The Centaur Enterprise: Human-Agent Teams, Real Context, and the New Architecture of Trust
The centaur, in chess, is the human-machine team that consistently outperforms either alone. Not because the machine got smarter, but
Continue readingTechnology Marketing
The centaur, in chess, is the human-machine team that consistently outperforms either alone. Not because the machine got smarter, but
Continue readingOperational technology, information systems, and artificial intelligence, once distinct pillars, are now converging into a unified, intelligent architecture that is
Continue readingSecurity information and event management (SIEM) and security orchestration, automation, and response (SOAR) are two long-standing, critical technologies that play
Continue readingPicture a major government agency responsible for overseeing several major health insurance programs that service over a hundred million customers
Continue readingCybersecurity is arguably the most challenging and dynamic domain within the technology sector; core drivers include accelerating threats that are
Continue readingDark Data. Sounds kind of cool/scary, but what is it? And why should you care? Short version? It’s the data
Continue readingThe ability to quickly detect and remediate threats has become the primary challenge across the substantial global technology ecosystem. To
Continue readingChief Information Security Officers (CISOs) play a pivotal role in piloting their organizations through an increasingly sophisticated array of threats.
Continue readingSecurity teams have long relied on traditional SIEM (security information and event management) solutions as a core element of their
Continue readingCybercrime has unfortunately become deeply embedded in the current technology landscape. Every single day another enterprise or government entity executes
Continue readingThe development and implementation of robust threat models are the cornerstone of proactive defense strategies. Traditionally, this process has been
Continue readingSecurity has always been a top-line consideration for every enterprise, and given the direction in which the world seems headed,
Continue readingFor many years, IT’s job in terms of managing endpoint risk was complicated but straightforward; ensure any endpoint device (primarily
Continue readingIT assets have historically been categorized as hardware – old school hardware (PCs, servers, etc.). That definition has been evolving
Continue readingEndless complexity and the role of IT The management of mobile devices has become far more complex due to variables
Continue readingHow Enterprise Technology Management helps you dominate the “new normal” Managing information technology assets (ITAM) as a discipline has been
Continue readingEvery business runs on workflows. Whether you process mortgages, manufacture machinery, provide health care, or nearly anything, your business output
Continue readingDot 1: IT Asset Management as a discipline has been around for quite a while. As an industry trend it is
Continue readingIn the last blog post, we talked about best practices for dealing with a shifting workforce as the entire economy
Continue readingThe speed and breadth of the Coronavirus pandemic have caught pretty much everyone off guard. The result across both the
Continue reading