This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
As they embark on their AI journey, many people have discovered their data is garbage, says Eric Helmer, chieftechnologyofficer for software support company Rimini Street. One of the foundational principles is cybersecurity, which is the primary concern for CIOs, according to Hardy.
It was an interesting case study of global cyber impact, says Charles Clancy, CTO at Mitre. What happened In CrowdStrikes own root cause analysis, the cybersecurity companys Falcon system deploys a sensor to user machines to monitor potential dangers. What if theres an urgent security fix? Clancy asks. Trust, but verify.
By Leonard Kleinman, Field ChiefTechnologyOfficer (CTO) ) Cortex for Palo Alto Networks JAPAC Many things challenge how we practice cybersecurity these days. Let’s look at some of these cybersecurity challenges and how automation can level the playing field.
Double down on cybersecurity In 2025, there will be an even greater need for CIOs to fully understand the current cybersecurity threat landscape. The pace of change in the global market and technology landscape demands organizations that can adapt quickly.
The pandemic has led to new data vulnerabilities, and therefore new cyber security threats. As technology leaders, it's time to rethink some of your product security strategy. Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered.
As more AI innovations come to market, financial institutions can leverage the technology for enhanced services, increased efficiency, and new ways to deliver and manage products. Ed McLaughlin is the president and chieftechnologyofficer of Mastercard and a member of the company’s management committee.
Alan Radford is regional CTO of One Identity and has a passion for helping organizations solve unique challenges in the identity and access management space. But many don’t know how common the technology is and may not realize that they are interacting with it regularly. Alan Radford. Contributor. Understanding RPA’s digital identity.
As a result, for IT consultants, keeping the pulse of the technology market is essential. Being a successful IT consultant requires knowing how to walk in the shoes of your IT clients and their business leaders, says Scott Buchholz,CTO of the government and public services sector practice at consulting firm Deloitte.
Both types of gen AI have their benefits, says Ken Ringdahl, the companys CTO. The main commercial model, from OpenAI, was quicker and easier to deploy and more accurate right out of the box, but the open source alternatives offered security, flexibility, lower costs, and, with additional training, even better accuracy.
Such a cryptographically relevant quantum computer (CRQC) could deliver a devastating impact to global cybersecurity protocols. To prepare for this worst-case scenario, Mastercard launched its Quantum Security and Communications project, which earned the company a 2023 US CIO 100 Award for IT innovation and leadership.
Job titles like data engineer, machine learning engineer, and AI product manager have supplanted traditional software developers near the top of the heap as companies rush to adopt AI and cybersecurity professionals remain in high demand. An example of the new reality comes from Salesforce.
This process includes establishing core principles such as agility, scalability, security, and customer centricity. For example, a company aiming for market expansion might focus on developing scalable infrastructure, enabling application localization, and enhancing security measures to support operations in new regions.
Cybersecurity continues to be a major area for investment among businesses — and VCs. While a decline from the previous year, venture capital funding in the cybersecurity sector totaled $18.5 PitchBook data shows a decline in cybersecurity valuations at the seed and Series A stages in particular.
As TechCrunch reported earlier today , Carta is suing its former CTO, Jerry Talton, who was fired “for cause” almost three weeks ago, on December 23, according to the company. Current and former Carta employees can reach out to Natasha Mascarenhas on Signal, a secure encrypted messaging app, at 925 271 0912.
Cybersecurity teams, beware: The defender’s dilemma is a lie Image Credits: A. Martin UW Photography (opens in a new window) / Getty Images The Defender’s Dilemma is one of cybersecurity’s touchstones: “Defenders have to be right every time. What’s wrong with the way they are currently solving this problem?
In our inaugural episode, Michael “Siko” Sikorski, CTO and VP of Engineering and Threat Intelligence at Unit 42 answers that question and speaks to the profound influence of artificial intelligence in an interview with David Moulton, Director of thought leadership for Unit 42. Threat Vector is your compass in the world of cybersecurity.
Security was another constant challenge. In response, traders formed alliances, hired guards and even developed new paths to bypass high-risk areas just as modern enterprises must invest in cybersecurity strategies, encryption and redundancy to protect their valuable data from breaches and cyberattacks.
The survey points to a fundamental misunderstanding among many business leaders regarding the data work needed to deploy most AI tools, says John Armstrong, CTO of Worldly, a supply chain sustainability data insights platform. Theres a perspective that well just throw a bunch of data at the AI, and itll solve all of our problems, he says.
Seemplicity is a portmanteau of “see” and “simplicity”, and that is effectively what it is doing: helping DevOps and SecOps teams see a more complete picture of the state of an organization’s security, by simplifying how to view it. S Capital led its seed round.
Gem Security , a New York- and Tel Aviv-based startup that is building a cloud threat detection, investigation and response (TDIR) platform, is coming out of stealth today and announced an $11 million seed funding round led by Team8. The company was co-founded by CEO Arie Zilberstein, CTO Ron Konigsberg and VP of Product Ofir Brukner.
Security and technology teams are under increasing pressure to strengthen their organizations cybersecurity posture. According to the National Cybersecurity Alliance , ransomware attacks, identity theft, assaults on critical infrastructure and AI-powered scams are all expected to escalate in 2025.
In one case, this oversight led to a fragmented IT landscape and security vulnerabilities.” The CIO is really worried about cybersecurity and the risk of data exfiltration,” says Fernandes. By providing worthwhile tools, the IT department allows the business to respond to opportunities quickly, while at the same time mitigating risk.”
Dun and Bradstreet has been using AI and ML for years, and that includes gen AI, says Michael Manos, the companys CTO. And a Red Hat survey of IT managers in several European countries and the UAE found that 71% reported a shortage of AI skills, making it the most significant skill gap today, ahead of cybersecurity, cloud, and Agile.
SAP CTO Juergen Mueller will step down from SAP’s executive board at the end of September. “I I want to address an incident at a past company event where my behavior was inappropriate. I regret being inconsiderate and sincerely apologize to everyone affected. I recognize my behavior at that moment did not reflect our values at SAP.
Its not surprising to see the differences when C-level executives tend to receive PowerPoint-level snapshots of IT problems, including data quality, says Timothy Bates, a professor in the College of Innovation and Technology at the University of Michigan Executives see dashboards clean, aggregated, polished, Bates says.
Organizations have shifted to remote desktop work environments at an increasing speed since then – simultaneously expanding their attack surface and exposing themselves to greater cybersecurity threats. Given that threat actors exploit critical vulnerabilities within mere hours of publication, this poses a serious security risk for companies.
However, CIOs must still demonstrate measurable outcomes and communicate these imperatives to senior leadership to secure investment. According to Salesforces Perez, even though AI brings much opportunity, it also introduces complexity for CIOs, including security, governance, and compliance considerations.
A lack of AI expertise is a problem, however, when other company leaders often turn to CIOs and other IT leaders as the “go-to people” for solving AI problems, says Pavlo Tkhir, CTO at Euristiq, a digital transformation company. “A The technology is too novel and evolving,” he says. “As
Protecting these ever-increasing volumes of data is a high priority, and while there are many different types of cybersecurity threats to enterprise data, ransomware dominates the field. Claus Torp Jensen , formerly CTO and Head of Architecture at CVS Health and Aetna, agreed that ransomware is a top concern. “At To watch 12.8
Oligo Security , a Tel Aviv-based startup that focuses on runtime application security and observability to detect and prevent open-source vulnerabilities, is coming out of stealth today and announcing that it has raised a total of $28 million in seed and Series A funding.
So Greenwald, Shoshan and Sarid, the former CTO of MuleSoft, founded Otterize , which aims to allow developers to securely connect different software services to each other and infrastructure by automatically configuring existing security controls. Otterize today raised $11.5 ” Otterize raises $11.5M
Talk may be cheap, but when it comes to IT security, strategic conversations with colleagues, business partners, and other relevant parties can be priceless. Such discussions ensure the integration of cybersecurity initiatives and resource requirements in the enterprise’s business goals and objectives,” he adds.
The future is now Even with some issues to work out, and some resistance from developers to AI coding assistants, AI-native coding is the future, says Drew Dennison, CTO of code security startup Semgrep. Gen AI tools are advancing quickly, he says.
Jim Chilton is an award-winning CIO who serves as the chieftechnologyofficer of Cengage Group, an innovative disruptor in the edtech space. As a business and technology executive, Chilton leverages his unique experiences to drive innovation and optimize technology throughout the company.
Speed is great, but not when it comes at the expense of security. The engineering ecosystem is often overlooked as security teams tend to focus more on reducing runtime misconfigurations and vulnerabilities rather than addressing vulnerabilities across the entire attack surface.
However, as ecommerce has proliferated, security threats have increased, elevating cybersecurity to a board-level concern. Early cybersecurity threats were limited in their scope and damage, but current threats can ruin a business. Worldwide responses show that attackers are increasingly able to extract more sensitive data.”
Samsung Securities and AFW Partners led the round. Keller, one of the most acclaimed engineers in the semiconductor industry, joined the company in 2021 as president and chieftechnologyofficer, and was named CEO in early 2023. Jeff Bezos ’ Bezos Expeditions , Fidelity Management & Research Co.
Regardless of the driver of transformation, your companys culture, leadership, and operating practices must continuously improve to meet the demands of a globally competitive, faster-paced, and technology-enabled world with increasing security and other operational risks.
Security weaknesses arise Security and risk vulnerabilities are important signs that modernization is immediately necessary. He notes that recent surveys by Gartner and Forrester show that over 50% of organizations cite security and efficiency as their main reasons for modernizing their legacy systems and data applications.
The news of Shih’s departure was broken by investment analyst Patrick Walravens of JMP Securities. In addition to corporate CEO Marc Benioff, Salesforce has a number of divisional or regional CEOs, of whom Shih was one. Some also hold the rank of executive vice president.
Spera , a Palo Alto-based security startup that provides businesses with the tools to proactively protect themselves from identity-driven threats, today said it has raised a $10 million seed funding round led by YL Ventures, with participation from a number of prominent angel investors and serial entrepreneurs.
A shift to small wins The cost issue, combined with huge pressure from CEOs and boards to deploy and create value from AI, puts CIOs and other IT leaders in a difficult position, says Kevin Miller, CTO of industrial AI company IFS. The problem, however, is as much a scale problem as it is a cost problem, Perlov says.
Skepticism from IT practitioners is natural, given they will have to work out how to deploy and maintain AI agents, says Tim Armandpour, CTO at PagerDuty. IT practitioners are cautious due to concerns around accuracy, transparency, security, and integration complexities, says Chahar, echoing Mikhailovs critiques.
From fostering an over-reliance on hallucinations produced by knowledge-poor bots, to enabling new cybersecurity threats, AI can create significant problems if not implemented carefully and effectively. Many factors, including governance, security, ethics, and funding, are important, and it’s hard to establish ground rules.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content