Women in Security 2022: Kimberly Cheatle, PepsiCo

Women in Security 2022: Kimberly Cheatle, PepsiCo

<!– Women in Security 2022: Kimberly Cheatle, PepsiCo | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Security’s 2022 Women in Security

Security’s 2022 Women in Security

<!– Security’s 2022 Women in Security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Women in Security 2022: Theresa Bentch, Garmin International

Women in Security 2022: Theresa Bentch, Garmin International

<!– Women in Security 2022: Theresa Bentch, Garmin International | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

IBM brings hybrid-cloud app services to z/OS mainframes

IBM brings hybrid-cloud app services to z/OS mainframes

IBM has introduced a service for its mainframe customers to create a cloud environment for developing and testing applications. Wazi as a Service can be used to create z/OS infrastructure instances for development and testing z/OS application components in a virtualized, containerized sandbox. The instances would run on Red Hat OpenShift on x86 hardware. The service also includes access to z/OS systems and integrates with modern source-code management platforms such as GitHub and GitLab. Wazi…

Read More

Why Zero Trust is Easier Said Than Done

Why Zero Trust is Easier Said Than Done

By John Vecchi, CMO, Anitian Zero trust security has made its way into the offerings of most enterprise security companies while becoming a critical and new modern architecture adopted by the Department of Defense (DoD) and the federal government. However, many organizations today have built their information security programs around more traditional security technologies and methodologies. Moving to — and modernizing for — zero trust security is not as simple as adopting a single point…

Read More

Green Tech that ‘Moves the Needle’ on Climate Change

Green Tech that ‘Moves the Needle’ on Climate Change

There’s still a sizable distance between sustainability sentiment and corporate action. Innovative green technology—including energy-efficient supercomputers, low-emissions datacenters, computational fluid dynamics simulations, and circular design—are helping to close that gap.  Consider the statistics. Two-thirds of executives surveyed in the Deloitte 2022 CxO Sustainability Report say they are “very concerned” about climate change, with 79% seeing the world at a tipping point—up from 59% in 2021. Though concern is trending upward, only 19% of those surveyed say they…

Read More

Using Terraform with multiple providers to deploy and configure VMware Cloud on AWS

Using Terraform with multiple providers to deploy and configure VMware Cloud on AWS

Terraform is fast emerging as a popular Infrastructure as Code (IaC) tool that lets you define cloud resources in human-readable configuration files that you can version, reuse, and share. You can then use a consistent workflow to provision and manage all of your infrastructure throughout its lifecycle. This blog post series is intended to be an update to the original VMware Cloud on AWS with Terraform blog post with the goal of providing an end-to-end…

Read More

Digital transformation never stops at IBM’s semiconductor plant in Québec

Digital transformation never stops at IBM’s semiconductor plant in Québec

Technological innovation is at the heart of IBM Bromont. Founded in 1972 to meet the needs of the Canadian computer market, the plant has evolved over the years to climb the hierarchy of the computer behemoth – setting itself apart from competitors who have fled North America to Asian countries in the last decades. Today, IBM assembles and tests its semiconductor solutions in the quaint town of Bromont, an hour from Montréal, and provides services…

Read More

À l’usine de semi-conducteurs d’IBM au Québec, la transformation numérique est permanente

À l’usine de semi-conducteurs d’IBM au Québec, la transformation numérique est permanente

L’innovation technologique est au cœur d’IBM Bromont. Fondée en 1972 pour répondre aux besoins du marché canadien en ordinateurs, l’usine a évolué au fil des ans pour grimper les échelons de la hiérarchie du colosse informatique – se démarquant de l’ensemble de ses concurrents qui ont tous fui l’Amérique du Nord vers l’Asie dans les dernières décennies. Aujourd’hui, c’est dans la coquette ville de Bromont, à une heure de Montréal, qu’IBM fait l’assemblage et les…

Read More

How traditional security tools fail to protect companies against ransomware

How traditional security tools fail to protect companies against ransomware

Most organizations surveyed by Titaniam have existing security prevention and backup tools, but almost 40% have still been hit by ransomware attacks in the last year. Credit: Adobe Traditional cybersecurity products were once enough to protect organizations against viruses and hacking attempts. But today’s cyber threats are more prevalent, more sophisticated and more destructive, requiring more robust security defenses. A report released Thursday by cybersecurity firm Titaniam looks at the inability of traditional security products…

Read More
1 2,881 2,882 2,883 2,884 2,885 4,082