Is your data ready for AI? How to prepare your organization for artificial intelligence deployments

Artificial intelligence (AI) is revolutionizing the way companies operate, make decisions and serve customers. But to effectively harness its potential, organizations must face a fundamental question: is the data they have at their disposal ready for AI? Together with Gimmal experts, we outline key principles for preparing data for AI deployments – compliant, secure and […]
Securing IT infrastructure in the financial sector using data diodes

Key findings: The data diode provides a one-way, physically forced flow of information, eliminating the risk of reverse attacks to critical IT systems. These devices significantly enhance network segmentation and are more effective than traditional firewalls or software solutions. In the financial industry, data diodes support secure backup, reporting to regulators and analysis in systems […]
Cybersecurity Hardware: Protecting physical devices and systems

Key findings: Hardware-based IT security offers tamper resistance, device-level encryption and secure booting, making it an essential part of any security strategy. Only a combination of hardware and software security provides effective, multi-layered protection against advanced cyber attacks. Devices such as HSMs, hardware firewalls and mobile media scanners effectively eliminate risks from physical access and […]
The Future of Information Management: 9 key trends for 2025 and beyond

In the digital age, where data is growing exponentially and regulations are changing dynamically, information governance is no longer a choice – it is becoming a necessity. In the face of technological change, hybrid work and regulatory pressure, organizations need to rethink their approach to Information Governance (IG) to not only protect data, but also […]
Information Governance vs. Information Security – what is the difference?

Information governance is the foundation of modern organizations. However, effectively using and protecting it requires an understanding of two key concepts that are often confused: Information Governance (IG) and Information Security (InfoSec). While the two areas are related, they serve different functions in a data management strategy. This article will help you understand what these […]
Stop with the data hoarding! Information retention and deletion as key to reducing risk

In a world overflowing with data, organizations are increasingly facing a serious problem: what to do with information that is no longer needed? Storing data “just in case” ceases to be a precaution – it becomes a business risk. In the era of new privacy regulations, such as GDPR and CCPA, the approach to data […]
Simply smarter notifications – New notification center in Checkmk 2.4

The new notification center in Checkmk 2.4 simplifies alert management, reduces errors and allows users to specify precisely who, when and how to be notified. With an intuitive interface and Guided Mode, even novice users are able to build effective notification rules in minutes. This is a huge step forward for any organization using monitoring. […]
Let’s Encrypt certificate monitoring with Checkmk – a complete solution for administrators

In a world where SSL certificates are expiring faster and faster, and automation is no longer a luxury, but a necessity – monitoring the status of Let’s Encrypt certificates is becoming crucial for any organization. While it may seem that a simple script would suffice for such a simple function, it is worth betting on […]
Construction Management Plan – how to develop an effective Construction Management Plan?

Successful execution of a construction project is not only a matter of the experience of the team, but above all a well thought-out plan of action. In a world where delays, material shortages and unforeseen situations are a daily occurrence, a well-prepared Construction Management Plan (CMP) is the foundation of a successful project. CMP is […]
What is a Construction Management Plan with ClickUP?

Table of contents What is a Construction Management Plan? Why create a construction management plan? What should a complete CMP contain? How to create a CMP in ClickUp? CMP implementation at a construction site – what does it look like in practice? Challenges and how to counter them Summary What is a Construction Management Plan? […]