246 Results for:LLP
- Sort by:
Supply chain software poses security risks
08 Jan 2019Poor internal security procedures and a lack of compliance protocols -- especially for small suppliers -- can introduce cybersecurity threats into global supply chains. Read More
Democratization of AI, 5G nets among top 2019 opportunities
07 Jan 2019Channel partners may find opportunities in artificial intelligence, 5G networks and the rise of enterprise 3D printing as 2019 unfolds, according to a Deloitte report. Read More
MSPAlliance insurance to protect providers against claims
16 Mar 2018A revised MSPAlliance insurance program aims to shield managed services and cloud computing providers from claims stemming from the EU GDPR regulation. Read More
How and why data breach lawsuits are settled
12 Nov 2019For all of the talk about data breach class action lawsuits, virtually none of them reach a courtroom. Here's why and how data breach lawsuits almost always end in settlements. Read More
Google's Edge TPU breaks model inferencing out of the cloud
31 Jul 2018Google's Edge TPU is a force multiplier to compete against the likes of Amazon, IBM and Microsoft, and to attract next-gen app developers. Read More
Financial tools for business breathe life into transaction data
01 Nov 2019No longer limited to simply crunching numbers, today's financial technologies can transform customer transaction data into improved operations, product development, CXs and ROIs. Read More
Leak confirms CEO dumped Intel shares after Meltdown and Spectre processor flaw
26 Jan 2018Leaked document show that Intel’s CEO sold his shares the very day the company told hardware makers of its processor flaw Read More
Box mobile app faces security concerns, feature gaps
31 Aug 2018Box has made strides with its mobile apps, but organizations still have concerns about file sharing on mobile and look for a few feature gaps to be filled in. Read More
The Security Interviews: How Crest is remaking the future of consultancy
17 Aug 2020Crest president Ian Glover taught himself cyber security while working on government computing systems in the 1970s and 1980s. Now he is on a decade-spanning mission to change security consultancy models Read More