Displaying 1 - 9 of 818 search results
For many organizations, IT security operations are characterized by reactive, “best efforts” postures. However, the increasing frequency, scope, and stakes
Download
IT is increasingly becoming both usage and service-based, driven by trends to deliver software, infrastructure, and platforms as a service.
Download
In today’s fast-paced and disruptive business technology world, maintaining bulletproof internal enterprise security has become the ultimate business goal of
Download
From my decades-long perch as an observer of leading edge technology (no kidding – I used to write a column
Note: This blog is the eighth in a monthly co-authored series written by Charlotte O’Donnelly, Research Analyst at Blue Hill Research, and
DoubleCheck Software presents GRC Implementation Success, a guest blog series by Blue Hill Research Principal Analyst David Houlihan. This series
DoubleCheck Software presents GRC Implementation Success, a guest blog series by Blue Hill Research Principal Analyst David Houlihan. This series
DoubleCheck Software presents GRC Implementation Success, a guest blog series by Blue Hill Research Principal Analyst David Houlihan. This series
Artificial Intelligence (AI) in a data environment holds great promise. The vendor marketing message is seductive: “We use advanced technology
Download
Displaying 1 - 9 of 818 search results