789 search results for “Security”

789 search results for “Security”

Blog Post

Extended Reality & Business: From Hype to Scaled Adoption

Linkedin According to Grand View Research’s “Extended Reality Market Size, Share & Trends Analysis Report,...January 19, 2026
Blog Post

What Are Critical Data Elements?

Linkedin I’ve found it interesting that many organizations consider Critical Data Elements (CDEs) as this...January 15, 2026
Blog Post

Gen AI in the Enterprise: Lessons from Regulated Industries

Linkedin Generative AI is gaining traction across industries, but in highly regulated sectors like financial...January 12, 2026
Blog Post

Data Governance and Business Continuity Planning

Linkedin A recent conversation about BCP was the impetus for this article. People often forget...January 8, 2026
Blog Post

Great IT Projects. Terrible Security Strategy. Here’s Why.

Linkedin Not long ago, I spoke with an IT Manager. A smart person with years...January 7, 2026
Blog Post

Why Conversation and Empathy Are Crucial in the Age of AI

Linkedin Dialogue as a Lifeline: From Bomb Games to Elder Care Late at night, in...January 5, 2026
Blog Post

Emerging Trends: Strategies for Success in Data Governance

Linkedin I am wrapping up a series on Emerging Trends in Data Governance. I’ve spent...January 1, 2026
Blog Post

Conquering MFA: How Playwright’s Built-In Storage State Revolutionizes Multi-Factor Authentication Testing

Linkedin Breaking the MFA Testing Barrier with Zero External Dependencies Multi-Factor Authentication has become the...December 30, 2025
Blog Post

Executive Summit ’25 – Autopilot in Healthcare and life sciences by Joost Fledderus

Linkedin With the calm precision of a scientist, Dr. Joost Fledderus—biologist at Utrecht University—took the...December 26, 2025
Blog Post

Emerging Trends: Cloud Native Compliance Monitoring

Linkedin I am writing a series on Emerging Trends in Data Governance. I will be...December 25, 2025
Load more
Show 10/789