Enterprise IT

INSIGHTS

Pentagon Cloud Procurement, Deux

The awards to four tech companies have sequential contract numbers, so the $9 billion bandied in the press really looks like $36 billion.

Most contractors the Department of Defense hired in the last five years failed to meet the required minimum cybersecurity standards, posing a significant risk to U.S. national security.

Running a business without some cloud support is a rarity these days. Still, when formulating a cloud strategy, companies seem to make some common mistakes. Here are several of them.

Among the many challenges retailers face, customer-related concerns appear to be the most pressing. The best way forward for retailers is to focus on integration and automation.

Unlike most of the world, an online retail business never sleeps, which means that the systems powering an online retailer's critical operations can never sleep either. If the organization wants to sell products and meet the needs of customers on a 24-by-7 basis, it's going to need a way to ensure t...

Sens. Gary Peters, D-Mich., and Rob Portman, R-Ohio, introduced the legislation that seeks to address open source software risks in government. The proposed Bill, S. 4913, now awaits action by the Committee on Homeland Security and Governmental Affairs.

In today’s world, security isn’t something that businesses can overlook, neglect, or simply outsource. It’s time for founders to step up and start taking ownership of their company’s security.

The supply chain debacle and the rising costs of everything have forced consumers to make critical choices in how they spend their rapidly disappearing dollars. Retailers can no longer rely on personalization strategies alone to win over or retain loyal customers.

If you’re looking for the best digital quality of life in the world, Denmark appears to be the place to go. South Korea finished second in the overall rankings, although it captured the top spot in internet quality and both broadband and mobile speed growth.

Companies have a long road ahead to protect privileged identities and access, despite corporate leaders’ good intentions. Less than half of the organizations surveyed by Delinea have implemented ongoing security policies and processes for privileged access management.

Scalable cloud-based solutions are widely popular among IT pros these days. The cost, convenience, and reliability of ready-to-use software as a service make this disruptive technology a favorable choice. Still, Paul Evans, CEO at Redstor, a data management provider headquartered in the U.K., sugges...

By continually crawling a website and acting like an actual user, an automated CSP approach can effectively evaluate scripts, data and what they’re doing — all before it’s too late.

New research from Atlas VPN shows that cloud-native exploits on major cloud service providers (CSPs) declined during the first four months of 2022. Cloud-native exploits dropped by 25%, from 71 exploits in the first four months of 2021 to 53 exploits in the first four months of this year, Atlas rese...

Not every industry has kept up with the evolution of cloud technologies brought forth by digital transformation. A prime example is the real estate industry. Overall, the real estate sector has been slow to digitize operations and move to the cloud; leaving agents, brokers and their clients underser...

E-Commerce Times Channels