Fulfilling the IoT Promise—In the Cloud and at the Edge
August 28, 2025
Exploring the role of cloud and edge computing in unlocking the possibilities of the internet of things (IoT)
ArticlesSecurity and Governance Lag Behind AI Adoption, says IBM’s ‘Cost of a Data Breach Report’
August 25, 2025
Governance and security are playing catch-up as enterprises rush to leverage AI, a technology that is generating new attack vectors and changing what organizations must do to protect their data, according to IBM’s recently published “Cost of a Data Breach Report 2025.” The report is the result of research conducted by Ponemon Institute, which studied […]
E-BooksLofty Technologies: How the Cloud Is Helping Organizations Stay Ahead of the Technological Curve
July 14, 2025
E-Books
The Keys Are in the Cloud: Unlocking Cutting-Edge Technologies
July 7, 2025
How remote computing is unlocking cutting-edge technologies
E-BooksHow Hacking Got Easy
May 5, 2025
Technological advancements and new forms of criminal cooperation are giving cybersecurity professionals more to think about
Best Practices for Successful Hybrid Cloud Adoption
September 16, 2024
E-Books
How to Maximize Your Hybrid Cloud Strategy
September 9, 2024
IBM Consulting’s Aparna Sharma, Accenture’s Andy Tay and Wipfli’s Tom Wojcinski offer best practices for building a future-proof, scalable and secure hybrid cloud infrastructure
ArticlesIBM Introduces IBM LinuxONE 4 Express
February 20, 2024
On February 6, IBM announced the launch of IBM LinuxONE 4 Express, a new hybrid cloud and AI platform designed to seamlessly deliver cybersecurity, resilience, scalability and AI inferencing to hybrid cloud environments. IBM LinuxONE 4 Express: The Specs IBM LinuxONE 4 Express utilizes a pre-configured rack-mount system paired with an IBM Telum processor for […]
ArticlesCISOs: What’s at the Top of Your Cybersecurity List?
June 21, 2023
While the mainframe may be the most securable platform on the planet, it doesn’t come that way automatically. As the bad actors get smarter and threat vectors increase, the mainframe is at risk for data breaches and other incidents like any other server. Whenever my team and I carry out security assessments and penetration tests, […]
ArticlesDefining Data Security Posture Management
June 8, 2023
If you haven’t heard of data security posture management (DSPM) yet, it’s because it is an emerging security practice. Its aim is to help organizations ensure that their cloud security is as strong as their mainframe security by automatically detecting and protecting data—and doing this in a dynamically changing environment. What Is Data Security Posture […]