CybersecuritySecurity Developing a Security Function During a CISO’s First 100 Days Ryan EdisonDavid JacobsJanuary 10, 2024
CISO Next A CISO’s First 100 Days (Part 3): Learning is the Smartest Quick Win Nick PuetzRon KuriscakJoseph BurkardMay 31, 2022
CISO Next A CISO’s First 100 Days (Part 2): Why Organizations Replace Their CISO . . . And Why It Matters Nick PuetzRon KuriscakJoseph BurkardMay 17, 2022
CISO Next A CISO’s First 100 Days: Finding Champions and Building Relationships Nick PuetzRon KuriscakJoseph BurkardMay 3, 2022
CybersecurityEmerging Technologies Getting Ready for Post-Quantum Cryptography with . . . PCI 4.0? Konstantinos KaragiannisDaniel BaronJanuary 16, 2024
Cybersecurity Funding Cyber Protection: A Closer Look at State and Local Grant Programs Michael PorierJune 21, 2023
CybersecurityPrivacy California Attorney General to Investigate Mobile Applications Menma UcheJulia AngelsFebruary 22, 2023
Manufacturing and DistributionSAP How SAP Central Finance Benefits Manufacturers Sheeraz IqbalFebruary 1, 2023
ApplicationsSAP 5 Considerations to Improve SAP S/4HANA Embedded Analytics Reporting Eric WojcikOctober 20, 2021
CloudCybersecuritySecurity The 4 As of Cloud Identity Management Ashraf MotiwalaJeff SteadmanJuly 19, 2021