Search for:
The End of Agile – Part 2 (Critiques of Agile)
In the first article, I laid out the basic premise for this series: an examination of how Agile has gone from the darling of the application development community to a virtual pariah that nobody wants to be associated with, and an exploration of the very important question of what we should replace it with. We […]


Read More
Author: Larry Burns

The Rise of Zero-Trust Architecture
The cybersecurity landscape in 2024 is marked by complex, multi-faceted threats, necessitating advanced defensive strategies. This complexity arises from the expansive use of digital technologies and the corresponding increase in attack vectors. This evolution demands a nuanced understanding of threat patterns and the adoption of more sophisticated defense mechanisms. The focus now is not just […]


Read More
Author: Ben Herzberg

Self-Service Data Access Best Practices
Today’s digital realm increasingly emphasizes the value of self-service data access. Firms are recognizing its potential to empower users and accelerate decision-making processes. However, with this rapid shift towards democratized data access come challenges that organizations need to address. One central conundrum confronts businesses: How can they provide expansive data access while ensuring that information […]


Read More
Author: Ben Herzberg

How to Maximize Multi-Cloud Data Governance
The transition from hybrid to multi-cloud environments is more than just a buzzword: It’s a fundamental shift in how organizations manage and utilize their data. As these complex architectures evolve, the importance of robust multi-cloud data governance cannot be overstated. This article aims to provide an in-depth analysis, tips, and best practices for maximizing data […]


Read More
Author: Ben Herzberg

Unique Threat Landscape of Digital Divide
Rural areas worldwide are disconnected in a landscape that nearly requires the internet to work or socially interact. But eventually, the entire planet will have equal, high-speed internet access. Neglecting the digital divide and broadband gap will cause cybersecurity concerns for communities entering the digital era. Regions new to the internet are more vulnerable. Therefore, […]


Read More
Author: Ellie Gabel

Best Practices for Migrating Applications to the Cloud
It is no secret that cloud migration and transformation helps your business attain desired growth, cost savings, agility, and profitability. With these, your team is able address customer needs faster, monitor app performance, and scale applications according to demand. App migration can be time-consuming, and you cannot afford to mess with the process. And a […]


Read More
Author: Rebecca Grey

Protect Data Without a Password
In an increasingly interconnected world, cybersecurity is of the utmost importance for many businesses. In fact, poor security isn’t just a hit to your reputation, it can also be expensive. Businesses of all sizes are looking for ways to mitigate these costs and prepare for cyberattacks. Password-less authentication is one such approach businesses are taking […]


Read More
Author: Ainsley Lawrence

Most Common Types of Data Breaches
A company that manages data must be always cautious against the potential of data breaches. There are several types of breaches, ranging from a simple human error to large-scale attacks by hostile actors, but any data exposure can have major ramifications for organisations. They are also quite prevalent, with 39% of UK businesses reporting a […]


Read More
Author: Stuart Snape