This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Shifts in CTO Responsibilities Over Time The ChiefTechnologyOfficer (CTO) role has evolved dramatically over the past few decades, driven by rapid technological advancements and shifting business landscapes. They help propel organizations toward achieving their digital transformation objectives.
Technology investments, such as in generative AI, are a priority in addressing the need to meet rising expectations while also driving operational agility and resilience. Double down on cybersecurity In 2025, there will be an even greater need for CIOs to fully understand the current cybersecurity threat landscape.
By Leonard Kleinman, Field ChiefTechnologyOfficer (CTO) ) Cortex for Palo Alto Networks JAPAC Many things challenge how we practice cybersecurity these days. Let’s look at some of these cybersecurity challenges and how automation can level the playing field.
By staying ahead of market trends, the organization remains agile, adaptable, and ready to outperform rivals. Step 3: Current state analysis of IT IT landscape assessment IT leaders must evaluate their current technologies, processes, and capabilities.
As a result, for IT consultants, keeping the pulse of the technology market is essential. Being a successful IT consultant requires knowing how to walk in the shoes of your IT clients and their business leaders, says Scott Buchholz,CTO of the government and public services sector practice at consulting firm Deloitte.
Security was another constant challenge. In response, traders formed alliances, hired guards and even developed new paths to bypass high-risk areas just as modern enterprises must invest in cybersecurity strategies, encryption and redundancy to protect their valuable data from breaches and cyberattacks.
Security weaknesses arise Security and risk vulnerabilities are important signs that modernization is immediately necessary. He notes that recent surveys by Gartner and Forrester show that over 50% of organizations cite security and efficiency as their main reasons for modernizing their legacy systems and data applications.
This practical understanding of technology enables businesses to make informed decisions, balancing the potential benefits of innovation with the realities of implementation and scalability. Adopting agile methodologies for flexibility and adaptation The Greek philosopher Heraclitus famously stated, “Change is the only constant.”
Moreover, undertaking digital transformation and technology modernization programs without an architect can lead to delays, technical debt , higher costs, and security vulnerabilities. What agile leadership looks like Redefining how architects collaborate with agile teams is one way to improve business-IT collaboration and outcomes.
Regardless of the driver of transformation, your companys culture, leadership, and operating practices must continuously improve to meet the demands of a globally competitive, faster-paced, and technology-enabled world with increasing security and other operational risks.
Such a cryptographically relevant quantum computer (CRQC) could deliver a devastating impact to global cybersecurity protocols. To prepare for this worst-case scenario, Mastercard launched its Quantum Security and Communications project, which earned the company a 2023 US CIO 100 Award for IT innovation and leadership.
Cybersecurity continues to be a major area for investment among businesses — and VCs. While a decline from the previous year, venture capital funding in the cybersecurity sector totaled $18.5 PitchBook data shows a decline in cybersecurity valuations at the seed and Series A stages in particular.
In one case, this oversight led to a fragmented IT landscape and security vulnerabilities.” The CIO is really worried about cybersecurity and the risk of data exfiltration,” says Fernandes. By providing worthwhile tools, the IT department allows the business to respond to opportunities quickly, while at the same time mitigating risk.”
Data architecture principles According to David Mariani , founder and CTO of semantic layer platform AtScale, six principles form the foundation of modern data architecture: View data as a shared asset. Ensure security and access controls. Optimize data flows for agility. Choose the right tools and technologies.
Dun and Bradstreet has been using AI and ML for years, and that includes gen AI, says Michael Manos, the companys CTO. And a Red Hat survey of IT managers in several European countries and the UAE found that 71% reported a shortage of AI skills, making it the most significant skill gap today, ahead of cybersecurity, cloud, and Agile.
However, CIOs must still demonstrate measurable outcomes and communicate these imperatives to senior leadership to secure investment. According to Salesforces Perez, even though AI brings much opportunity, it also introduces complexity for CIOs, including security, governance, and compliance considerations.
There are trade-offs of consistency and maintainability versus agility that need to be carefully decided upon. Infrastructure architecture: Building the foundational layers of hardware, networking and cloud resources that support the entire technology ecosystem. compromising quality, structure, integrity, goals).
By Sean Duca, vice president and regional chiefsecurityofficer for Asia Pacific and Japan at Palo Alto Networks Some economists predict that we could soon face a global recession. This can be a challenge to cyber budgets in organizations where security is viewed primarily as a cost center.
Seemplicity is a portmanteau of “see” and “simplicity”, and that is effectively what it is doing: helping DevOps and SecOps teams see a more complete picture of the state of an organization’s security, by simplifying how to view it. S Capital led its seed round.
A key way to facilitate alignment is to become agile enough to stay ahead of the curve, and be adaptive to change, Bragg advises. IT leaders also need to be agile enough to drive and support change, communicate effectively, and be transparent about current projects and initiatives.
The challenges don’t end once those requirements are met, as the project teams need to secure executive buy-in, which may be hindered by resistance to new technologies. A cloud-first approach ensures better data security, compliance with regulations, and scalability for AI-driven innovation,” says Domingues.
To speed up development and deployment, many organizations have turned to continuous integration and continuous delivery (CI/CD) solutions for more automated and agile software testing, building, and deploying processes. Speed is great, but not when it comes at the expense of security.
By Andy Nallappan, ChiefTechnologyOfficer and Head of Software Business Operations, Broadcom Software. Broadcom Software CTO Andy Nallappan. Embraced transformative DevOps practices to increase agility and software quality through automation of workflows. Broadcom Software.
As Jyothirlatha, CTO of Godrej Capital tells us, Being a pandemic-born NBFC (non-banking financial company), a technology-first approach helps us drive business growth. Since technology evolves rapidly, ensuring seamless adoption while keeping business teams aligned requires continuous change management.
Ivneet Kaur, ChiefTechnologyOfficer at Silicon Valley Bank, joins host Maryfran Johnson for this CIO Leadership Live interview, jointly produced by CIO.com and the CIO Executive Council. Watch this episode: Listen to this episode: CIO, CIO Leadership Live
To become a software-powered organisation, companies must first identify and address the concerns of its developers in areas such as developer experience, developer velocity and software security. OSS improves developer satisfaction by addressing concerns specific to the business and technology environments developers operate in.
Having celebrated its 100th anniversary last year, Canadian Tire has had to perform some deft manoeuvring in the last couple of years to become more agile. And with his dual titles at the company—CIO and CTO—Rex Lee is in the driver’s seat to support digital transformation and implement shared knowledge across teams and management.
IT leaders should be under-hypers rather than over-hypers, and promote technology only in the context of business cases. According to Ron Guerrier, CTO of Save the Children Foundation, one way of helping business leaders learn whats really possible is to recommend books to read on AI.
Security operations teams face a daunting task these days, fending off malicious hackers and their increasingly sophisticated approaches to cracking into networks. That also represents a gap in the market: building tools to help those security teams do their jobs. It’s time for security teams to embrace security data lakes.
SwipeGuide ChiefTechnologyOfficer Sue Li has worked in the tech industry for over a decade, with a degree in educational technology and instructional design from Harvard University’s Technology, Innovation, and Education programme for her master’s degree.
Dealing with the scale that the internet can deliver, has unfortunately left us with a series of other non-optimal cyber security approaches and solutions. In cybersecurity we’re have a hard time dealing with scale. Out of all the problems to deal with subverting bureaucracy to enable security scaling is the hardest.
The Wall Street Journal reported that Coca-Cola has named Alan Boehme as CTO: Mr. Boehme has led Coke’s enterprise architecture, innovation and emerging technologies for the past four years. If you look at what the challenges are in corporations today; it’s agility, speed to market,” he said at the time.
Few would swap sunny San Francisco and the innovation of Silicon Valley for a train ticketing company serving disgruntled UK commuters, but try telling that to Trainline CTO, Milena Nikolic. I had been at Google for so long that I stopped counting,” she says.
But in addition to embracing change, IT leaders need to develop a multifaceted approach to navigating current technology and business challenges, says Sanjay Srivastava, chief digital strategist at Genpact. “IT Technology staff, he argues, need to be empowered to advance and refine their skills to succeed with emerging technology.
More than ever, we have to be agile and be unafraid of waste. Security — on a budget Security is a challenge that makes the list of top CIO worries perennially, but Grant McCormick, CIO of cybersecurity company Exabeam, notes a rising need for increased collaboration between IT and security teams to address the issue.
Subhamoy Chakraborti, ChiefTechnologyOfficer of ABP Private Limited, spearheads the technological advancements under his ambit in the media house, which publishes two daily newspapers, five magazines, several digital channels and portals, runs e-commerce platforms, school admission-related portals and a radio enterprise.
Israeli security startup Cycode , which specializes in helping enterprises secure their DevOps pipelines and prevent code tampering, today announced that it has raised a $20 million Series A funding round led by Insight Partners. “Cycode secures CI/CD pipelines in an elegant, developer-centric manner. .
We spoke to: Patrick Jean , CTO, OutSystems. Patrick Jean, CTO, OutSystems. As CTO of a low-code platform that pioneered this category 20 years ago, everything I do relates to low-code and how the tool can help business leaders and developers build the serious applications they require. Deb Gildersleeve , CIO, Quickbase.
Today, Stackery is announcing enhanced security and continuous integration and delivery (CI/CD) capabilities that enable teams to automate delivery best practices from laptop to production. The Speed of Serverless with Enterprise Security and Governance. However, the remaining 60% reported security as a barrier to adoption.
When it came to cybersecurity projects, Daniel Uzupis could always count on executive and board support during his tenure as CIO at Jefferson County Health Center in Fairfield, Iowa. Any cybersecurity initiative I wanted to do, they didn’t argue with it; they always did it,” Uzupis says. 9, with 47% involved in such).
By Andy Nallappan, ChiefTechnologyOfficer and Head of Software Business Operations, Broadcom Software The informationtechnology that enables scientific and commercial breakthroughs, from precision medicine to digital transformation, demonstrates tech’s boundless potential to improve our world.
Double-down on cybersecurity We are in a cybersecurity pandemic right now, warns Juan Orlandini, CTO for North America at solutions and systems integrator Insight Enterprises. Work toward having the right cybersecurity team in place, Orlandini advises. Assume that attacks are inevitable.”
Driven by the development community’s desire for more capabilities and controls when deploying applications, DevOps gained momentum in 2011 in the enterprise with a positive outlook from Gartner and in 2015 when the Scaled Agile Framework (SAFe) incorporated DevOps.
In a recent global survey , 86% of participants said their organizations had dedicated budget to generative AI, but three-quarters admitted to significant concerns about data privacy and security. What makes AI responsible and trustworthy? At the top of the list of trust requirements is that AI must do no harm.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content