RedOwl: Providing Holistic Insights into Insider Threats
An Intellyx Brain Candy Brief Most organizations have historically focused their cybersecurity efforts on external threats. Increasingly, however, organizations are coming to terms with the fact that...
View ArticleBaffle: Making Application and Database Encryption Easy
An Intellyx Brain Candy Brief There is nothing worse than having a solution to a problem that people don’t know they have. That may be the classic definition of database encryption. The challenge is...
View ArticleFour Disruptive ‘Cyber Trends’ At RSA
As an industry analyst and Forbes contributor who writes about digital transformation, I am always looking for stories of disruption. Attending last week’s massive RSA cybersecurity conference gave me...
View ArticleTop 20 Social Influencers in DevOps 2017
Who are the most influential DevOps people in the Twittersphere? After analyzing thousands of accounts, we created a list of people that every DevOps enthusiast or pro should be following. All...
View ArticleDuo Security: Simple, Agentless ‘Trusted Access’ for Mobile Devices
An Intellyx Brain Candy Brief Duo Security provides software that confirms the identity of mobile users via strong multifactor authentication. In addition, Duo offers security ‘hygiene’: verifying the...
View ArticleFortanix: Using Intel SGX Secure Enclaves to Deliver Unprecedented Cybersecurity
An Intellyx Brain Candy Brief Since the 6th Generation Intel Core processor platform launched in 2015, Intel has offered a secure enclave as part of its processor. To aid vendors in taking advantage of...
View ArticleWhitewood: Quantum Random Number Generator for Better Cybersecurity
An Intellyx Brain Candy Brief Want a surefire way to win at the slots? Do what some enterprising Russian hackers are doing and leverage the fact that slot machines use pseudorandom numbers in order to...
View ArticleOwl Cybersecurity: Bringing Light to the Darknet for Enterprise Organizations
An Intellyx Brain Candy Brief Recently, the terms ‘the darknet’ and ’the dark web’ have captured the public imagination as stories of nefarious and illicit activities happening in the dark corners of...
View ArticleAccelerating digital transformation using the Medici Effect
King Abdullah University of Science and Technology’s global IT summit in Saudi Arabia presents a model for digital transformation The King Abdullah University of Science and Technology, known as...
View ArticleBreaking through the cybersecurity bubble
At the recent RSA cybersecurity conference, interoperability and cooperation were a common theme, but not everyone is taking it seriously For many in the cybersecurity space, the world revolves around...
View ArticleSURVEY CONFIRMS – SMES ARE LAGGING WITH DIGITAL TRANSFORMATION
By Mathias Tölken It is important to start with a mindset change and realise that the ultimate playing field for Digital Transformation will be in VP3 with CX & DCX. Before we get there, we also...
View ArticleAn Architectural Approach to Delivering Concurrent Digital Transformation and...
It is the era of Digital Enterprise. Beyond the obvious triggers for digital transformation, a merger also represents a unique opportunity. Organizations can re-imagine the manner in which they use...
View ArticleThe Black Hole in Digital Performance Management
For today’s enterprises, digital performance means far more than a snappy website and mobile apps. In reality, end-to-end performance is critical to keeping customers happy and, in turn, achieving the...
View ArticleHow to Properly Test and Debug COBOL Programs You’re Migrating
By Dave Kartzman and Bob Yee Automated unit testing makes it easier to deliver quality with velocity, as industry analyst Charles Araujo of Intellyx wrote in a recent report, which sheds light on the...
View ArticleAI, Cyber Kill Chain targeting among top security trends
By SmartBrief Increased targeting of links in the Cyber Kill Chain and more use of artificial intelligence are two major trends emerging from the recent RSA cybersecurity conference, writes Jason...
View ArticleWorkFusion: AI-Powered Automation for Enterprise Operations
An Intellyx Brain Candy Brief Artificial Intelligence (AI) is the hot buzzword in enterprise technology circles today, but for the disruptive vendors who are building AI-driven products, the focus is...
View ArticleWebinar: End-to-End, Real-Time Digital Transactions? Ignore the Middle at...
Thusday, April 13, 2017 8:30 PDT / 11:30 EDT From mobile banking to payment processing to managed file transfer—to name just a few common services—the digital transactions enabling them must flow...
View ArticleIntelligenza artificiale: da Wall Street alla rivoluzione del digital...
By Redazione BitMAT Questi esempi mostrano che l’intelligenza artificiale, il machine learning e gli algoritmi sono ormai una tecnologia collaudata che può essere utilizzata per analizzare (e reagire)...
View ArticleDigital Transformation Requires Enterprisewide Agile Transformation
In many corporate boardrooms, the word Agile conjures up images of small teams of hotshot software developers, iterating over their backlogs of requirements so rapidly they don’t have time to sit down...
View ArticleFinding Transformational Success by Ignoring Labels
She’s smart. He’s funny. They’re the ambitious ones. That company is an innovator. This technology is a game-changer. As humans, we love labels. Consciously and unconsciously, we slap them on...
View Article