Can Apache Druid cast a spell on your data?

Can Apache Druid cast a spell on your data?

One of the downsides of companies gathering vast volumes of data is making sense of what it is and what it can do for you. Part of the problem is knowing...
Pega World 19 PW19 (c) 2019 S Brooks

No RPA is a silver bullet

At Pegaworld, Enterprise Times spoke to Melissa Harris, IT delivery director at Unum. Harris was tasked with deploying, or rather re-deploying RPA at the benefits provider Unum. She selected Pega for...
Why are IT and users still disconnected over security?

Why are IT and users still disconnected over security?

NTT Security recently published its Risk:Value 2019 report. It is the most extensive survey the company has conducted and, importantly, it focused on users not on the IT department. The goal...
Mihoko Matsubara talks about Cyber Security strategy at NTT 

Mihoko Matsubara talks about Cyber Security strategy at NTT

A cyber security strategy has to encompass the entire company. For many businesses, it is a fragmented set of policies, procedures and approaches that are inconsistent across the company. It is...
Pega World 19 PW19 (c) 2019 S Brooks

Why is empathic explainable AI so important ?

Peter van der Putten is the Director of Decisioning Systems at Pegasystems. Enterprise Times spoke to him during the PegaWorld conference where the company had announced the opening up of its...
Rene Bader talks code security and testing

Rene Bader talks code security and testing

Penetration testing, ethical hacking and writing secure code are not new concepts, they've been around for decades. Despite this, the rate at which code vulnerabilities are reported continues to increase. Enterprise...
MSS should be a partnership

MSS should be a partnership

The Managed Security Services (MSS) market has seen significant growth over the last few years. As organisations struggle to find, retain and even afford cyber security staff, MSS providers are facing...
Cyber security gulf grows between business and IT

Cyber security gulf grows between business and IT

NTT Security has released its fifth annual Risk:Value report. The report focused on people outside of the IT function in order to understand how the business viewed cyber security. The results...
How SNIA is using Open Source to speed up storage standards

How SNIA is using Open Source to speed up storage standards

Developing a storage standard has always been a long, arduous and contentious process. It is the same for most standards. However, with the speed that technology is changing, that approach is no...
Clouds Salesforce Image credit Pixabay/kalhh

Understanding Salesforce Einstein

There are several flavours of Salesforce Einstein and this podcast aims to demystify the different aspects of the Salesforce AI platform. Enterprise Times spoke to Julien Sauvage, Director of Product Marketing for...

LATEST NEWS

New phishing campaign targets Utilities industry with Adwind

New phishing campaign targets Utilities industry with Adwind

Cofense researcher Milo Salvia has published a new blog warning of a phishing campaign delivering the Adwind malware. The campaign is targeting companies within...
Commerzbank

Commerzbank blockchain developments

Two blockchain developments involving Commerzbank have materialised. The first involves logistics/supply chains, Marco Polo and others. They executed a real-time pilot transaction for the...
Ransomware hits 23 local government entities in Texas

Ransomware hits 23 local government entities in Texas

Ransomware has hit 23 local government entities in Texas. The details of the attack emerged via a post from the Texas Department of Information...
British SailGP boat - Image credit (c) 2019 Bob Martin for SailGP

Applying innovation lessons from SailGP to business

Enterprise Times sat down with John Abel, VP Cloud and Innovation for UK, Ireland and Israel at Oracle on the eve of the Cowes...
Alfa

Alfa blockchain social network/digital sharing launched on Indiegogo

Alfa app and smartwatch intend to foster freedom to create and transact, reward users for their time, protect their privacy, and respect the chronological...
CalGovOps

State of California formalises interest in blockchain

California Government Operations Agency Secretary Marybel Batjer has selected Camille Crittenden, Executive Director of the Center for Information Technology Research in the Interest of...
Two ducks - image credit: unsplash.com-Amir-Abbas Abdolali

Duplication in PowerPoint

How many times do you create a pretty box or object in PowerPoint and need to have exactly the same again and again and...
PTT

Standard Chartered executes Letter of Credit on Voltron blockchain

Standard Chartered Bank has announced the successful execution of a pilot transaction for PTT Group (PTT International Trading Pte Ltd) and IRPC Public Company...
Image by Arek Socha from Pixabay

Considerations when selecting a PSA solution

Enterprise Times sat down with Kevin Roberts, Product Evangelist at Kimble Applications. Roberts joined Kimble recently having spent several years at a competitor. The...
Jenkins World / DevOps World 2019

It’s time for software delivery to be a core business process

As Jenkins turns 15, Enterprise Times caught up with Sacha Labourey, CEO, Cloudbees at Jenkins World / DevOps World to talk about the companies...

Advanced obtains funds for growth

Advanced has announced that Vista Equity partners has sold a share of Advanced to BC Partners. Vista acquired Advanced in 2015 for £750 million....
NTT Security does threat intelligence deal with Europol

NTT Security does threat intelligence deal with Europol

NTT Security has signed a Memorandum of Understanding (MoU) with Europol's European Cybercrime Centre (EC3). The deal sees the two organisations share threat intelligence....
Finboot

Finboot secures Repsol investment after blockchain PoC

Finboot will supply Repsol with its blockchain technology solution BlockLabs after a successful blockchain Proof of Concept (PoC) conducted with the Spanish energy company....
Threat hunting, attribution and identifying what motives threat actors

Threat hunting, attribution and identifying what motives threat actors

Jaime Blasco is the AVP Product Development at Alien Labs, part of AT&T Cybersecurity. At Black Hat 2019, Jaime sat down with Enterprise Times...