Explore Sand Hill Topics: CIO perspective

Author user photo

Did Open Source Software Fail Us?

Here are five steps to avoid risks and ensure open source does not fail your organization.

Author user photo

Who Has a Copy of Your Software?

What processes and procedures should companies have in place on what is being built or produced to protect against unauthorized source code access?

Author user photo

Cloud Privacy vs. Security: What’s the Difference?

Hackers will always find a way to keep pace with technological developments, but there are solutions to make sure business continues.

More Articles

News You Can Use

View recently published Q3 Cybersecurity Market Report. SandHill sponsors Security Software section.

Click here for news about:

  • Internet of Things Framework introduced
  • EY & Hortonworks form big data relationship; Datapipe & DataStax partnering
  • DigiCert enterprise & IoT security certificates