Connect | Engage | Share

Social Media

Facebook

Twitter

Blog

RSS Latest Blogs

  • Miss the “C” Word and be doomed May 26, 2017
    Secure SDLC in the PCI DSS Ver 3.2 Ambit: “Compliance Management ( the “C” Word) I recently attended a conference where a discussion started on how the PCI DSS Standard meshed into the Software Development Life Cycle (SDLC) / process. The scope of the discussion was restricted in a broad way to any application that […]
  • WannaLaugh? Bolster your security program in under a dozen steps May 23, 2017
    Nothing provides better security than a fresh pair of eyes. In a military operation, it is rare to have the same sentry defend a specific military post forever. It’s the same with cyber security – you need to diversify your security providers to minimize the overall risk to your organization. A leading cause of security […]
  • WannaCry Attack Advisory: How to Prevent the Ransomware from Spreading May 15, 2017
    The post WannaCry Attack Advisory: How to Prevent the Ransomware from Spreading appeared first on Persistent.
  • Manufacturing IoT: Unleashing the Full Potential for Lean Manufacturing May 4, 2017
    The post Manufacturing IoT: Unleashing the Full Potential for Lean Manufacturing appeared first on Persistent.
  • The New Acid Database Properties for Big Data April 25, 2017
    The post The New Acid Database Properties for Big Data appeared first on Persistent.
  • The Re-born Identity April 24, 2017
    One of the goals of digital transformation is making huge amounts of data from across the enterprise available to lots of people across multiple devices, in an easy to view and intuitive format. From smart city portals to healthcare apps, from digital banking to employee engagement, digital transformation suddenly unleashes enormous opportunities of seamless access […]
  • GDPR: The Power To Control Your Own Personal Data April 21, 2017
    One of the complaints people sometimes have about regulations is that they get in the way of doing business, even when those regulations are meant to put more power in the hands of government to protect the general public. It’s not often (enough) that regulations literally put that power in the hands of consumers themselves. […]
  • Are you talking to me? April 19, 2017
    I wonder what our parents would make of today’s workplace. They find it hard to believe the hours we now work, which is partly driven by the accessibility of phones and being online. Gone is the nine to five day you left behind when you left the office, five days a week. But when you […]
  • Threat Detection: “These Are Dark Times, There Is No Denying.” April 15, 2017
    The post Threat Detection: “These Are Dark Times, There Is No Denying.” appeared first on Persistent.
Persistent Systems Contact