Author user photo

Detecting Open Source Security Vulnerabilities with Managed Open Source Governance

Lacey Thoms, Marketing Specialist - Protecode

Here is helpful information for when your company encounters open source security vulnerabilities in your code.

Author user photo

Cloud Privacy vs. Security: What’s the Difference?

Pejman Roshan, VP, Product Management - ShoreTel

Hackers will always find a way to keep pace with technological developments, but there are solutions to make sure business continues.

Author user photo

Closing the Human Behavior Gap in IT Security Monitoring

Gaby Friedlander, Co-Founder and CTO - ObserveIT

User activity monitoring software provides protection from threats that come from within an organization and contracted vendors with malevolent intentions.

Author user photo

The New Odd Couple: Five Steps to Ensure Internal Zen with CMO and CIO

Kim DeCarlis, Chief Marketing Officer - BMC

In a typical enterprise organization, the CIO and CMO live at opposite ends of the spectrum, but this is changing. Here’s advice for achieving a complementary and mutually beneficial relationship.

Author user photo

Four Keys to Disruptive Innovation in the $3 Trillion Market for Enterprise Technology

Kathleen Goolsby, Managing Editor - SandHill.com

It’s difficult for software startups and established companies to upend market leaders. Here are the essential components enabling one company to succeed with disruptive innovation.