Year: 2020

48_2

Worried about SaaS misconfigurations? Check these 5 settings

Businesses rely on SaaS applications for countless features, such as collaboration, marketing, file sharing, and more. But, problematically, they often lack the resources to configure those applications to prevent cyberattacks, data exfiltration, and other risks.

51_2

Security Breach due to lack of skills

The gap due to lack of skills and talent in cybersecurity continues to grow.
A study by ESG and the Information Systems Security Association (ISSA) highlights that 70% of companies are affected by this lack of resources.

50_2

Implementing a Cloud Security Strategy

As the pandemic continues to force organizations to shift to work-from-home setup, more companies are coming to terms with the fact that changes are needed in continuity, security, and mobility.

49_2

Performance Testing and Vulnerability Analysis: Keys to Security and Cost-Effectiveness

In this digital era accompanied by contingency scenarios, we know of several cases in which the privacy and confidentiality of organizations have been violated by cyber means. Which has obviously caused damage to his image, as well as time and money. Hence, it is essential to have quality assurance measures in the services that provide profitability to the business guaranteeing its continuity.

52_2

AWS Well-Architected: Good Habits, Great Results

When your organization’s workloads move in the AWS cloud, performing well-architected on your infrastructure brings with it the identification of new opportunities.

54_2

The RPA effect in finance and accounting

Robots are not necessarily as they are painted. In the case of Robotic Process Automation (RPA) we are talking about software that allows human beings to put aside monotonous tasks and whose vulnerability causes loss of time and money, even more so when making mistakes. In other words, RPA bots turn the complex and delicate into something simple, safe and fast.

55_2

Repetitive tasks that lack value? Learn about the RPA effect on operations

Is fatigue inevitable due to errors caused by a high volume of operations? Is there not enough time to process all the data effectively?

56_2

Software Factory: We Make It Real

Without the necessary technology and sufficient technical skills, it is impossible to successfully complete a project. Much less so when you lack the right cloud services to make the most of its benefits.

57_2

Microsoft releases urgent Windows update

Microsoft released software updates on June 30 to patch two high-risk security vulnerabilities affecting users of Windows 10 and Server editions. Both flaws likely reside in the Windows Codec Library.

58_2

Optimal Performance with Atlassian Jira Service Desk

End-to-end collaboration is what sets a service desk that truly works. Atlassian provides tools to design and optimize solutions in a scalable and fast way. With the implementation and support of Itera, this platform reaches its highest potential. Precisely because collaborative coordination is what makes the difference in a Service Desk whose main focus is to provide value.