Generic filters

Cloud Computing

Agents of Transformation 2022

When we conducted our first Agents of Transformation report, it was impossible to imagine the extent to which the world would change in the next four years. The way we live, work, and consume is forever transformed, and the pandemic has elevated the status of technology leaders within their organizations. Digital transformation is blurring the …

Agents of Transformation 2022 Read More »

A maturing DevSecOps landscape

For the fourth year in a row, we asked DevOps teams to tell the truth about their practices and processes, their challenges and their careers. With a global pandemic swirling, we were surprised when nearly 4,300 people took time to do just that this past February. We were even more surprised by the results. This …

A maturing DevSecOps landscape Read More »

The cloud imperative for mining

Executive Summary – The cloud imperative for mining The mining industry has envisioned a future where business, human and environmental interests are not competing priorities, but complementary strengths: a “Triple Zero” future of zero harm, zero loss and zero waste. In this Triple Zero future, where zero harm is lived out day-to-day, the health and …

The cloud imperative for mining Read More »

Anatomy of a Cloud Assessment and Authorisation

Introduction Cloud computing offers a range of potential cyber security benefits for Cloud Consumers to leverage, providing access to advanced security technologies, shared responsibilities, fine-grained access management, comprehensive monitoring and highly redundant geographically dispersed cloud services. For many organisations, cloud computing can provide significant improvements to their cyber security, mitigating the risk of many current …

Anatomy of a Cloud Assessment and Authorisation Read More »

2019 Cloud Security Report

Check Point® Software Technologies Ltd. and Cybersecurity Insiders have released the results of a global Cloud Security Report highlighting the challenges faced by enterprise security operations teams in protecting their public cloud data, systems, and services.