
Grace Wainaina
Privacy Compliance ExpertThe journey of AI from an experimental phase to its current widespread use in enterprises brings an urgent need for robust governance frameworks. As AI continues to integrate into business operations, the risks—both reputational and financial—intensify, making the establishment of effective governance vital. Learning from the governance approaches
In the past few years, the Asia-Pacific (APAC) region has reported a significant shift toward integrating security-first strategies within enterprise digital transformation efforts. This trend was evident at the recent Check Point Software’s CPX 2025 APAC conference in Bangkok, where industry leaders from various sectors discussed their approaches
In an era where enterprises face unprecedented challenges with data management and AI implementation, the strategic integration of Reltio and Alation marks a significant leap forward. Reltio, renowned for its AI-powered data unification and management, joins forces with Alation, known for its Agentic Platform, to deliver a robust solution aimed at
Bedrock Security has unveiled its groundbreaking metadata lake technology, significantly enhancing data security for enterprises. This innovative approach acts as a centralized repository, integral to the patented Bedrock Platform, and focuses on improving continuous visibility across enterprise metadata. The technology automatically catalogs
The rising investment in artificial intelligence (AI) technologies by healthcare organizations aims to revolutionize clinical workflows, decision support, and research and development (R&D). However, the bedrock of these advancements is effective data governance, an often underappreciated component. Merging AI innovations with healthcare requires
Cybersecurity within the healthcare industry faces significant challenges. The adoption of electronic health records (EHRs), connected medical devices, and cloud-based systems has transformed patient care but also expanded the attack surface for cybercriminals. This expanded exposure necessitates a proactive, comprehensive cybersecurity strategy