Tracy Burrows
ITWeb contributor.
Tracy Burrows is ITWeb contributor.
Incident response as important as prevention in mitigating cyber risk
Arctic Wolf webinar highlights the importance of incident response planning for business resilience.
Exec forum on 28 November: Discover the right way to automate your business
A free-to-attend Intelligent Process Automation breakfast event will be hosted by iOCO and Kofax in partnership with ITWeb.
Scalable, automated IT stack helps overcome modern business challenges
Companies held back by cumbersome legacy infrastructure cannot achieve scalability and agility, says Dimension Data.
Building cyber resilience to recover quickly, at scale
Cyber resilience incorporates data security, data protection and data governance, according to Veritas.
Data protection weak spots businesses must address
Many companies are not gathering, storing or managing sensitive data adequately, says Canon South Africa.
Building trust into generative AI will revolutionise BI
Controls, governance and trust need to be built into generative AI, according to Keyrus and Tableau.
Platform-driven next gen networking as a service underpins future proof business
AI-driven next-gen networking can improve network uptime and business productivityrief.
The pitfalls of miscalculating enterprise storage needs
Companies must assess their storage requirements, perform diligent research and testing, involve key stakeholders and select a solution that aligns with their goals and IT strategy, says Sanette Wehmeyer, sales executive at InfoTech.
Cloud security challenges drive need for strategic CSPM
Security in the cloud has become too complex to manage with a tactical approach.
More advocacy, mentorship needed to close ICT gender gap
More efforts needed to foster a supportive environment for women to flourish in the ICT industry, as highlighted by speakers at a WIOCC/OADC round table.
Transparency in tech spend turns costs into strategic assets
CFOs must have complete visibility into IT spend, according to MagicOrange.
Phishing just keeps getting better
Cyber attackers are harnessing generative AI, automation and more sophisticated strategies.