This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Technology investments, such as in generative AI, are a priority in addressing the need to meet rising expectations while also driving operational agility and resilience. Double down on cybersecurity In 2025, there will be an even greater need for CIOs to fully understand the current cybersecurity threat landscape.
As a result, for IT consultants, keeping the pulse of the technology market is essential. Being a successful IT consultant requires knowing how to walk in the shoes of your IT clients and their business leaders, says Scott Buchholz,CTO of the government and public services sector practice at consulting firm Deloitte.
Job titles like data engineer, machine learning engineer, and AI product manager have supplanted traditional software developers near the top of the heap as companies rush to adopt AI and cybersecurity professionals remain in high demand. An example of the new reality comes from Salesforce.
Both types of gen AI have their benefits, says Ken Ringdahl, the companys CTO. The main commercial model, from OpenAI, was quicker and easier to deploy and more accurate right out of the box, but the open source alternatives offered security, flexibility, lower costs, and, with additional training, even better accuracy.
Such a cryptographically relevant quantum computer (CRQC) could deliver a devastating impact to global cybersecurity protocols. To prepare for this worst-case scenario, Mastercard launched its Quantum Security and Communications project, which earned the company a 2023 US CIO 100 Award for IT innovation and leadership.
What is a CTO? The chieftechnologyofficer (CTO) is the senior executive who focuses on the technological requirements, opportunities, and challenges within an organization. What does a CTO do? What does a CTO do? Years ago, the CTO most often led the infrastructure function.
Networking and cybersecurity firm Versa today announced that it raised $120 million in a mix of equity and debt led by BlackRock, with participation from Silicon Valley Bank. Versa’s large round suggests that, despite the market downturn, VCs haven’t lost faith in cybersecurity vendors yet. billion in 2021).
Columbus, Ohio-based Finite State, a startup that provides supply chain security for connected devices and critical infrastructure, has raised $30 million in Series B funding. . The funding lands amid increased focus on the less-secure elements in an organizations’ supply chain, such as Internet of Things devices and embedded systems.
Dun and Bradstreet has been using AI and ML for years, and that includes gen AI, says Michael Manos, the companys CTO. And a Red Hat survey of IT managers in several European countries and the UAE found that 71% reported a shortage of AI skills, making it the most significant skill gap today, ahead of cybersecurity, cloud, and Agile.
For example, most people now use AI to take meeting notes. IT leaders should be under-hypers rather than over-hypers, and promote technology only in the context of business cases. You dont want to let them get most of their information from Google searches and YouTube videos, he says. Where are we heading?
Security and technology teams are under increasing pressure to strengthen their organizations cybersecurity posture. According to the National Cybersecurity Alliance , ransomware attacks, identity theft, assaults on critical infrastructure and AI-powered scams are all expected to escalate in 2025.
It’s not uncommon for CIOs, CISOs, and sometimes their direct reports to be called on to participate in board meetings or to present IT strategies and plans to their boards of directors. Best practices for board meetings abound. But when I think about my own board presentations and meetings, it’s the simple mistakes I remember most.
However, CIOs must still demonstrate measurable outcomes and communicate these imperatives to senior leadership to secure investment. According to Salesforces Perez, even though AI brings much opportunity, it also introduces complexity for CIOs, including security, governance, and compliance considerations.
Clearing business strategy hurdles Choosing the right technologies to meet an organization’s unique AI goals is usually not straightforward. The challenges don’t end once those requirements are met, as the project teams need to secure executive buy-in, which may be hindered by resistance to new technologies.
A shift to small wins The cost issue, combined with huge pressure from CEOs and boards to deploy and create value from AI, puts CIOs and other IT leaders in a difficult position, says Kevin Miller, CTO of industrial AI company IFS. The problem, however, is as much a scale problem as it is a cost problem, Perlov says.
Talk may be cheap, but when it comes to IT security, strategic conversations with colleagues, business partners, and other relevant parties can be priceless. Such discussions ensure the integration of cybersecurity initiatives and resource requirements in the enterprise’s business goals and objectives,” he adds.
In some cases, that’s already happening, says Tom Murphy, chieftechnologyofficer at network security provider Nuspire. How to make your Zoom meetings more secure. Chernobyl’s lessons for critical-infrastructure cybersecurity. With all that going on, the industry is ripe for hackers to exploit.
Similarly, telemedicine solutions in healthcare not only meet patient expectations for convenience but also align with broader business goals such as reducing operational costs and increasing reach. CIOs must implement governance frameworks to consistently evaluate IT investments, ensuring they meet both performance and strategic objectives.
Now meet Fierce , a new company out to change that. Users also have an option to profit from their existing stock holdings through a Fully Paid Securities Lending program where they earn income by lending their stocks. Five years ago, you couldn’t really do this,” Cornish told TechCrunch.
Regardless of the driver of transformation, your companys culture, leadership, and operating practices must continuously improve to meet the demands of a globally competitive, faster-paced, and technology-enabled world with increasing security and other operational risks.
By Andy Nallappan, ChiefTechnologyOfficer and Head of Software Business Operations, Broadcom Software. Broadcom Software CTO Andy Nallappan. About Andy Nallappan : Andy is the ChiefTechnologyOfficer and Head of Software Business Operations for Broadcom Software. Broadcom Software.
However, as ecommerce has proliferated, security threats have increased, elevating cybersecurity to a board-level concern. Early cybersecurity threats were limited in their scope and damage, but current threats can ruin a business. Worldwide responses show that attackers are increasingly able to extract more sensitive data.”
Ask the right questions When meeting with business colleagues, it’s natural to zero in on questions relating to IT solutions, strategies, and operations. Such meetings align IT projects with larger business objectives, ensuing that technology investments are prioritized in support of long-term success.”
The [compliance] tools available to [users] now are essentially templates for meeting basic requirements and passing audits, offering very little in the way of the scalability and customization needed to facilitate, versus hinder, growth,” said Yair Kuznitsov, co-founder and CEO of anecdotes. Image Credits: anecdotes.
They include Kleiner Perkins, Optum Ventures (United Health), Kaiser Permanente, Alphabet’s Gradient Ventures, Soma Capital, Gaingels and Flexport; as well as a number of individual investors such as Jon Oberheide (Duo SecurityCTO), Ash Devata (VP/GM for Zero Trust and Duo at Cisco) and Leore Avidar (Alt CEO).
Too quickly people are running to AI as a solution instead of asking if its really what they want, or whether its automation or another tool thats needed instead, says Guerrier, currently serving as CTO at the charity Save the Children. Whats our risk tolerance, and what safeguards are necessary to ensure safe, secure, ethical use of AI?
Data architecture principles According to David Mariani , founder and CTO of semantic layer platform AtScale, six principles form the foundation of modern data architecture: View data as a shared asset. Ensure security and access controls. Choose the right tools and technologies. Ensure data governance and compliance.
Virtually every company relied on cloud, connectivity, and security solutions, but no technology organization provided all three. Diamond founded 11:11 Systems to meet that need – and 11:11 hasn’t stopped growing since. We enable them to successfully address these realities head-on.” It also offers exceptional transparency.
One effective approach to tackling that has been collaboration: not just applying an array of services to address the issue, but creating environments to help those building cybersecurity to work better together. Advent made some waves in the cybersecurity industry last year when it partnered with Crosspoint to acquire Forescout for $1.9
Small and medium businesses have become a growing target for malicious online hackers in recent years, currently accounting for between 43% and 61% of all security breaches and some $7 billion annually in related losses, according to different estimates. The startup is launching initially in the U.S.,
Executive parts ways with Better.com : CTO Diane Yu is among employees agreeing to take part in the voluntary separation plan that the digital mortgage lender offered earlier this week, though we report she will stay on as an adviser. On that cheerful note, may your weekend contain the appropriate amount of the right kind of surprises.
Emerging cybersecurity initiatives generate lots of buzz but aren’t likely to shift the focus of IT and business leaders away from fundamental issues such as cost and best-of-breed solutions. The survey by Comcast Business and CIO included 146 respondents, more than 60% of them in C-level roles (CIO, CISO/CSO, CTO, or COO).
With SaaS becoming the standard for most business software, the security demands on SaaS companies are constantly increasing. Add users who need their data sandboxed from others or kept in a specific geographic region and the workload for development and security teams only increases. Image Credits: Antimatter.
Cybersecurity The February ransomware attack on UnitedHealth Group’s Change Healthcare unit reinforced cybersecurity as a pressing concern for executives across the country, and the continuing fallout that includes a federal investigation keeping the issue in the spotlight. Foundry / CIO.com 3. Risk management came in at No.
If you bring the right portfolio of experience,” including data knowledge, business acumen, and informationsecurity, “I think any industry will pay relative to their market for their selection of a CIO,” Stephenson says. CIO and CTO positions have become much more important as leadership is starting to look at AI, Janulaitis says.
As SVP and CTO for the Boston Red Sox, Brian Shield is responsible for the strategic direction of technology, fan engagement, day-to-day IT operations, and cybersecurity in support of the team, their fans, and Fenway Sports Management. Great leaders are known for having strategic partners, not vendors.
To create innovative products that meet the various finance requirements of the market, Piramal Capital & Housing Finance opened the Piramal Innovation Lab in Bengaluru on Dec. The 36,000-square-foot innovation hub will be led by the company’s CTO, Saurabh Mittal, and Markandey Upadhyay, head of business intelligence unit for Piramal.
“The information volume piece is definitely one of the areas where productivity could go down,” says Woolley. The AI can go to meetings for you and take notes so you can be in four places at once,” she says. And some people try to do that. But it’s also nice for employees to have some personal autonomy. “If
CIOs rank AI as a top priority alongside cybersecurity for IT departments. However, barriers such as adoption speed and security concerns hinder rapid AI integration, according to a new survey. There is a promising surge in the use of AI technologies across various industries. Today’s CIOs are working in a tornado of innovation.
Next, it looks at time management and tracking the lawyer’s time in an automated way and finally it includes a security component to help keep all of that informationsecure. “So basically, we bring machine learning and data processing to where the data is, not the other way around.
Yet unlike his peers, Wiedenbeck’s dual roles — the top technology executive as well as the transformation lead at Ameritas — are often at odds. As chieftechnologyofficer, Wiedenbeck is driving automation and IT modernization to reduce complexity and technical debt. Sometimes the strategies are at odds. “The
Recognizing that pace of innovation and how companies were spending more of their mission critical resources on putting out fires, Big Panda decided to go after additional funding to meet that demand.
Here, the challenge is finding the organization or organizations that meet your specific needs and goals. MIT Center for Information Systems Research The MIT Center for Information Systems Research (MIT CISR) operates as a research center in Sloan School of Management at the Massachusetts Institute of Technology.
They are a director of engineering at a midsize startup and just got their first headhunter inquiry for a CTO role. I realized that while there are some books on technology leadership careers, there aren’t many resources explaining the most senior levels. I’ve been a CTO for five and a half years.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content