Search
789 search results for “Security”
789 search results for “Security”
Blog Post
Extended Reality & Business: From Hype to Scaled Adoption
Linkedin According to Grand View Research’s “Extended Reality Market Size, Share & Trends Analysis Report,...January 19, 2026Blog Post
What Are Critical Data Elements?
Linkedin I’ve found it interesting that many organizations consider Critical Data Elements (CDEs) as this...January 15, 2026Blog Post
Gen AI in the Enterprise: Lessons from Regulated Industries
Linkedin Generative AI is gaining traction across industries, but in highly regulated sectors like financial...January 12, 2026Blog Post
Data Governance and Business Continuity Planning
Linkedin A recent conversation about BCP was the impetus for this article. People often forget...January 8, 2026Blog Post
Great IT Projects. Terrible Security Strategy. Here’s Why.
Linkedin Not long ago, I spoke with an IT Manager. A smart person with years...January 7, 2026Blog Post
Why Conversation and Empathy Are Crucial in the Age of AI
Linkedin Dialogue as a Lifeline: From Bomb Games to Elder Care Late at night, in...January 5, 2026Blog Post
Emerging Trends: Strategies for Success in Data Governance
Linkedin I am wrapping up a series on Emerging Trends in Data Governance. I’ve spent...January 1, 2026Blog Post
Conquering MFA: How Playwright’s Built-In Storage State Revolutionizes Multi-Factor Authentication Testing
Linkedin Breaking the MFA Testing Barrier with Zero External Dependencies Multi-Factor Authentication has become the...December 30, 2025Blog Post
Executive Summit ’25 – Autopilot in Healthcare and life sciences by Joost Fledderus
Linkedin With the calm precision of a scientist, Dr. Joost Fledderus—biologist at Utrecht University—took the...December 26, 2025Blog Post
Emerging Trends: Cloud Native Compliance Monitoring
Linkedin I am writing a series on Emerging Trends in Data Governance. I will be...December 25, 2025
Load more