This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Shifts in CTO Responsibilities Over Time The ChiefTechnologyOfficer (CTO) role has evolved dramatically over the past few decades, driven by rapid technological advancements and shifting business landscapes. They help propel organizations toward achieving their digital transformation objectives.
CTO and founder of Reposify , Yaron Tal is a tech entrepreneur and cybersecurity expert with nearly two decades of experience developing cybersecurity software solutions. The blanket warning is for all industries to take notice. Contributor. Share on Twitter. What do companies need to do?
As they embark on their AI journey, many people have discovered their data is garbage, says Eric Helmer, chieftechnologyofficer for software support company Rimini Street. The AI revolution is forcing a modernization of the data center across all industries, says Hardy.
With a cloud-powered digital core in place, organizations can unlock advanced intelligence, industry-specific cloud innovations, enterprise efficiency and agility, and integrate new technologies, such as AI-enabled decision-making, he says. Reinvention-ready companies are positioned to succeed in the long term, Tay observes.
It was an interesting case study of global cyber impact, says Charles Clancy, CTO at Mitre. What happened In CrowdStrikes own root cause analysis, the cybersecurity companys Falcon system deploys a sensor to user machines to monitor potential dangers. But then what endpoint detection and response platform should you use instead?
In an era where technology reshapes entire industries, I’ve had the privilege of leading Mastercard on an extraordinary journey. As more AI innovations come to market, financial institutions can leverage the technology for enhanced services, increased efficiency, and new ways to deliver and manage products.
Traditionally, cybersecurity has always focused on what can be hacked and not so much on who might be most at risk. Sunday Security , which is launching today and announcing a $4 million seed funding round, is trying to switch this up by offering cyber-risk protection for senior executives and other key personnel.
By Leonard Kleinman, Field ChiefTechnologyOfficer (CTO) ) Cortex for Palo Alto Networks JAPAC Many things challenge how we practice cybersecurity these days. Let’s look at some of these cybersecurity challenges and how automation can level the playing field.
Alan Radford is regional CTO of One Identity and has a passion for helping organizations solve unique challenges in the identity and access management space. Robotic process automation (RPA) is making a major impact across every industry. However, there’s one big issue that’s commonly overlooked when it comes to RPA — security.
As a result, for IT consultants, keeping the pulse of the technology market is essential. Being a successful IT consultant requires knowing how to walk in the shoes of your IT clients and their business leaders, says Scott Buchholz,CTO of the government and public services sector practice at consulting firm Deloitte.
Many large enterprises now rely on hundreds of third-party SaaS applications to do business, but their security organizations can barely keep pace. Right now, the state of the art for SaaS enterprise security are cloud access security brokers (CASBs) that act as intermediaries between users and the actual service.
Both types of gen AI have their benefits, says Ken Ringdahl, the companys CTO. The main commercial model, from OpenAI, was quicker and easier to deploy and more accurate right out of the box, but the open source alternatives offered security, flexibility, lower costs, and, with additional training, even better accuracy.
This process includes establishing core principles such as agility, scalability, security, and customer centricity. For example, a company aiming for market expansion might focus on developing scalable infrastructure, enabling application localization, and enhancing security measures to support operations in new regions.
The survey points to a fundamental misunderstanding among many business leaders regarding the data work needed to deploy most AI tools, says John Armstrong, CTO of Worldly, a supply chain sustainability data insights platform. Theres a perspective that well just throw a bunch of data at the AI, and itll solve all of our problems, he says.
Such a cryptographically relevant quantum computer (CRQC) could deliver a devastating impact to global cybersecurity protocols. To prepare for this worst-case scenario, Mastercard launched its Quantum Security and Communications project, which earned the company a 2023 US CIO 100 Award for IT innovation and leadership.
What is a CTO? The chieftechnologyofficer (CTO) is the senior executive who focuses on the technological requirements, opportunities, and challenges within an organization. What does a CTO do? What does a CTO do? Years ago, the CTO most often led the infrastructure function.
Cybersecurity continues to be a major area for investment among businesses — and VCs. While a decline from the previous year, venture capital funding in the cybersecurity sector totaled $18.5 PitchBook data shows a decline in cybersecurity valuations at the seed and Series A stages in particular.
As TechCrunch reported earlier today , Carta is suing its former CTO, Jerry Talton, who was fired “for cause” almost three weeks ago, on December 23, according to the company. ” Let’s see if the industry’s evolution, both with more competition and graveyard companies, is a dynamic that Carta can keep up with. .”
SecurityScorecard has been helping companies understand the security risk of its vendors since 2014 by providing each one with a letter grade based on a number of dimensions. “The idea that we started the company was a realization that when I was CISO and CTO I had no metrics at my disposal.
Now, cybersecurity startup Nudge Security is emerging from stealth to help organizations tackle what they think is the biggest cybersecurity weakness: people. As these big names demonstrate, these kinds of attacks can be hard for even the most well-resourced organizations to protect against.
A shift to small wins The cost issue, combined with huge pressure from CEOs and boards to deploy and create value from AI, puts CIOs and other IT leaders in a difficult position, says Kevin Miller, CTO of industrial AI company IFS. The problem, however, is as much a scale problem as it is a cost problem, Perlov says.
Dun and Bradstreet has been using AI and ML for years, and that includes gen AI, says Michael Manos, the companys CTO. And a Red Hat survey of IT managers in several European countries and the UAE found that 71% reported a shortage of AI skills, making it the most significant skill gap today, ahead of cybersecurity, cloud, and Agile.
Samsung Securities and AFW Partners led the round. Keller, one of the most acclaimed engineers in the semiconductor industry, joined the company in 2021 as president and chieftechnologyofficer, and was named CEO in early 2023. Jeff Bezos ’ Bezos Expeditions , Fidelity Management & Research Co.
Security was another constant challenge. In response, traders formed alliances, hired guards and even developed new paths to bypass high-risk areas just as modern enterprises must invest in cybersecurity strategies, encryption and redundancy to protect their valuable data from breaches and cyberattacks.
tagging, component/application mapping, key metric collection) and tools incorporated to ensure data can be reported on sufficiently and efficiently without creating an industry in itself! Infrastructure architecture: Building the foundational layers of hardware, networking and cloud resources that support the entire technology ecosystem.
Networking and cybersecurity firm Versa today announced that it raised $120 million in a mix of equity and debt led by BlackRock, with participation from Silicon Valley Bank. Versa’s large round suggests that, despite the market downturn, VCs haven’t lost faith in cybersecurity vendors yet. billion in 2021).
Organizations have shifted to remote desktop work environments at an increasing speed since then – simultaneously expanding their attack surface and exposing themselves to greater cybersecurity threats. Given that threat actors exploit critical vulnerabilities within mere hours of publication, this poses a serious security risk for companies.
The news of Shih’s departure was broken by investment analyst Patrick Walravens of JMP Securities. She’s something of a tech influencer , having published two books about the industry. In addition to corporate CEO Marc Benioff, Salesforce has a number of divisional or regional CEOs, of whom Shih was one.
Security and technology teams are under increasing pressure to strengthen their organizations cybersecurity posture. According to the National Cybersecurity Alliance , ransomware attacks, identity theft, assaults on critical infrastructure and AI-powered scams are all expected to escalate in 2025.
Ghost Security , which its founders describe as an “app security” company, today emerged from stealth with $15 million in combined funding from 468 Capital, DNX Ventures, and Munich Re Ventures at a $50 million valuation. “Existing approaches and application security solutions are now dated and losing effectiveness.
Virtually every company relied on cloud, connectivity, and security solutions, but no technology organization provided all three. Leaders across every industry depend on its resilient cloud platform operated by a team of industry veterans and experts with extensive networking, connectivity, and security expertise.
Sym , a new platform that makes it easier for developers to integrate security and privacy workflows into their process, today announced that it has raised a $9 million Series A round led by Amplify Partners. Angel investors include former Google CISO Gerhard Eschelbeck , Atlassian CTO Sri Viswanath and Jason Warner , the CTO of GitHub.
Because crypto is a nascent industry that currently exists largely outside of legal frameworks, it’s still in murky waters, and those in the industry — and outside of it — seemingly want clear guidelines and clarity to move forward. Securities and Exchange Commission and CFTC as the main watchdogs over the digital asset industry.
By partnering with industry leaders, businesses can acquire the resources needed for efficient data discovery, multi-environment management, and strong data protection. To fully leverage AI and analytics for achieving key business objectives and maximizing return on investment (ROI), modern data management is essential.
In today’s ever-changing technology landscape, it’s important for IT leaders of every stripe to not only keep abreast of current events and trends affecting the industry, but also know about focus areas and challenges of their upper management peers since the tech function is increasingly viewed as a strategic business partner to the C-suite.
In addition, the company today officially launched its Cilium platform (which was in stealth until now) to help enterprises connect, observe and secure their applications. The founding team of CEO Dan Wendlandt and CTO Thomas Graf has deep experience in working on the Linux kernel and building networking products.
From fostering an over-reliance on hallucinations produced by knowledge-poor bots, to enabling new cybersecurity threats, AI can create significant problems if not implemented carefully and effectively. Many factors, including governance, security, ethics, and funding, are important, and it’s hard to establish ground rules.
IT leaders should be under-hypers rather than over-hypers, and promote technology only in the context of business cases. According to Ron Guerrier, CTO of Save the Children Foundation, one way of helping business leaders learn whats really possible is to recommend books to read on AI.
As Jyothirlatha, CTO of Godrej Capital tells us, Being a pandemic-born NBFC (non-banking financial company), a technology-first approach helps us drive business growth. Since technology evolves rapidly, ensuring seamless adoption while keeping business teams aligned requires continuous change management.
The challenges don’t end once those requirements are met, as the project teams need to secure executive buy-in, which may be hindered by resistance to new technologies. A cloud-first approach ensures better data security, compliance with regulations, and scalability for AI-driven innovation,” says Domingues.
The reasons include higher than expected costs, but also performance and latency issues; security, data privacy, and compliance concerns; and regional digital sovereignty regulations that affect where data can be located, transported, and processed. Adding vaults is needed to secure secrets.
However, as ecommerce has proliferated, security threats have increased, elevating cybersecurity to a board-level concern. Early cybersecurity threats were limited in their scope and damage, but current threats can ruin a business. Worldwide responses show that attackers are increasingly able to extract more sensitive data.”
What is playing on the minds of senior IT executives confronted with the multiple challenges of cybersecurity and compliance? At a recent supper roundtable in London, convened by the endpoint and IT management vendor NinjaOne , attendees discussed some of the industry’s most complex issues. Here are five main takeaways from the event.
To become a software-powered organisation, companies must first identify and address the concerns of its developers in areas such as developer experience, developer velocity and software security. OSS improves developer satisfaction by addressing concerns specific to the business and technology environments developers operate in.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content