eWEEK EDITORS

About

eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.

Data Sharing Made Easy: The New Era of Data Monetization

As enterprises embrace accelerated digital transformation, new ways of sharing data across organizations without compromising privacy have emerged. As enterprises continue to embrace accelerated technology transformation in response to the disruption presented by COVID-19, some have emerged as digital vanguards, finding new and creative ways to put emerging tech to work. At the center of […]

Cybersecurity: Winning the Battle Starts with the Front Lines

According to the Verizon 2021 Data Breach Investigations Report (DBIR), a total of 5,258 verified data breaches happened in 16 industries and four distinct world regions. That’s a significant increase from the 3,950 confirmed breaches from the 2020 DBIR. The report also found that 86% of the breaches were profit driven. Threats are continuing to […]

Activating Unused Data: 3 Key Points

Enterprises across industries collect data from nearly everything. Potentially, every checkout machine, car door, connected coffee mug, or dishwasher has sensors that generate data continuously. These insights have the potential to transform supply chains, enable safe self-driving cars, or inspire life-changing consumer products and services. While enterprises have every reason to use data to benefit […]

Leading Enterprise IT Vendors 2022

Enterprise IT is a thriving market, remarkably so. All of its various sectors, from software to services to hardware, are growing rapidly. To spotlight one hot market among the several: a Statista report projects that spending in the enterprise software market will hit $237 billion in 2022 and grow to $347 billion by 2027. This year’s […]

Security Startups Focus on 3 Key Areas

The RSA Conference is the industry’s biggest cybersecurity show, and it hosts the premier startup competition, Innovation Sandbox. In the competition, 10 entrepreneurs pitch their startups to a panel of investors and industry luminaries. Forecasters and early adopters take note: For over a decade, this competition has produced major brands like Cylance, SentinelOne, Cybereason, and […]

The Role of AI Ethics in Network Monitoring

According to the Pew Research Center, 68% of technology innovators, developers and business leaders expect that ethical principles focused on the public good will continue to be overlooked in most artificial intelligence systems through 2030. As AI works to match human capabilities, a primary concern is that it could potentially outpace our ability to control […]

Enterprise Tech Lock-In: 3 Traps to Avoid

In a recent earnings call, Jamie Dimon, the CEO of JPMorgan Chase, made a very curious concession when asked about the bank’s ambitions to modernize its infrastructure: “If we can spend $2 billion more and get to the cloud tomorrow, I would do that in a second.” How could an organization – known for an […]

4 Challenges of the SOC: How Decision Intelligence Can Help

Networks and the valuable data they hold are under attack as never before. That’s bad timing for today’s digital organizations, as they continue to struggle to find anyone with cybersecurity skills, much less the experience and qualifications they truly need to fill their roles. Too many alerts and repetitive tasks done by too few people […]

It’s Time to Rethink Breach Management

Security breaches and breakdowns have become an unfortunate fact of life. With the average cost of a security breach reaching $4.24 million, it’s critical to find ways to automate detection and ratchet up protection. What’s more, any breach detection and remediation framework must support a growing array of regulatory obligations, such as GDPR, CCPA, HIPAA, […]

3 Ways to Build AI Video Applications for Driver Safety

The use of a monitoring video feed has helped to identify potential safety risks on our roads. But it’s usually a reactive tool that is used primarily to train employees after a potentially dangerous situation occurs, rather than avoiding issues in the moment. Country roads, busy intersections, and fast-moving interstates are high-risk work environments that […]