IDC PlanScape: Privacy Engineering “Meeting privacy expectations of management and stakeholders requires a cross-functional approach with contributions from business leaders, privacy professionals, technologists, and …Continue reading →
February 8, 2021
IDC PlanScape: Privacy Engineering “Meeting privacy expectations of management and stakeholders requires a cross-functional approach with contributions from business leaders, privacy professionals, technologists, and …Continue reading →
Lessons Learned from Six Major Data Breaches “Every security breach that we read about in the news provides us with an opportunity to reflect upon the root …Continue reading →
IDC PlanScape: Building an Analytics Center of Excellence “Analytics centers of excellence serve as the nucleus of an organization’s data transformation efforts,” says Mike Chapple, adjunct analyst with …Continue reading →
Five Ways to Modernize Digital Certificate Management “Digital certificates aren’t the most exciting issue in IT, and they’re not top of mind for most senior IT leaders …Continue reading →
Designing a Risk Management Strategy for SaaS Solutions “Organizations are adopting cloud technology as a routine business practice. SaaS vendors offer compelling business cases for reducing cost, increasing …Continue reading →
IDC PlanScape: Threat Intelligence Solutions TAGS: threat intelligence “Threat intelligence is a foundational component of a modern cybersecurity program,” says Mike Chapple, adjunct analyst with IDC’s IT Executive …Continue reading →
The CIO’s Playbook: Preparing for Data Breach Notifications TAGS: data breach | incident handling | incident response “The days and hours immediately after a data breach are critical,” said Mike Chapple, adjunct research analyst with IDC’s IT …Continue reading →
IDC’s Worldwide Digital Transformation Use Case Taxonomy, 2019: Higher Education “To continue to be relevant to society and to students, all institutions face the need to transform their academic capabilities …Continue reading →
Security Automation: Eight Things You Can Do Now for Security at Scale TAGS: security automation “Automation plays an increasingly important role in cybersecurity programs,” said Mike Chapple, adjunct research analyst at IDC’s IT Executive Programs. “Automation serves …Continue reading →
IDC PlanScape: Launching a Bug Bounty Program TAGS: bug bounty “Bug bounty programs incentivize security researchers to test your systems for weaknesses and then provide you with an opportunity to fix the …Continue reading →