Tag: FWR

Five worthy reads: Differential privacy—what it means for businesses

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we explore one of the evolving privacy-enhancing techniques called differential privacy and how it’s being leveraged by organizations to safeguard sensitive data from being exposed. By Abirami A Cutting-edge technologies based on artificial […]

Why implementing Zero Trust is more important than ever before

By Sree Ram Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore why organizations should implement Zero Trust in 2021. In 2010, John Kindervag introduced the concept of “Zero Trust” which has become a touchstone for cyber resilience and persistent security. […]

Five worthy reads: Is DataOps the next big value driver in the analytics ecosystem?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about DataOps, an interesting methodology that can help organizations fast-track their data analytics operations. By Monisha Ravi With the current data trend, there is an ever-increasing demand for data professionals to […]

Five worthy reads: The future of work in a post-COVID world

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the changing face of work in the wake of the COVID-19 pandemic and the vaccine roll out. Before 2020, the idea of entire organizations working from home would have seemed […]

Five worthy reads: Supply chain cyberwarfare

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we are exploring the concept of supply chain cybersecurity in a time when there is a rising number of third-party cyberattacks. The top-of-the-mind priority for cybersecurity stakeholders is to secure the organizations’ IT assets […]

Five worthy reads: Preparing an incident response plan for the pandemic and beyond

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With the rising concern over cyberattacks in the distributed workforce, this week we explore the concept of cybersecurity incident response during a pandemic. The new normal of a distributed workforce has given rise to advancements in […]

Five worthy reads: Leveraging IoT to target pain points in the healthcare industry

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. Most healthcare facilities already use the Internet of Things (I0T) to make their environment a more efficient and safer place, and this week, we show you how IoT is revolutionizing the healthcare industry. As the world’s […]

Five worthy reads: How should your business approach multi-cloud adoption?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the multi-cloud strategy, why you should consider it and how to implement it in your organization. Businesses are emphasizing remote work options, and workers are now accessing more applications and […]

Five worthy reads: XAI, a move from black to white

Five worthy reads reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the concept of XAI, Explainable AI. Have you ever wondered about the intricate logic behind sponsored content and recommendation systems found across social media and online retailer pages? With the significant […]