Remove Fractional CTO Remove Research Remove Security
article thumbnail

What is a CTO? The exec who sets tech strategy

CIO

What is a CTO? The chief technology officer (CTO) is the senior executive who focuses on the technological requirements, opportunities, and challenges within an organization. What does a CTO do? What does a CTO do? Years ago, the CTO most often led the infrastructure function.

article thumbnail

How conscious companies can thread IoT’s security and privacy needles

The Parallax

Could the secret to building Internet-connected devices that balance utility, safety, security, and privacy reside in the offices of Forcite, an upstart motorcycle helmet maker in Australia? READ MORE ON SECURING THE INTERNET OF THINGS. ”—Stephen Ridley, founder and chief technology officer, Senrio.

Company 49
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Aligning security and business strategies

CIO

By Sean Duca, vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks Some economists predict that we could soon face a global recession. During the 2008–2009 Global Financial Crisis (GFC) and subsequent recession, researchers noted that cybercrime rates increased dramatically.

Security 158
article thumbnail

Threat intel startup SnapAttack lands $8M Series A following Booz Allen spinout

TechCrunch

SnapAttack , a threat hunting startup that was this week spun out from IT consulting firm Booz Allen Hamilton , has secured $8 million in Series A funding. This, in turn, helps organizations proactively identify potential security flaws, risks and gaps in their infrastructure before an incident occurs, the company says.

article thumbnail

The evolving role of security and IT in DR and incident response

CIO

However, as ecommerce has proliferated, security threats have increased, elevating cybersecurity to a board-level concern. Early cybersecurity threats were limited in their scope and damage, but current threats can ruin a business. Worldwide responses show that attackers are increasingly able to extract more sensitive data.”

Security 166
article thumbnail

Six steps to creating a successful IT strategy: A guide for CIOs

CIO

This process includes establishing core principles such as agility, scalability, security, and customer centricity. For example, a company aiming for market expansion might focus on developing scalable infrastructure, enabling application localization, and enhancing security measures to support operations in new regions.

Strategy 200
article thumbnail

7 tough IT security discussions every IT leader must have

CIO

Talk may be cheap, but when it comes to IT security, strategic conversations with colleagues, business partners, and other relevant parties can be priceless. Such discussions ensure the integration of cybersecurity initiatives and resource requirements in the enterprise’s business goals and objectives,” he adds.