Blog

Filter Total registers 67

Year

  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019

Partners

  • Atlassian
  • AWS
  • IBM

Topics

  • Adware
  • Agility
  • AI
  • Alliances
  • Amazon Q
  • Analytic
  • Artificial intelligence
  • Atlassian
  • Automation
  • AWS
  • AWS Competency
  • AWS Identity
  • AWS Shield
  • Azure
  • Bitbucket
  • BLOG
  • Business Agility
  • Business Continuity
  • Business Strategy
  • Certifications
  • Cloud
  • Cloud Computing
  • Cloud Governance
  • Cloud Migration
  • Cloud Security
  • COBIT
  • confluence
  • Consulting
  • Customer Experience
  • Cybersecurity
  • Data analysis
  • Data Center
  • Data Driven
  • Data Modernization
  • Data Security
  • DevOps
  • finance
  • Financial
  • Gartner
  • Generative AI
  • Human resources
  • Infrastructure
  • Innovation
  • ISO
  • IT Trends
  • Itera Spain
  • Iterates
  • ITSM
  • Jira Bitbucket Vulnerability
  • Malware
  • Marketplace
  • Microsoft
  • MSP
  • Phishing
  • Picnic
  • Processes
  • Remote Work
  • Rovo
  • RPA
  • SaaS
  • Safety
  • Scrum
  • Sensedia
  • Server Support
  • Software
  • Software Development
  • TOGAF
  • Training
  • Trending
  • Vishing
  • VMWare
  • Well Architected
  • Well architected framework
  • Windows Server

Microsoft releases patches for vulnerabilities in Azure

Wiz discovered information about a set of vulnerabilities in Linux virtual machines in the Azure cloud. This occurred when using the proprietary agent functions of the Open Management Infrastructure (OMI) platform.

Companies believe they will suffer a breach in customer data next year

In the new digital era, cybersecurity and information security has become indispensable for various organizations such as private or public, every year more risks in information have increased, information theft, identity theft, bribery, viruses such as Ransomware, phishing, among others, we all know that security is very important today, but what you don't see and that can put you in a vulnerable situation is also a priority today.

Itera Achieves AWS Managed Service Provider Designation for the Third Consecutive Time

June 3, 2021 – ITERA, the leading Centric Cloud solutions company in Latin America, announces that for the third consecutive time it has exceeded the requirements to continue being part of the exclusive and strict Amazon Web Services (AWS) Managed Service Provider (MSP) Partner Program.

How can you improve the customer experience through a Smart Contact Center?

Endless waits and poor communication are things of the past. The satisfactory customer experience is obtained as new technologies are incorporated that do not only require traditional human intervention, interacting efficiently to reach the solution without delays through various means of access and communication.

Budget for cybersecurity in companies increases, despite cuts due to COVID-19

Cybersecurity continues to be a priority investment for companies. In Latin America, the share of IT security in the overall IT budget grew from 22% in 2019 to 30% in 2020 in SMBs and from 27% to 34% in larger companies. Likewise, 59% of organizations expect to increase their cybersecurity budget in the next three years.

Cyber Security: Whose responsibility is it?

These are issues related to security and shared compliance between AWS and the customer. This shared model can ease the operational burden on the customer, as AWS operates, manages, and controls the components of the host operating system and virtualization layer right down to the physical security of the premises in which the services operate.

Migrating Data to the Cloud with VMware Cloud on AWS

VMware and AWS provide organizations with a fast, easy, and cost-effective path to hybrid cloud while enabling customers to modernize applications with co-engineered solutions. Use your current governance, processes, and skills to deliver secure virtual desktops and applications with our virtual desktop infrastructure (VDI) solutions to enable your workforce to work securely from any location.

Worried about SaaS misconfigurations? Check these 5 settings

Businesses rely on SaaS applications for countless features, such as collaboration, marketing, file sharing, and more. But, problematically, they often lack the resources to configure those applications to prevent cyberattacks, data exfiltration, and other risks.