure to employ best-of-breed security practices may result in a very uncomfortable talk with CEOs and boards of directors.
Gettyimages 1255349939

ETL vs ELT — What, when and why

Tue, 29th Jun 2021
#
data warehousing
#
data lake
#
opinion
There are many variables to consider when deciding to move data into a database with either the ETL or ELT method, writes SnapLogic CTO Craig Stewart.
Gettyimages 1165555958

Rethinking endpoint management in the post-BYOD workplace

Thu, 24th Jun 2021
#
endpoint protection
#
breach prevention
#
edr
Endpoint Privilege Management (EPM) can keep exploits confined to users' devices and control employee access to sensitive applications.
Archtis ceo daniel lai 1 a

Trust no one: Recalibrating security to address insider threats

Tue, 22nd Jun 2021
#
malware
#
zero trust security
#
cybersecurity
The high profile cases of Edward Snowden and Chelsea Manning also provide an enduring yet often overlooked lesson about insider attacks.
Gettyimages 1174870740

Automation – A shield against disruption

Fri, 18th Jun 2021
#
dr
#
it automation
#
cloud services
Amid the COVID-19 pandemic, 48% of IT leaders accelerated automation to cut costs, boost customer satisfaction, and drive productivity, reports SnapLogic.
Cybersecurity breach2

Why zero trust must form a key pillar of any cybersecurity strategy

Wed, 16th Jun 2021
#
malware
#
vpns
#
mfa
Zero trust streamlines that access while strengthening security protections. For this reason, it should form an essential pillar of any cybersecurity strategy.
Data protection

Six key characteristics of a modern ZTNA solution

Tue, 15th Jun 2021
#
malware
#
firewalls
#
network security
Not all zero trust network access solutions are equal. Organisations should keep in mind these six key characteristics when evaluating ZTNA solutions.
Gettyimages 854524798

How organisations can protect their print privacy in a digital world

Fri, 11th Jun 2021
#
data privacy
#
cybersecurity
#
printing
Learning how to better protect the data used and stored by organisations' print systems is in their best interests for the company's future success.
Gettyimages 1221083511

What to consider when considering an integrated cloud application

Thu, 10th Jun 2021
#
digital transformation
#
supply chain
#
empired
Failing to account for these five key focus areas can jeopardise the success of a cloud migration — and the organisation as a whole.
Cloud security4

DDoS attack report finds attack volumes up dramatically

Wed, 2nd Jun 2021
#
ddos
#
cybersecurity
#
healthtech
The DDoS attack report analyses attack activity by industries, attack vectors, DDoS attacks on applications and on-premise versus cloud.
Cloud security17

How should cloud-centric organisations prioritise data protection?

Tue, 1st Jun 2021
#
malware
#
iaas
#
casb
Organisations can embrace digital transformation with confidence by including these critical considerations in data protection strategy planning and execution.
Cyber protection1

How to build resilience through the cloud in a post-pandemic world

Wed, 26th May 2021
#
ddos
#
breach prevention
#
gigamon
Modern cloud architectures are moving from monolithic, tiered models to distributed microservices-based architectures, writes Gigamon CTO Shehzad Merchant.
Ai2

Four things organisations must consider when testing AI

Thu, 13th May 2021
#
devops
#
apm
#
ai
Decision-makers and IT leaders must consider the role MLOps will play in their business, writes Micro Focus business consultant Matthew Bertram.
Gettyimages 1223952490

Standardisation versus specialisation: transforming the way business integrates data

Thu, 13th May 2021
#
opinion
#
snaplogic
#
cloud migration
Enterprises now have a vast amount of choice in terms of cloud platforms. But should they take a standardised approach to adoption, or a specialised one?.
Gettyimages 1185282377

The challenge of ensuring effective protection against DNS attacks

Wed, 5th May 2021
#
ddos
#
ndr
#
cybersecurity
The ways in which bad actors can use DNS to mount attacks are numerous. Here are some of the most popular ones.
Cyber protection1

Why DevSecOps must strive for effective enforcement measures

Tue, 4th May 2021
#
devops
#
application security
#
multi-cloud
Threats to applications go beyond exploiting code and logic vulnerabilities which are already more than enough to analyse and cope with.