Enterprise architecture modernizes for the digital era
With digital operating models altering business processes and the IT landscape, enterprise architecture (EA) — a rigid stalwart of IT — has shown signs of evolving as well. One key indicator of this evolution is the increasing interest in enterprise architecture management (EAM) tools, which transformational enterprise architects and CIOs are turning to in order […]
Is ITOM Still Relevant for Multi-cloud Environments?
IT Operations management (ITOM) – a framework that gives IT teams the tools to centrally monitor and manage applications and infrastructure across multi-premise environments – has been the foundation of enterprise IT infrastructure and applications for the last 30 years. It has been the backbone that ensures technology stacks are operating optimally to provide timely […]
Trulioo launches end-to-end identity platform
Identity verification firm Trulioo on Tuesday launched a new global identity platform for “person” and “business” verification. Trulioo so far sold multiple identity products, each operating in their own silos. Their products and services range from person and business verification, to no-code workflow building, low-code integrations, and anti-fraud measures. The new platform combines all these solutions […]
Privacera connects to Dremio’s data lakehouse to aid data governance
The integration of open-source based Privacera into Dremio’s data lakehouse is designed to allow joint customer enterprises to manage and organize secure data access.
Guardz debuts with cybersecurity-as-a-service for small businesses
Guardz, a Tel Aviv-based startup promising a broad range of out-of-the-box cybersecurity solutions for small and medium-size businesses (SMBs), has announced both a successful $10 million round of seed funding and the broad availability of its flagship product. The premise of the company’s main offering is tight API integration with Microsoft 365 and Google Workspace. […]
IoT, connected devices biggest contributors to expanding application attack surface
The growth of the internet of things (IoT) and connected devices are the biggest contributing factors to organizations’ expanding attack surfaces. That’s according to a new report from Cisco AppDynamics, which revealed that 89% of global IT professionals believe their organization has experienced an expansion in its attack surface over the last two years. The […]
Sentra Raises $30 Million for DSPM Technology
Sentra, a cloud data security company with roots in New York and Tel Aviv, has raised a $30 million funding round as investors continue to place big bets on the DSPM (data security posture management) category. The $30 million Series A comes just 18 months after Sentra’s launch with backing from Bessemer Venture Partners and […]
Cyber Insights 2023: Artificial Intelligence
About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […]
Cyber Insights 2023: Cyberinsurance
About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […]
Cyber Insights 2023: Attack Surface Management
About SecurityWeek Cyber Insights | At the end of 2022, SecurityWeek liaised with more than 300 cybersecurity experts from over 100 different organizations to gain insight into the security issues of today – and how these issues might evolve during 2023 and beyond. The result is more than a dozen features on subjects ranging from AI, quantum […]
Making Remarkable Energy Grids a Reality
Many industries already benefit from the transformative power of advanced digitalization. Telecommunications, manufacturing, retail, publishing, and others have seen amazing changes in terms of new opportunities, capabilities, and efficiencies. While the energy sector has long embraced IT, it’s on the verge of a digital makeover. The dilemma of constantly growing energy demand and the need […]
Guardz Emerges From Stealth Mode With $10 Million in Funding
Guardz today emerged from stealth mode with $10 million raised in a seed funding round led by Hanaco Ventures, with additional investment from iAngels, Cyverse Capital, and GKFF Ventures. Founded in May 2022, the Tel Aviv, Israel-based startup has developed a platform designed to protect small and growing businesses from cyberattacks, and it also helps […]
Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
Microsoft and cybersecurity firm Proofpoint on Tuesday warned organizations that use cloud services about a recent campaign that involved malicious OAuth applications and abuse of Microsoft’s ‘verified publisher’ status. The campaign mainly targeted Microsoft customers in Ireland and the UK. The tech giant has taken steps to disrupt the operation and it has published an […]
Threat actors abuse Microsoft’s “verified publisher” status to exploit OAuth privileges
Researchers from cybersecurity firm Proofpoint claim to have discovered a new threat campaign involving malicious third-party OAuth apps that are used to infiltrate organizations’ cloud environments. According to a blog on the company’s website, threat actors satisfied Microsoft’s requirements for third-party OAuth apps by abusing the Microsoft “verified publisher” status, employing brand abuse, app impersonation […]
Critical QNAP Vulnerability Leads to Code Injection
QNAP Systems this week issued a warning on a critical vulnerability that could allow attackers to inject malicious code on network-attached storage (NAS) devices. The Taiwan-based manufacturer is known for its NAS appliances and professional network video recorder (NVR) solutions, but also produces various types of networking equipment. Tracked as CVE-2022-27596 (CVSS score of 9.8), […]
How the Atomized Network Changed Enterprise Protection
Cyberattacks rose at a rate of 42% in the first half of 2022 and the average cost of a data breach has hit a record high of $4.35 million with costs in the U.S. peaking at $9.44 million. Unfortunately, this shouldn’t come as a surprise. Enterprise networks have changed dramatically, particularly over the last few […]
New UN cybercrime convention has a long way to go in a tight timeframe
Cybercrime is a growing scourge that transcends borders, spreading across the boundaries of virtually all the world’s nearly 200 nation-states. From ransomware attacks to rampant cryptocurrency theft, criminal exploitation of borderless digital systems threatens global economic security and the political welfare of all countries. Now, the United Nations has a major initiative to develop a […]
GitHub Revokes Code Signing Certificates Following Cyberattack
Code hosting platform GitHub on Monday announced the revocation of three digital certificates used for the GitHub Desktop and Atom applications. The three certificates were stolen on December 6, 2022, after an unauthorized third-party used a compromised Personal Access Token (PAT) for a machine account to clone repositories from Atom, GitHub Desktop, and other deprecated […]
Saviynt Raises $205M; Founder Rejoins as CEO
Identity and access governance vendor Saviynt on Tuesday announced the closing of a $205 million financing round and the return of its founder Sachin Nayyar as chief executive. The latest funding brings the total raised by the California company to $375 million and provides a growth-mode runway for Saviynt to establish a foothold in a […]
OpenVEX Spec Adds Clarity to Supply Chain Vulnerability Warnings
Chainguard on Tuesday published a draft OpenVEX specification to help software vendors and maintainers communicate precise metadata about the vulnerability status of products directly to end users. The Chainguard specification is an implementation of the NTIA’s VEX (Vulnerability Exploitability eXchange) concept that aims to provide additional information on whether a product is impacted by a […]
Discover’s unique IT training platform builds skills and community
With talent markets tight as ever, upskilling is increasingly becoming an IT imperative, and Discover Financial Services is among those companies sharpening staff capabilities by investing in their IT training strategies. The company, which has a culture of “empowering [employees] to work better together in modern ways,” says Angel Diaz, vice president of technology capabilities […]
Russian Millionaire on Trial in Hack, Insider Trade Scheme
A wealthy Russian businessman and associates made tens of millions of dollars by cheating the stock market in an elaborate scheme that involved hacking into U.S. computer networks to steal insider information about companies such as Microsoft and Tesla, a prosecutor told jurors on Monday. Vladislav Klyushin, the owner a Moscow-based information technology company with […]
C&S modernizes with wholesale shift to the cloud
Some CIOs approach technology modernization by deciding on a cloud platform, designing a blueprint, and executing it with their own IT staff, C-suite funding, and the hypervisor’s vertical industry experts. Other CIOs hand over most of the project to consulting firms: the old throat choke. There is no right or wrong way to proceed. […]
What’s Next in Securing Healthcare
By Tapan Mehta, Global Healthcare Solutions Executive at Palo Alto Networks Over the last decade, healthcare has offered new lines of services such as telehealth and remote patient monitoring, expanded accessibility and ease for both patients and healthcare professionals, and supported innovations that measurably improve patient outcomes. It’s a profound digital transformation. Today’s digital healthcare […]
Fundaments: Helping Enterprises in the Netherlands Decrease Their Carbon Footprints
With seven high-performance and high-security data centers located throughout the Netherlands and full array of cloud services and solutions, including Infrastructure-as-a-Service (IaaS) that enables customers to harness the strengths of the private, public and hybrid cloud with ease, Fundaments is trusted by enterprises in numerous industries. The company is equally well-known among independent software vendors […]
Get Business Done Faster with HPC and Exascale Supercomputing
A common misconception is that high-powered computing (HPC) and exascale supercomputing are too powerful for traditional businesses — that they’re only designed for mammoth university and government programs that seek to answer humanity’s biggest questions, like how the galaxies are formed or finding solutions for global crises like climate change and hunger. But the reality […]
3 Fundamentals to Truly Secure Remote Workers
By Christian Aboujaoude, chief technology officer at Keck Medicine, USC In the pre-pandemic days, security solutions could be more basic. Securing the perimeter could be likened to locking the door of your house. But with remote workers taking devices off premises and sometimes using their own, securing the workplace requires a new approach. Sophisticated threats […]
Are You Overthinking Your Cloud Model? You Need a Cloud Strategy
Are you overthinking your cloud model? If so, you’re likely in need of a well-defined cloud strategy. Companies with a clear cloud strategy position themselves to achieve more from cloud computing than those without. A well-defined cloud strategy provides a playbook inclusive of principles, baselines, services, financial models, and prioritization guidelines that enable companies to […]
This Next-Generation Data Center Fabric Is a Total Game Changer
As applications and IT services advance, scaling and modernizing data centers and meeting increased performance and security requirements grows more and more challenging. While networking technology has evolved over the past decade to provide higher-performing leaf-spine topologies, the unfortunate reality is that associated security and services architectures have not kept pace. To compensate, many organizations […]
British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
British sports fashion retail firm JD Sports on Monday revealed that it has discovered a data breach impacting roughly 10 million of its customers. According to the company, the cyber incident affects information provided by customers who placed online orders between November 2018 and October 2020. The JD, Size, Millets, Blacks, Scotts and MilletSport brands […]
Zero trust is a never-ending journey, not a ready-made solution
Nearly all organizations are struggling with how to stay in control as their data migrates to the cloud and users connect from anywhere. The answer, they’ve been told, is zero trust. Zero trust starts from the premise that an organization is going to be breached so that they can then focus on minimizing any potential […]
Sitecore Ramps Up CX with Smarter Content Discovery and Management
Change and instability seem like the only constants for brands for over two years now. And while those conditions may have made for a rocky road, they also provided brands an opportunity to explore new ways to engage with customers regardless of where they were in their customer journey. Brands capitalized on this opportunity to […]
Vulnerabilities in OpenEMR Healthcare Software Expose Patient Data
Vulnerabilities in the OpenEMR healthcare software could allow remote attackers to steal sensitive patient data or execute arbitrary commands and take over systems. OpenEMR is an open source software used for the management of health records. It also allows patients to schedule appointments, get in touch with physicians, and pay invoices. Security researchers at Sonar […]
Economic headwinds could deepen the cybersecurity skills shortage
According to the most recent research report from ESG and the Information System Security Association International (ISSA), 57% of organizations claim that they’ve been impacted by the global cybersecurity skills shortage, while 44% of organizations believe the skills shortage has gotten worse over the past few years. The result? Increasing workloads on existing cybersecurity staff, job […]
How to survive below the cybersecurity poverty line
The security poverty line broadly defines a divide between the organizations that have the means and resources to achieve and maintain mature security postures to protect data, and those that do not. It was first coined by cybersecurity expert Wendy Nather in 2011, and the concept is just as relevant today as it was then […]
AWS launches Data Lab program in India
Amazon Web Services (AWS) on Monday said it was making its AWS Data Lab program available in India. The complimentary program is targeted at accelerating joint engineering efforts between enterprise customers and AWS technical experts to tackle complex data, architecture challenges using AWS products and services, the company said. AWS Data Lab, which primarily has […]
Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
A researcher has disclosed the details of a two-factor authentication (2FA) vulnerability that earned him a $27,000 bug bounty from Facebook parent company Meta. Gtm Manoz of Nepal discovered in September 2022 that a system designed by Meta for confirming a phone number and email address did not have any rate-limiting protection. A fix was […]
Russia-Linked APT29 Uses New Malware in Embassy Attacks
Russia-linked cyberespionage group APT29 has been observed staging new malware for attacks likely targeting embassy-related individuals, Recorded Future reports. Also referred to as Cozy Bear, the Dukes, Nobelium, and Yttrium, APT29 is a Russian advanced persistent threat (APT) group believed to be sponsored by the Russian Foreign Intelligence Service (SVR). It’s also believed to have […]
Top 6 roadblocks derailing data-driven projects
Data is what drives digital business. Consider how strategically important it has become for companies to leverage advanced analytics to uncover trends that can help them gain decisive insights they might not otherwise possess. But data-driven projects are not always easy to launch, let alone complete. In fact, enterprises face several challenges as they look […]
The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment
On Friday, January 20, 2023, Google announced it would lay off 12,000 employees. Amazon and Microsoft have laid off a combined 28,000 people; Twitter has reportedly lost 5,200 people; Meta (Facebook, etcetera) is laying off 11,000… This is just the tech giants, and almost all the staff looking for new positions are, by definition, tech-savvy […]
Winning with Unified Data Security and Access Governance
How do you become data-driven? It’s a question that seemingly has infinite answers. That’s why many companies flounder in the ambiguity of data-driven initiatives absent of concrete, actionable focus areas. Forward-thinking leaders are strategically focused on a particular data-driven initiative — self-service data access and governance. But even for companies who’ve succeeded in pinpointing the […]
Hispanic IT leaders work to close the gap
When Pete Torres transitioned to the IT industry after serving in the military, he encountered a noticeable lack of Hispanic representation at conferences and events he attended. Even when he was young, the idea of a career in technology was “not really an option,” he says, owing in part to the IT industry’s decades-long issues […]
Ericsson and Vonage are putting the power of 5G at the fingertips of developers
The Communications Platform as a Service (CPaaS) market is big and growing fast. Already worth more than $8 billion, analysts predict that the market will nearly triple in size to $22 billion by 2025. CPaaS is a cloud platform that exposes communications functions such as SMS, voice, video, and IP chat via programmable application programming […]
Hackers abuse legitimate remote monitoring and management tools in attacks
Security researchers warn that an increasing number of attackers are using legitimate remote monitoring and management (RMM) tools in their attacks to achieve remote access and control over systems. These tools are commonly used by managed service providers (MSPs) and IT help desks so their presence on an organization’s network and systems might not raise […]
What is a Data Fabric?
By now, you’ve heard the good news: The business world is embracing data-driven decision making and growing their data practices at an unprecedented clip. The pandemic may have forced their hands, but they’ve seen the value of data and will never go back to making decisions based on hunches. Here is the so-so news: They’re […]
Critical Vulnerability Impacts Over 120 Lexmark Printers
Printer and imaging products manufacturer Lexmark this week published a security advisory to warn users of a critical vulnerability impacting over 120 printer models. The issue, tracked as CVE-2023-23560 (CVSS score of 9.0), is described as a server-side request forgery (SSRF) flaw in the Web Services feature of newer Lexmark devices, which could be exploited […]
FBI takes down Hive ransomware group in an undercover operation
The US Department of Justice (DOJ) along with international partners have taken down the Hive ransomware group. The operation that began in July 2022 resulted in the FBI penetrating Hive’s computer networks, capturing its decryption keys, and offering them to victims worldwide, preventing victims from having to pay the $130 million in ransom demanded, DOJ […]
Industry Reactions to Hive Ransomware Takedown: Feedback Friday
Authorities in the United States and Europe have announced the results of a major law enforcement operation targeting the Hive ransomware. Agencies from around the world worked together to take down Hive’s leak website and servers. In addition, agents hacked into Hive systems in July 2022, allowing them to identify targets and obtain decryption keys […]
BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
The Internet Systems Consortium (ISC) this week announced patches for multiple high-severity denial-of-service (DoS) vulnerabilities in the DNS software suite BIND. The addressed issues could be exploited remotely to cause named – the BIND daemon that acts both as an authoritative name server and as a recursive resolver – to crash, or could lead to […]
Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
The Iran-linked advanced persistent threat (APT) actor known as Moses Staff is leaking data stolen from Saudi Arabia government ministries using a recently created online persona. Also referred to as Cobalt Sapling, Moses Staff has been likely active since November 2020, but its existence was not revealed until September 2021. A declared anti-Israeli and pro-Palestinian […]
Microsoft Urges Customers to Patch Exchange Servers
Microsoft this week published a blog post to remind its customers of the continuous wave of attacks targeting Exchange servers and to urge them to install the latest available updates as soon as possible. “Attackers looking to exploit unpatched Exchange servers are not going to go away,” Microsoft says, reminding customers that both a cumulative […]
IT leaders take note: The future is what you create
The new year brings with it enthusiasm for new priorities and accomplishments to come, resolutions to seize opportunities and overcome challenges, and the opportunity to assess takeaways from the previous year and turn the page on projects and missteps past. In the ideal beginning of the year scenario, organizations would have completed celebrating and cerebrating […]
US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
Following the shutdown of the Hive ransomware operation by law enforcement, the US government has reminded the public that a reward of up to $10 million is offered for information on cybercriminals. Authorities in the United States and Europe announced on Thursday the results of a major law enforcement operation targeting the Hive ransomware. More […]
IBM reports rise in Q4 profit, but plans to cut 3,900 jobs
IBM reported net income of $2.9 billion in the fourth quarter of 2022 and year-on-year increases in revenue across all three of its business segments. That’s an increase in net income of 9% compared to the total reported for the corresponding quarter of 2021, or 17% comparing only continuing operations: IBM spun off most its […]
Cyberattacks Target Websites of German Airports, Admin
The websites of German airports, public administration bodies and financial sector organizations have been hit by cyberattacks instigated by a Russian “hacker group”, authorities said Thursday. The Federal Cyber Security Authority (BSI) had “knowledge of DDoS attacks against targets in Germany”, a spokesman told AFP. A distributed denial-of-service (DDoS) attack is designed to overwhelm the target with a […]
CIO Leadership Live with Roxanne Salton, Chief Digital Officer at Southern Cross Health Society
Roxanne Salton, Chief Digital Officer at Southern Cross Health Society, on why the job of transformation is not just the job of the CIO, the need to get more women into IT leadership roles, and being mindful of uncertainty in the year ahead and how it impacts your people. Watch the episode: Listen to the […]
SAP plans layoffs and selloff with cloud revenue up but profit down
SAP’s revenue rose 11% in 2022 with the cloud component of that climbing 33%, but net income dropped 68%, prompting restructuring and layoffs in its CRM activities. The company is also exploring selling its majority stake in Qualtrics, the experience management platform it bought for $8 billion in 2018, to refocus on its core business. […]
US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
The FBI has at least temporarily dismantled the network of a prolific ransomware gang it infiltrated last year, saving victims including hospitals and school districts a potential $130 million in ransom payments, Attorney General Merrick Garland and other U.S. officials announced Thursday. “Simply put, using lawful means we hacked the hackers,” Deputy Attorney General Lisa […]
How IT Can Deliver Better Business Outcomes
Cloud services, software-as-a-service (SaaS) applications, and on-premises infrastructures connected by wired and wireless networks now represent the backbone of modern enterprises. To fully harness the benefits of modern network architectures, network operations teams need a deep understanding of how these systems perform. This visibility is essential if teams are to avoid the downtime that results […]
Tenable Launches $25 Million Early-Stage Venture Fund
Vulnerability management software firm Tenable has launched a $25 million venture fund to place bets on early-stage startups in the attack surface and exposure management space. The new Tenable Ventures plans to make seed- and early-stage investments in companies building technology to help businesses discover, assess and manage security risk. The Columbia, Maryland-based Tenable said […]
How Real-Time Data and Open-Source Software Fuel ‘AI Factories’
By Bryan Kirschner, Vice President, Strategy at DataStax In their 2020 book Competing in the Age of AI, Harvard Business School professors Marco Iansiti and Karim Lakhani make some bold predictions about the winning enterprises of the future. These organizations, which they refer to as “AI factories,” build a “virtuous cycle between user engagement, data […]
Mapping Threat Intelligence to the NIST Compliance Framework Part 2
The NIST compliance framework consists of 5 core functions: identify, protect, detect, respond and recover. In my previous column, I mapped threat intelligence capabilities to the NIST core function of Identify. In this column, I will continue the discussion by mapping threat intelligence to the additional functions of Protect, Detect and Respond. By doing so, […]
820k Impacted by Data Breach at Zacks Investment Research
Stock research firm Zacks Investment Research is in the process of notifying customers that their personal information was compromised in a data breach. Founded in 1978, Zacks Investment Research is one of the largest providers of stock research, analysis and recommendations for firms in the US. Earlier this week, the company informed the Maine Attorney […]
New Open Source OT Security Tool Helps Address Impact of Upcoming Microsoft Patch
Industrial cybersecurity firm Otorio has released an open source tool designed to help organizations detect and address issues related to an upcoming update from Microsoft. Otorio’s DCOM Hardening Toolkit, which is available for free on GitHub, is a PowerShell script that lists weak DCOM authentication applications installed on the tested workstation and provides functionality to […]
CISA Provides Resources for Securing K-12 Education System
The US Cybersecurity and Infrastructure Security Agency (CISA) this week published a report detailing the cybersecurity risks the K-12 education system faces, along with recommendations on how to secure it. Over the past four years, there have been thousands of cyber incidents involving K-12 institutions, where threat actors targeted school computer systems to deploy ransomware, […]
North Korean APT Expands Its Attack Repertoire
The advanced persistent threat (APT) tracked as TA444 is either moonlighting from its previous primary purpose, expanding its attack repertoire, or is being impersonated (that is, has had its infrastructure abused by other hackers). TA444 is a North Korean state-sponsored threat group tracked by Proofpoint as actively targeting cryptocurrencies since at least 2017. It has […]
Security Update for Chrome 109 Patches 6 Vulnerabilities
Google has awarded a total of more than $25,000 to the researchers who reported the vulnerabilities patched with the release of a Chrome 109 update. The company informed users on Tuesday that six security holes have been patched in Chrome, including four reported by external researchers. Two of them are high-severity use-after-free issues affecting the […]
Malicious Prompt Engineering With ChatGPT
The release of OpenAI’s ChatGPT available to everyone in late 2022 has demonstrated the potential of AI for both good and bad. ChatGPT is a large-scale AI-based natural language generator; that is, a large language model or LLM. It has brought the concept of ‘prompt engineering’ into common parlance. ChatGPT is a chatbot launched by […]
Dozens of Cybersecurity Companies Announced Layoffs in Past Year
Dozens of cybersecurity companies have announced cutting staff over the past year as part of reorganization strategies, in many cases triggered by the global economic slowdown. One of the most recent announcements was made by Sophos, which in mid-January confirmed reports that it’s laying off 10% of its global workforce. Roughly 450 people have reportedly […]
Chinese Hackers Adopting Open Source ‘SparkRAT’ Tool
A Chinese threat actor tracked as DragonSpark has been using the SparkRAT open source remote administration tool (RAT) in recent attacks targeting East Asian organizations, cybersecurity firm SentinelOne reports. Relatively new, SparkRAT is a multi-platform RAT written in Golang that can run on Windows, Linux, and macOS systems, and which can update itself with new […]
UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
The United Kingdom’s National Cyber Security Centre (NCSC) has published an advisory to warn organizations and individuals about separate spearphishing campaigns conducted by Russian and Iranian cyberespionage groups. The advisory focuses on activities conducted by the Russia-linked Seaborgium group (aka Callisto, Blue Callisto and Coldriver) and the Iran-linked TA453 (aka Charming Kitten, APT35, Magic Hound, […]
US Government Agencies Warn of Malicious Use of Remote Management Software
The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC) are warning organizations of malicious attacks using legitimate remote monitoring and management (RMM) software. IT service providers use RMM applications to remotely manage their clients’ networks and endpoints, but threat actors are abusing these tools to […]
Hive Ransomware Operation Apparently Shut Down by Law Enforcement
The Hive ransomware operation appears to have been shut down as part of a major law enforcement operation involving agencies in 10 countries. A message displayed in English and Russian on the Hive ransomware operation’s Tor-based website reads: The Federal Bureau of Investigation seized this site as part of a coordinated law enforcement action taken […]
Recent legal developments bode well for security researchers, but challenges remain
Despite the hoodie-wearing bad guy image, most hackers are bona fide security researchers protecting users by probing and testing the security configurations of digital networks and assets. Yet the law has often failed to distinguish between malicious hackers and good-faith security researchers. This failure to distinguish between the two hacker camps has, however, improved over […]
9 API security tools on the frontlines of cybersecurity
Application programming interfaces (APIs) have become a critical part of networking, programs, applications, devices, and nearly everything else in the computing landscape. This is especially true for cloud and mobile computing, neither of which could probably exist in its current form without APIs holding everything together or managing much of backend functionality. Because of their […]
6 tips for making the most of a tight IT budget
IT leaders seeking to drive enterprise growth through technology investments are often saddled with budgets that make their tasks of increasing the top and bottom lines challenging. The year 2023 seems to be no different. Despite an estimated increase to IT budgets of 5.1% on average for 2023, research firm Gartner points to a projected […]
ServiceNow posts Q4 growth as enterprise automation remains strong
Enterprise software and workplace management orchestrator ServiceNow announced rosy revenue numbers in its Q4 2022 earnings call Wednesday evening, saying that total revenues topped $1.9 billion, which represents a 20% year-on-year increase. IDC analyst Stephen Elliot noted strong corporate management and the company’s expansion into the workplace experience market as contributing factors in the reported […]
Attackers move away from Office macros to LNK files for malware delivery
For years attackers have used Office documents with malicious macros as one of the primary methods of infecting computers with malware. Microsoft finally took steps to disable such scripts by default in documents downloaded from the internet, forcing many groups to change tactics and increasingly choose LNK (shortcut) files as a delivery mechanism. This trend […]
AVM Cloud: Empowering Enterprises in Malaysia to Deploy a Robust Sovereign Cloud
Already a leader in Malaysia’s burgeoning cloud services and solutions sector when it was acquired by Time dotCom, one of the region’s largest fixed-line communications companies in 2021, AVM Cloud recently became one of the select group of providers who offer VMware Cloud Verified Services to earn the VMware Sovereign Cloud distinction. Originally known as […]
H2M architects + engineers’ John McCaffrey on infrastructure lifecycles
John McCaffrey, CIO at H2M architects + engineers, joins host Maryfran Johnson for this CIO Leadership Live interview, jointly produced by CIO.com and the CIO Executive Council. They discuss infrastructure lifecycles, 3D scanning and design, and more. Watch this episode: Listen to this episode: Careers, CIO, CIO Leadership Live
Chinese threat actor DragonSpark targets East Asian businesses
Organizations in Taiwan, Hong Kong, Singapore and China have been recently facing attacks from a Chinese threat actor DragonSpark. The threat actor was observed using the open-source tool SparkRAT for its attacks, according to a report by SentinelOne. SparkRAT is multi-platform, feature-rich, and frequently updated with new features, making the remote access Trojan (RAT) attractive to threat actors. […]
Veterans bring high-value, real-life experience as potential cybersecurity employees
Johanna Wood was an armored crewman with Lord Strathcona’s Horse, a Canadian Army regiment. At first glance, Wood’s military role may seem incompatible with civilian work; there’s not a lot of call for tank operators in private companies. But Wood believes her experience working in tanks gives her a significant edge as she enters the […]
Examining the CIO time management dilemma
CIOs are expected to successfully split their time between duties that can greatly vary day to day. Federal Reserve System CIO Ghada Ijam, for instance, says on a good day, 60% of her time is spent on strategic planning and the rest keeping the business running. As every CIO knows, though, days can be unpredictable, […]
United Airlines gives employees the digital tools to make customers happy
As CIO of United Airlines, Jason Birnbaum is laser focused on using technology and data to enable the company’s 86,000 employees to create as seamless a customer travel experience as possible. “Our goal is to improve the entire travel process from when you plan a trip to when you plan the next trip,” says Birnbaum, […]
Modernize Your Data Stack to Thrive in Uncertain Times
Economic instability and uncertainty are the leading causes for technology budget decreases, according to the IDG/Foundry 2022 annual State of the CIO survey. Despite a desire to cut budgets, data remains the key factor to a business succeeding – especially during economic uncertainty. According to the Harvard Business Review, data-driven companies have better financial performance, are more likely to survive, and […]
CYGNVS exits stealth, trumpeting its cyberattack recovery platform
Cyber recovery startup CYGNVS announced its emergence from stealth today, having raised $55 million in series A funding and created a highly functional “cyber crisis” platform which promises to help organizations recover from major breaches. The company’s product is in its name – CYGNVS says it’s an acronym for Cyber GuidaNce Virtual Space. It’s effectively […]
Data Democratization: How to Balance Performance and Compliance
Hyper competition, globalization, economic uncertainties — all of it converging to drive a C-suite impetus for the business to become more data-driven. Organizations invest in more data science and analytical staff as they demand faster access to more data. At the same time, they’re forced to deal with more regulations and privacy mandates such as […]
Achieve Modern Data Security Governance for Faster Insights
Every company and government entity is tasked with striking a critical balance between data access and security. As Forrester’s Senior Analyst Richard Joyce stated, “For a typical Fortune 1000 company, just a 10 percent increase in data accessibility will result in more than $65 million additional net income.” As the need to become more data-driven […]
P-to-P fraud most concerning cyber threat in 2023: CSI
US financial institutions see peer-to-peer fraud and other digital fraud as the biggest cybersecurity concern in 2023. It was cited by 29% of respondents in a survey by Computer Systems Inc. (CSI), followed by data breaches (23%), ransomware (20%) and a breach at a third party (15%). Industry respondents also expressed concerns over identity theft at […]
Protect Your Data with Zero Trust
As the threat landscape evolves and adversaries find new ways to exfiltrate and manipulate data, more organizations are adopting a zero trust strategy. However, many are only focusing attention on endpoints, leaving the database vulnerable to malicious attacks. Databases are the last line of defense against data exfiltration by cybercriminals. To combat this, it’s essential […]
How a Data Security Platform Tackles the Toxicity of Tool Sprawl
One of the main causes of security operations (SecOps) pain is the sheer number of disparate protection tools now in use across the enterprise, leading to an ever higher volume of alerts, operational inefficiencies, and increased cost. There’s no denying the cybersecurity threat landscape has become extremely dynamic and complex — encompassing data, applications, APIs, […]
ServiceNow to detect open source security vulnerabilities with Snyk integration
ServiceNow Vulnerability Response users will now have access to Snyk Open Source. This will represent the Israeli-US vendor’s advanced software composition analysis (SCA) backed by Snyk’s security intelligence—a combination of public sources, data from the developer community, proprietary expert research, machine learning, and human-in-the-loop AI. ServiceNow Vulnerability Response is part of ServiceNow Security Operations and […]
How passkeys are changing authentication
Passwords are a central aspect of security infrastructure and practice, but they are also a principal weakness involved in 81% of all hacking breaches. Inherent useability problems make passwords difficult for users to manage safely. These security and useability shortcomings have driven the search for alternative approaches known generally as passwordless authentication. Passkeys are a […]
Skyhawk launches platform to provide threat detection and response across multi-cloud environments
Cloud threat detection vendor Skyhawk Security has released a platform designed to address alert fatigue that provides cloud detection and response (CDR) across multi-cloud environments, the company said Tuesday in a statement. The company says the Synthesis platform is being released on a “freemium” basis—the base version is available at no cost, but supplement features […]
CIOs sharpen tech strategies to support hybrid work
A significant number of organizations are operating in a hybrid model — and expect to continue with that hybrid environment for the foreseeable future. Global analytics and advice firm Gallup has found that the percentage of remote-capable workers working in a hybrid environment increased in 2022, moving from 42% in February to 49% in June. […]
Why sustainable transportation needs 5G connectivity and digitalisation
Decarbonising transportation through electrification is critical to helping companies and economies meet net-zero emissions targets. Fortunately, three forces are combining to make this vision for sustainable transportation a reality: connectivity, digitalisation, and cross-sector collaboration. In a recent “fireside chat” on the topic of sustainable transportation, Erik Ekudden, CTO of Ericsson, and Christian Levin, CEO of […]
Brilliance: The CIO’s most seductive career-limiting trait
Good leaders get things done. Great leaders build organizations that get things done. As a leader, being thought of as a source of the great ideas that help get things done is a three-fold liability, especially when you’re working with executive peers outside of IT. The first fold is that if a brilliant idea has […]
Australia fronts International Counter Ransomware Taskforce
The International Counter Ransomware Taskforce (ICRTF), envisioned by the International Counter Ransomware Initiative (CRI), kicked off its operations on Monday with Australia as its inaugural chair and coordinator. The CRI was first brought together in October 2021 with a virtual meeting of 30 countries, facilitated by the US White House National Security Council. In November 2022, […]
Microsoft’s latest OpenAI investment opens way to new enterprise services
OpenAI has landed billions of dollars more funding from Microsoft to continue its development of generative artificial intelligence tools such as Dall-E 2 and ChatGPT. A move that is likely to unlock similar investments from competitors — Google in particular — and open the way for new or improved software tools for enterprises large and […]
Attackers exploiting critical flaw in many Zoho ManageEngine products
Users of on-premises deployments of Zoho ManageEngine products should make sure they have patches applied for a critical remote code execution vulnerability that attackers have now started exploiting in the wild. Technical details about the flaw along with a proof-of-concept exploit was released late last week, which will allow more attackers to add this exploit […]
Nvidia targets insider attacks with digital fingerprinting technology
Nvidia today announced that a digital lab playground for its latest security offering is now available, letting users try out an AI-powered system designed to monitor individual user accounts for potentially hazardous behavior. The idea, according to the company, is to leverage the large amounts of data that many organizations compile anyway about login and […]
CIOs step up to fill plus-size leadership roles
With a career path that wound through R&D, product development, advanced supply chain, and technology, Praveen Jonnala is well positioned to lead a global IT organization as well as take the reins of operations and other core business functions. Jonnala stepped in as CIO at network infrastructure provider CommScope two years ago after more than […]
Murat Ozkan, Chief Information and Digital Officer at Anadolu Efes
Murat Ozkan, Chief Information and Digital Officer at Anadolu Efes, the Turkey-based international beverages company, talks about how a data management strategy comprising AI and analytics will sustain further growth. Watch the episode: Listen to the episode: CIO Leadership Live
US Supreme Court leak investigation highlights weak and ineffective risk management strategy
The Supreme Court of the United States (SCOTUS) has announced that its investigation to find the insider who leaked a draft opinion of the Dobbs v. Jackson Women’s Health Org. decision to media outlet Politico has come up empty. In a nutshell, the court’s insider risk management program, designed to protect the information the justices […]
The Impossible Manual Task for Outdated Contact Centers
The cloud, combined with conversational artificial intelligence (AI), is dramatically expanding the capabilities of the modern-day contact center. These solutions are the twin pillars of contact center success, allowing them to serve more customers faster and more effectively. The two technologies go hand in hand for creating the flexible, flawless customer experience (CX) that companies […]
The metaverse brings a new breed of threats to challenge privacy and security gatekeepers
The metaverse is coming; businesses and government agencies are already building virtual worlds to support city services, meetings and conferences, community building, and commerce. They’re also rendering spatial apps around travel, car sales, manufacturing, and architecture in what Citi predicts will be a $13-trillion market with 5 billion users by 2030. “Just as the internet, […]
2023: The year of the rise of the digital economy in GCC countries
The pandemic has led many organizations in the Middle East to shift towards a digital-first strategy. According to IDC’s group vice president and regional managing director for the Middle East, Turkey, and Africa, Jyoti Lalchandani: “This means choosing digitalization options over non-digital options as a rule while implementing or enhancing new products, services, channels, customer/employee […]
DEI that works: 5 companies reaping the benefits of IT diversity strategies
The tech industry has long been known for its lack of diversity and, as a result, there’s been a big push for companies to take DEI strategies seriously. Diversity not only helps organizations perform better but fostering equity and inclusion can also strengthen recruiting and retention rates, as well as overall employee satisfaction. In fact, […]
Wallarm touts API leak protection with new scanning feature
API security company Wallarm announced Frdiay that it had opened a preview period for its newest offering — an active scanning system that checks through public sources of compromised API data, alerts users, and provides automated responses if a compromise is detected. The API Leak Protection feature, which will be deployed via Wallarm’s existing End-to-End […]
What is business intelligence? Transforming data into business insights
Business intelligence definition Business intelligence (BI) is a set of strategies and technologies enterprises use to analyze business information and transform it into actionable insights that inform strategic and tactical business decisions. BI tools access and analyze data sets and present analytical findings in reports, summaries, dashboards, graphs, charts, and maps to provide users with […]
Does the Future of Work include Network as a Service (NaaS)?
By: Cathy Won, Consultant with eTeam, HPE Aruba Contributor. The Future of Work and the Workplace is a 2023 Leesman survey report co-authored by HPE Aruba. The report explores the critical questions on the minds of business leaders coming out of the pandemic today. What is the future of work and the workplace? How must organizations adapt? Unsurprisingly, […]
IoT Adoption in Healthcare Brings Security Opportunities
By Anand Oswal, Senior Vice President and GM at cyber security leader Palo Alto Networks Connected medical devices, also known as the Internet of Medical Things or IoMT, are revolutionizing healthcare, not only from an operational standpoint but related to patient care. In hospital and healthcare settings around the world, connected medical devices support critical […]
The Technology Enabling Successful Hybrid Workforce Transformation
What was once an anomaly is now a global reality as remote and hybrid work models settle in across industries. To adapt to this new “new normal,” organizations will need to reinforce their workforces with technologies that can keep pace. In 2022, the percentage of remote workdays in the US soared above the pre-pandemic levels […]
The Reason Many AI and Analytics Projects Fail—and How to Make Sure Yours Doesn’t
Topping the list of executive priorities for 2023—a year heralded by escalating economic woes and climate risks—is the need for data driven insights to propel efficiency, resiliency, and other key initiatives. Many companies have been experimenting with advanced analytics and artificial intelligence (AI) to fill this need. Now, they must turn their proof of concept […]
How Well-Established Enterprises Can Achieve Innovation Without Disruption
Before any innovation initiative starts, there are questions (and usually lots of them). What is innovation and, more importantly, what does it mean for your organization? What fears or misperceptions hold innovation back? If you haven’t yet, check out this blog before reading this follow-up piece. Decades ago, Netflix mailed DVDs to homes and a copy of […]
T-Mobile suffers 8th data breach in less than 5 years
Telecom player T-Mobile US has suffered a cybersecurity incident that resulted in the exposure of personal details of 37 million users, the company reported in a filing to the US Securities and Exchange Commission on Thursday. Customer data such as customer name, billing address, email, phone number, date of birth, T-Mobile account number and information such as […]
The essential check list for effective data democratization
Truly data-driven companies see significantly better business outcomes than those that aren’t. According to a recent IDC whitepaper, leaders saw on average two and a half times better results than other organizations in many business metrics. In particular, companies that were leaders at using data and analytics had three times higher improvement in revenues, were […]
Three Keys to Protecting the Corporate Network in the Era of Hybrid Work
Remote and hybrid work is here to stay. In an increasingly complex security environment, no challenge looms larger than how to protect remote devices that tie back into the corporate network. In fact, modernizing networking technologies ranks among the top IT goals for 2022 according to an IDG survey conducted on behalf of Insight Enterprises. With more users […]
Many ICS flaws remain unpatched as attacks against critical infrastructure rise
Patching vulnerabilities in industrial environments has always been challenging due to interoperability concerns, strict uptime requirements, and sometimes the age of devices. According to a recent analysis, a third of vulnerabilities don’t even have patches or remediations available. Out of 926 CVEs — unique vulnerability identifiers — that were included in ICS advisories from the […]
Leveraging Cybersecurity to Supercharge Retail’s Frontline
By Ravi Balwada, CTO of Guitar Center In retail, we don’t have the luxury of thinking about security as an afterthought. We have to think about security early in the innovation process and make sure our security best practices, governance and architectures are taken into account when we are designing our solutions—everything from defining what […]
Why you don’t have to fix every vulnerability
The word “vulnerability” typically comes with a “must fix now” response. However, not all vulnerabilities should be treated equally because not all of them pose a risk. It all depends on what the data represents. In fact, some vulnerabilities are OK to deprioritize, depending on associated threats and the value of the asset at risk. […]
Delegation: The biggest test for transformational CIOs
Two events influenced Schneider Electric CIO Elizabeth Hackenson to distribute more decision-making authority throughout the company’s IT organization. “During the pandemic we needed to have people make as many local decisions as possible,” which she says was essential to keep operations moving across the 100 countries in which the company operates. More importantly, the company’s […]
Chinese hackers targeted Iranian government entities for months: Report
Chinese advanced persistent threat actor, Playful Taurus, targeted several Iranian government entities between July and December 2022, according to a Palo Alto Networks report. The Chinese threat actor also known as APT15, KeChang, NICKEL, BackdoorDiplomacy, and Vixen Panda, was observed attempting to connect government domains to malware infrastructure previously associated with the APT group, according […]
How CISOs can manage the cybersecurity of high-level executives
High-level executives, including board members and C-level executives, often have access to sensitive information, making them prime targets for bad actors looking to penetrate corporate defenses. Their personal devices, among other points of entry, are glaring attack vectors for cybercriminals looking to get in on the top floor. As CISOs know, cyber incidents all too often […]
The Significance of Open Source Software in the Digital-First Future Enterprise
As companies shift their focus from the digital transformation of individual processes to the business outcomes enabled by a digitally transformed organisation, software engineering will become a core enterprise capability. To become a software-powered organisation, companies must first identify and address the concerns of its developers in areas such as developer experience, developer velocity and […]
CIO Leadership live with Derek Cullen, CIO of Stikeman Elliott
Derek Cullen, CIO, Stikeman Elliott discusses the evolving role of the CIO as a leader and business partner. He also discusses supporting career development through networking and volunteering. Watch this episode: Listen to this episode: CIO, CIO Leadership Live
CIO Wendy Pfeiffer on getting hybrid work right
Wendy M. Pfeiffer is a technology leader who’s as dedicated to excellence in operations and delivery as she is to maintaining a focus on innovation. She joined Nutanix as SVP and CIO following a successful career leading technology teams at companies like GoPro, Yahoo, Cisco Systems, and Robert Half. Highly regarded by her industry peers for […]
8 ‘future of work’ mistakes IT leaders must avoid
CIOs supporting a hybrid mix of in-office and remote workers, and those who float between, need to implement new tools and strategies to get it right. But they will also need to change how they think about hybrid work, which analyst firm Forrester characterizes as “messy” even as it says 51% of organizations are moving […]
Lawsuit claims IBM falsely used mainframe sales to boost AI, cloud businesses
A lawsuit has been filed against 13 current and former IBM executives, including CEO and Chairman Arvind Krishna and former CEO Ginni Rometty, accusing the company of securities fraud — bundling mainframe sales together with those of poorly performing products in order to make them appear more profitable than they actually were. The lawsuit was […]
(ISC)² CISO Jon France shares predictions for 2023
Jon France – Chief Information Security Officer at (ISC)² – joins Xiou Ann Lim for this CSO Executive Sessions interview. They discuss predictions in cybersecurity for 2023, how CISOs can prepare for the year ahead, and more. To read this article in full, please click here
QuSecure launches quantum-computing based security for endpoints
QuSecure, a quantum-computing technology company based in Silicon Valley, today announced the latest version of its security platform, called QuEverywhere — designed to allow organizations to extend quantum-safe security all the way to endpoints like laptops and smartphones, the company said in a statement. QuEverywhere, according to the company, is an app- or browser-based method […]
So, You’re Moving Your Contact Center to the Cloud
‘Cloud’ is a buzzword that has run its course in a lot of industries, but there is a resurgence of cloud talk in the contact center arena these days. Contact Center as a Service (CCaaS) is a high-priority digital transformation project for many businesses around the world, and some of the biggest players in tech […]
Perception Point launches Advanced Threat Protection for Zendesk
Threat protection company Perception Point has launched Advanced Threat Protection for Zendesk to provide detection and remediation services for Zendesk customers. Perception Point said that customers can now protect customer service software Zendesk a single, consolidated platform alongside their email, web browsers and other cloud collaboration apps. Advanced Threat Protection for Zendesk has been built […]
Trustwave relaunches Advanced Continual Threat Hunting with human-led methodology
Cybersecurity vendor Trustwave has announced the relaunch of its Advanced Continual Threat Hunting platform with new, patent-pending human-led threat hunting methodology. The firm claimed the enhancement will allow its SpiderLabs threat hunting teams to conduct increased human-led threat hunts and discover more behavior-based findings that could go undetected by traditional endpoint detection and response (EDR) […]
Why it's time to review your on-premises Microsoft Exchange patch status
We start the patching year of 2023 looking at one of the largest releases of vulnerability fixes in Microsoft history. The January 10 Patch Tuesday update patched one actively exploited zero-day vulnerability and 98 security flaws. The update arrives at a time when short- and long-term technology and budget decisions need to be made. This […]
How IT leads can build a high-performing environment for sales teams
Karl Nicholson, Technology Evangelist at Slack Ask any tech team, and they’ll tell you that the use of workplace apps has skyrocketed in recent years. Off the back of the pandemic, an age of technological empowerment swept in — where employees had greater autonomy in choosing the best tools they needed to do their best […]
4 ways upskilling and reskilling can fill hard-to-hire positions
The employees you need may already be on your team but out of sight. Looking for existing staff with transferable skills, hidden skills, technical learnability, and hidden knowledge can bring these potential employees into focus. Transferable skills These are comprised of knowledge, experience, and abilities that make it easier to learn new skills. Within IT, […]
How attackers might use GitHub Codespaces to hide malware delivery
Attackers could start abusing GitHub Codespaces, a new service that allows developers to create and test applications inside development containers running on GitHub’s servers. Developers can make their applications accessible via public GitHub URLs for preview by others, a functionality that can be abused to distribute malware payloads in a stealthy way. “If the application […]
Remote.it takes steps toward zero trust with 'single line of code' provisioning
Network management company Remote.it today announced new features for its core SaaS-based service, including support for the Okta user identification platform and Docker containers, and what it’s describing as “programmatic deployment” of zero trust networks. Essentially, the company said, the idea is to provide automated provisioning and deployment of network access to managed assetts — […]
Spend Less, Get More: How Switching from Legacy PDF Editor Can Elevate Your Business
The PDF is a de facto electronic file format for a wide range of industries, giving organizations a reliable way to present information to others in a format that remains consistent no matter the user’s underlying hardware or software. From financial statements and invoices to purchase orders and healthcare records, PDFs are a fundamental element […]
COP27: successes, failures, and next steps
Like its predecessors, COP27 offered mixed results. As the conference’s detractors have long lamented, if COPs were truly effective, we wouldn’t have needed 27 of them. Still, there are some genuine marks of progress to celebrate. A landmark “loss and damage” fund will come as welcome news for the many vulnerable countries that have been […]
5 top IoT sustainability trends for 2023
The new year brings familiar problems for cities around the world. Many countries are still facing a multitude of crises: climate change continues to accelerate, economies are under pressure, and consumers are coping with inflation and skyrocketing energy bills. But a new year also brings a renewed sense of optimism and fresh focus. Innovators are […]
CIO Leadership live with TAB’s Fred Laury
Fred Laury, Chief Digital Officer at TAB New Zealand, on the importance of empathy to influence and collaborate, how the CIO role is changing post-pandemic, and how he’s learned to adjust the sails in rough waters. Watch this episode: Listen to this episode: CIO, CIO Leadership Live
How FiveStars re-engineered its data engineering stack
Building and managing infrastructure yourself gives you more control — but the effort to keep it all under control can take resources away from innovation in other areas. Matt Doka, CTO of FiveStars, a marketing platform for small businesses, doesn’t like that trade-off and goes out of his way to outsource whatever he can. It […]
Accelerating Aerospace Organizational Innovation, Speed, and Resilience with Digital Technologies
Aerospace organizations are pushing new boundaries every day. Their products, research, and technologies are changing the way the world works. We see it every day in the way humanity relies on communication, global positioning, and special analytics to enable smart cities, smart cars, and smart factories. It is their ability to systematically innovate, push boundaries, […]
US Maritime Administrator to study port crane cybersecurity concerns
The 2023 National Defense Authorization Act (NDAA) passed by Congress and signed by President Biden in late December 2022 was filled with a host of military-related cybersecurity provisions. One little-noticed provision in the bill called for a study of cybersecurity and national security threats posed by foreign-manufactured cranes at United States ports. Under this provision, […]
European data protection authorities issue record €2.92 billion in GDPR fines
European data regulators issued a record €2.92 billion in fines last year, a 168% increase from 2021. That’s according to the latest GDPR and Data Breach survey from international law firm DLA Piper, which covers all 27 Member States of the European Union, plus the UK, Norway, Iceland, and Liechtenstein. This year’s biggest fine of […]
DigiCert releases Trust Lifecycle Manager to unify certificate management, PKI services
Digital security certificate company DigiCert has announced the launch of DigiCert Trust Lifecycle Manager – a new solution designed to unify certificate authority-agnostic certificate management and public key infrastructure (PKI) services. Available now as part of the DigiCert ONE platform, Trust Lifecycle Manager aims to set a new standard for managing trust within an organization’s […]
4 moves CIOs should make to achieve a more efficient IT organization
The effects of such an unpredictable environment are profound, and no organization in any industry is immune. Looking across our client base, we expect to see varying degrees of impact as the turbulence continues. The common thread? In almost every case, there’s an increased need for data insight and technology-enabled agility to reaffirm technology’s position […]
The 7 new rules of IT leadership
The CIO role continues to evolve, changing as dramatically as the technology it manages and maintains. Moreover, the pace of the chief IT position’s transformation seems to be accelerating — likewise mirroring the speed of change in the tech stack. Consequently, tech executives must lead, manage, and work differently than they did in the past. […]
How AI chatbot ChatGPT changes the phishing game
ChatGPT, OpenAI’s free chatbot based on GPT-3.5, was released on 30 November 2022 and racked up a million users in five days. It is capable of writing emails, essays, code and phishing emails, if the user knows how to ask. By comparison, it took Twitter two years to reach a million users. Facebook took ten […]
Choice Hotels’ all-in cloud journey to sustainable business value
Choice Hotels International’s early and big bet on the cloud has allowed it to glean the many benefits of its digital transformation and devote more energies to a key corporate value — sustainability, its CIO maintains. That is largely due to the 80-year-old hotel chain’s tight partnership with Amazon Web Services, says Choice CIO Brian […]
7 tell-tale signs of fake DevOps
There’s no doubt that DevOps has helped many IT organizations achieve their goal of delivering applications and services faster and better than traditional software development processes. Unfortunately, while some IT leaders do a fine job of trumpeting DevOps’ benefits, their teams are headed in the wrong direction, embracing half-baked or completely wrong tools and practices. […]
Attackers deploy sophisticated Linux implant on Fortinet network security devices
In December network security vendor Fortinet disclosed that a critical vulnerability in its FortiOS operating system was being exploited by attackers in the wild. This week, after additional analysis, the company released more details about a sophisticated malware implant that those attackers deployed through the flaw. Based on currently available information, the original zero-day attack […]
Is Your Contact Center Recession-Proof?
In some form or another, a recession is looking increasingly likely in 2023. The Conference Board, a global nonprofit think tank, called for a 96% probability of recession in the U.S. within 12 months from October 2022. That’s a steep increase from the 0% likelihood in early 2020 through early 2022.[1] We can be confident […]
Google Cloud for Retailers adds AI-based inventory, e-commerce tools
In a bid to help retailers transform their in-store, inventory-checking processes and enhance their e-commerce sites, Google on Friday said that it is enhancing Google Cloud for Retailers with a new shelf-checking, AI-based capability, and updating its Discovery AI and Recommendation AI services. Shelf-checking technology for inventory at physical retail stories has been a sought-after […]
5 Signs Your PMO is on the Hot Seat
Not too long ago, I was on a call with a top-level executive at a large enterprise. During the discussion, I heard something pretty shocking: They were looking seriously at getting rid of the project management office (PMO) altogether. Even more disturbing: I don’t see this as an aberration. In a significant number of businesses, […]
Five Trends in 2023 Strategic Portfolio Planning
Heading into 2020, there were plenty of predictions about the year ahead (not to mention detailed business plans, economic forecasts, scheduled events, and so on)—and all were rendered worthless by the pandemic. Looking ahead to 2023, therefore, I do so with a healthy dose of humility, and an acknowledgement that there will be monumental events […]
Royal ransomware group actively exploiting Citrix vulnerability
The Royal ransomware group is believed to be actively exploiting a critical security flaw affecting Citrix systems, according to the cyber research team at cyber insurance provider At-Bay. Announced by Citrix on November 8, 2022, the vulnerability, identified as CVE-2022-27510, allows for the potential bypass of authentication measures on two Citrix products: the Application Delivery […]
2 Innovations That Can Tip the Balance in Cybersecurity
By John Davis, Retired U.S. Army Major General and Vice President and Federal Chief Security Officer for Palo Alto Networks What critical innovations can change the balance in cybersecurity, providing those of us responsible for defending our organizations with more capabilities against those who would do us harm? This is not just a theoretical exercise. […]
Securing Critical Infrastructure with Zero Trust
By Anand Oswal, Senior Vice President and GM at cyber security leader Palo Alto Networks Critical infrastructure forms the fabric of our society, providing power for our homes and businesses, fuel for our vehicles, and medical services that preserve human health. With the acceleration of digital transformation spurred by the pandemic, larger and larger volumes […]
NASA overspent $15 million on unused Oracle licenses as it failed to track usage
All Posts The US National Aeronautics and Space Administration (NASA) has overspent about $15 million on Oracle software over the past five years because it lacked a centralized software asset management practice, according to an audit report published by the space agency’s office of the inspector general (OIG). The report attributes the huge over-expenditure […]
Diversity and inclusion: 7 best practices for changing your culture
Diversity and inclusion (D&I) have become necessary missions for most businesses. Research has long shown that diverse teams are more productive, more engaged, and the companies that create them are more profitable. And the murder of George Floyd — and the social unrest that followed — made it clear that taking a stand around social […]
Top automation pitfalls and how to avoid them
First Tech Credit Union is a San Jose-based financial institution with more than $16 billion in assets. As the eighth largest in the country, it primarily serves tech companies and their employees, but still has a lot of manual processes in place. “We’re very early in our automation journey,” says Mike Upton, the organization’s digital […]
Nvidia offers retail loss prevention software to accelerate accelerator chip sales
GPU manufacturer Nvidia is expanding its enterprise software offering with three new AI workflows for retailers it hopes will also drive sales of its hardware accelerators. The workflows are built on Nvidia’s existing AI technology platform. One tracks shoppers and objects across multiple camera views as a building block for cashierless store systems; one aims […]
Innovative Manufacturers are Investing in these Advanced Technologies
In many ways, the manufacturing industry stands on edge—emerging from a pandemic and facing all-time highs in demand yet teetering on inflation-related economic uncertainty and coping with skilled labor shortages. Answering these concerns, smart factories are moving to another edge: edge computing, where operational data from Internet of Things (IoT) sensors can be collected and […]
Chatbot Security in the Age of AI
With each passing year, contact centers experience more of the benefits of artificial intelligence. This technology — once only a distant idea portrayed with wonder and fear in science fiction — is now a key part of how businesses and customers interact. According to survey data from Call Centre Helper, customer satisfaction is the number one factor […]
CIO Leadership Live with Corinne Sharp, Co founder & CMO of the WIT Network
Women in Technology – Corinne Sharp, Co founder &CMO the WIT Network, talks about building support and community for women in technology. You can learn more at https://thewitnetwork.com/ Watch this video: Listen to this episode: Careers, CIO, CIO Leadership Live
CloudSek launches free security tool that helps users win bug bounty
Cybersecurity firm CloudSek has launched BeVigil, a tool that can tell users how safe the apps installed on their phone are, and helps users and developers win bug bounty by helping them identify and report bugs in the code. BeVigil scans all the apps installed on a user’s phone and rates them as dangerous, risky, […]
Cybersecurity spending and economic headwinds in 2023
Now that everyone, their brother, sister, and dog have chimed in on cybersecurity predictions for 2023, here are a few observations based on some recent ESG research. First the numbers: 53% of organizations will increase IT spending in 2023, 30% say IT spending will remain flat in 2023, and 18% forecast a decrease in IT […]
Data strategy is a differentiator for universities. Here’s how to get it right
Data is critical to success for universities. Data provides insights that support the overall strategy of the university. It can also help with specific use cases: from understanding where to invest resources and discovering new ways to engage pupils, to measuring academic outcomes and boosting student performance. Data also lies at the heart of creating […]
3 nonprofits committed to empowering women in tech
A 2020 report from McKinsey found that companies with stronger gender diversity numbers were 25% more likely to outperform their less diverse competition. Yet, while companies have placed a greater emphasis on addressing the gender gap of late, women remain largely underrepresented in IT positions. Here, a number of factors are at play, not the […]
Agritech forces gain ground across Africa
“Land never deceives” is a common slogan of farmers around Africa. Many people go into farming entirely, or as a side endeavor, with a high certainty they’ll make money and produce more good for all. And when technology is added to the mix, opportunities multiply. Having the largest area of uncultivated arable land in the […]
Journey Beyond transforms its contact center to deliver better customer journeys
Journey Beyond, a part of Hornblower Group, is Australia’s leading experiential tourism group. Headquartered in Adelaide, it operates 13 brands and experiences spanning the country. The company’s overall strategy is to “have a customer experience that’s second-to-none — from the moment they first engage with the company to plan their experience, to when they return […]
Events and Awards UK: New for 2023
2023 sees the return of in-person events and awards. Here are the details for our packed schedule this year. January Applications launch for the 2023 Next CIO cohort on Friday 20th January. The award recognises and celebrates the best rising stars across the IT Sector in the UK. Through interviews at CIO UK, awards, and mentoring opportunities, […]
Cybercriminals bypass Windows security with driver-vulnerability exploit
The Scattered Spider cybercrime group has recently been observed attempting to deploy a malicious kernel driver using a tactic called bring your own vulnerable driver (BYOVD) — a warning to security professionals that the technique, which exploits longstanding deficiencies in Windows kernel protections, is still being employed by cybercriminals, according to cybersecurity company CrowdStrike. In […]
Study shows attackers can use ChatGPT to significantly enhance phishing and BEC scams
Security researchers have used the GPT-3 natural language generation model and the ChatGPT chatbot based on it to show how such deep learning models can be used to make social engineering attacks such as phishing or business email compromise scams harder to detect and easier to pull off. The study, by researchers with security firm […]
Giant Eagle’s Kirk Ball on grocery retail innovations
Kirk Ball, Chief Information Officer/Chief Technology Officer, Giant Eagle, joins host Maryfran Johnson for this CIO Leadership Live interview, jointly produced by CIO.com and the CIO Executive Council. They discuss grocery retail innovations, digital customer strategies, sourcing global talent, augmented reality and more. Watch this video: Listen to this episode: CIO, CIO Leadership Live
Understanding Innovation as a Large, Well-established Enterprise
Innovation is crucial to the continuing success of any business, especially well-established enterprises. New products and ideas are tested every day, just as new opportunities are ignored. Blockbuster thought going digital would be too expensive. Blackberry failed to adapt to the changing smartphone market. Toys R Us sued Amazon versus using them to build an […]
Timeline of the latest LastPass data breaches
On November 30, 2022, password manager LastPass informed customers of a cybersecurity incident following unusual activity within a third-party cloud storage service. While LastPass claims that users’ passwords remain safely encrypted, it admitted that certain elements of customers’ information have been exposed. The security incident was the latest to affect the service in recent times […]
8 top priorities for CIOs in 2023
Welcome to 2023. As the new year arrives, CIOs are facing a challenging to-do list as they strive to maximize IT productivity and efficiency in increasingly unpredictable times. As technology projects, budgets, and staffing grew over the past few years, the focus was on speed to market to maximize opportunity, says Troy Gibson, CIO services […]
University of Ottawa’s Martin Bernier on continuous learning
A CIO has to understand the focus of the overall business, of course, but there are usually many segments or different dimensions to consider. In Martin Bernier’s case, as CIO of the University of Ottawa, managing the hyper-dynamic environment of 50,000 students, faculties and research groups is a discipline that requires both a holistic and […]
Data leak exposes information of 10,000 French social security beneficiaries
[Editor’s note: This article originally appeared on the Le Monde Informatique website.] More than 10,000 beneficiaries of a local branch of the French social security agency CAF, or Family Allowance Fund, saw their data exposed for about 18 months, after a file containing personal information was sent to a service provider. The mistake, discovered by […]
The Delicate Dance Between AI and Human Agents
Artificial intelligence will soon take center stage in your contact center — if it hasn’t already. Artificial intelligence (AI) uptake increased dramatically over the last few years. A 2022 PwC report revealed that more than 70% of companies were already using or planning to deploy AI in some form within their business operations. Business leaders […]
Intel boosts VM security, guards against stack attacks in new Xeon release
Intel today announced the rollout of the fourth generation of its Xeon family of server chipsets, detailing several new features under the company’s confidential computing umbrella of security features. Improvements to Intel’s trusted execution environment and a new technique for combatting jump- and return-oriented programming attacks were the most notable upgrades. Xeon’s fourth generation introduces […]
How to Future-Proof Your Technology With No-Code/Low-Code Solutions
When it comes to technology, among the biggest concerns companies face is the rigidity and inflexibility of legacy platforms. These platforms make it difficult for business and IT leaders facing ever-evolving business needs to seamlessly implement a change. In some cases, an organization’s current tools simply can’t perform a necessary change or add a new […]
How to Protect Your IT Systems During Power Interruptions
Nowadays, the world seems to experience once-in-a-century storms almost monthly. These cataclysmic weather events often cause extensive property damage, including major disruptions to the power grid that can cripple IT systems. More commonly, human error and power fluctuations can be just as costly and devastating to continued IT service delivery. To avoid costly outages and […]
CIO Leadership Live with Veneeth Purushotaman, Group Chief Information Officer, Aster DM Healthcare
Veneeth Purushotaman, Group CIO at Aster DM Healthcare explains how the hospital digital strategy helped them to become the first private hospital in Dubai to secure HIMSS Stage 6 certification. Watch the episode: Listen to the episode: CIO Leadership Live
How Can Contact Centers Use AI-Powered Chatbots Responsibly?
Chatbots have been maturing steadily for years. In 2022, however, they showed that they’re ready to take a giant leap forward. When ChatGPT was unveiled a few short weeks ago, the tech world was abuzz about it. The New York Times tech columnist Kevin Roose called it “quite simply, the best artificial intelligence chatbot ever […]
How Graph Analytics is Helping Improve Personalized Healthcare
When the world’s largest healthcare company by revenue went looking for a technology solution that could improve quality of care while reducing costs, the search took ten years. What they found—an innovative way to model healthcare data—is saving the company an estimated $150M annually and enabling its medical professionals to provide accurate and effective care […]
The New Way Companies are Harnessing Data at the Edge for Value Added in Real-Time
Imagine an airport that uses computer vision to track errant luggage in real time, or a commercial kitchen able to detect refrigeration conditions and prevent spoilage. Imagine an amusement park outfitting its rides with sensors that can talk directly to operations for upgraded safety and better guest experiences. Imagine a factory or a chain of […]
Top 9 challenges IT leaders will face in 2023
Three years ago, IT leaders were squarely focused on how to adopt fledgling AI techniques and approaches into their business models in service of digital transformations that included plans for shifting some workloads to the cloud. But then the pandemic hit, requiring a historic pivot that set some best-laid plans aside and accelerated others. Now […]
How SAP Helped Create a Next-Generation Factory for Beauty and Sustainability
The product line is designed to be beautiful as well as sustainable in terms of its durability and benefits for the environment. It’s highly resistant to scratches, abrasions, dry heat, solvents and cleaners, food, ink, makeup, crayons, and much more so that it can stay beautiful for years to come. But what the revolutionary high-pressure […]
11 top XDR tools and how to evaluate them
Little in the modern IT world lends itself to manual or siloed management, and this is doubly true in the security realm. The scale of modern enterprise computing and modern application stack architecture requires security tools that can bring visibility into the security posture of modern IT components and integrate tightly to bring real-time threat […]
If governments are banning TikTok, why is it still on your corporate devices?
TikTok, the viral app resident on millions of devices, was recently banned from executive branch devices in the United States, as set out in in the recent Omnibus Bill signed by President Joe Biden. The Omnibus Bill, as detailed in CSO Online’s overview, highlighted that the “legislation required the Office of Management and Budget in […]
Estes Express shifts gears on customer experience by streamlining data operations
Customers are increasingly demanding access to real-time data, and freight transportation provider Estes Express Lines is among the rising tide of enterprises overhauling their data operations to deliver it. To fuel self-service analytics and provide the real-time information customers and internal stakeholders need to meet customers’ shipping requirements, the Richmond, VA-based company, which operates a […]
14 UK schools suffer cyberattack, highly confidential documents leaked
More than a dozen schools in the UK have suffered a cyberattack which has led to highly confidential documents being leaked online by cybercriminals. That’s according to a report from the BBC which claimed that children’s SEN information, child passport scans, staff pay scales and contract details have been stolen by notorious cybercrime group Vice […]
Twitter's mushrooming data breach crisis could prove costly
Since Elon Musk purchased Twitter in late October, non-stop turmoil and controversy have dogged the company, from massive staff firings and resignations to reputational damage from Musk’s careless and often bizarre tweets. Now, mushrooming concern around a possible data breach stemming from a now-fixed Twitter flaw is poised to drive the company further down unless […]
How CIOs can be pillars of stability in an uncertain world
Stop me if you’ve heard this one before. Several economists, a bank president, and a couple of reporters walk into a bar. The economists lament, “A thick fog of uncertainty still surrounds us.” The bank president wails, “Economic hurricane.” The reporters keen about “gut-churning feelings of helplessness” and “a world of confusion.” Sitting in a […]
Attackers create 130K fake accounts to abuse limited-time cloud computing resources
A group of attackers is running a cryptomining operation that leverages the free or trial-based cloud computing resources and platforms offered by several service providers including GitHub, Heroku, and Togglebox. The operation is highly automated using CI/CD processes and involves the creation of tens of thousands of fake accounts and the use of stolen or […]
Low code/no code tools reap IT benefits—with caveats
Low-code/no-code visual programming tools promise to radically simplify and speed up application development by allowing business users to create new applications using drag and drop interfaces, reducing the workload on hard-to-find professional developers. A September 2021 Gartner report predicted that by 2025, 70% of new applications developed by enterprises will use low-code or no-code technologies, up from […]
Sara Fenwick, Vice President Business Technology, Ren’s Pets
Women in IT – Sara Fenwick shares her journey as a tech leader in Canada to support diversity, equity and inclusion and her role as a woman in leadership. Watch the episode: Listen to the episode: CIO Leadership Live
NATO tests AI’s ability to protect critical infrastructure against cyberattacks
Autonomous intelligence, artificial intelligence (AI) that can act without human intervention, can help identify critical infrastructure cyberattack patterns and network activity, and detect malware to enable enhanced decision-making about defensive responses. That’s according to the preliminary findings of an international experiment of AI’s ability to secure and defend systems, power grids and other critical assets […]
The BISO: bringing security to business and business to security
Throughout her career in IT security, Irina Singh has thrived on difficult projects. With a bachelor of science degree in management of information systems and a minor in international business, she now manages a team of business information security liaisons serving four foundational business units at medical device company Medtronic. “One of my slogans is that we […]
Why Investing in the Database Market Is More Interesting Than Ever
By Olaf de Senerpont Domis, senior editor at DataStax Premji Invest is an evergreen fund formed to support the Azim Premji Foundation, which was founded by Azim Premji, the former chairman of IT services consultancy Wipro. Premji Invest deploys a “crossover format” (investing in both private and public companies) across the technology, healthcare, consumer, and FinTech […]
What it takes to succeed as a CIO today
The market for technology talent has been white hot over the past year. What will the next twelve to eighteen months bring? On a recent episode of the Tech Whisperers podcast, two executive recruiters in the CIO retained search space, Martha Heller, CEO of Heller Search Associates, and Art Hopkins, executive director of Russell Reynolds Associates’ […]
Attackers use stolen banking data as phishing lure to deploy BitRAT
In a case that highlights how attackers can leverage information from data breaches to enhance their attacks, a group of attackers is using customer information stolen from a Colombian bank in phishing attacks with malicious documents, researchers report. The group, which might have been responsible for the data breach in the first place, is distributing […]
Cyberattacks against governments jumped 95% in last half of 2022, CloudSek says
The number of attacks targeting the government sector increased by 95% worldwide in the second half of 2022 compared to the same period in 2021, according to a new report by AI-based cybersecurity company CloudSek. The increase in attacks can be attributed to rapid digitization and the shift to remote work during the pandemic, which […]
Meta hit with $413 million fine in EU for breaking GDPR rules
Regulatory wrangling results in a huge new fine over Facebook and Instagram data handling, even as Meta vows to appeal and EU data protection groups prepare for a court battle.
Why investing in automation could be the answer to navigating a tough economic climate
Despite its potential for relieving pressure on the workforce, automation in the workplace is often seen negatively, as a cause of job losses or a growing skills gap. Yet, done well, automation can provide critical support that frees people up to focus on more impactful work — and can lead to happier, more motivated and […]
Society 5.0: What To Do Today To Be Ready To Support Human-Centered Innovation
Society 5.0 was proposed in the “5th Science and Technology Basic Plan” as a future society to which Japan should aspire. It brings together concerns for people, planet, and profit equally in order to build a better world. In Society 5.0, we believe everyone can have an abundant and balanced life. A “new wisdom” will be developed […]
What’s New and What’s Next in 2023 for HPC
Cloud, sustainability, scale, and exponential data growth—these major factors that set the tone for high performance computing (HPC) in 2022 will also be key in driving innovation for 2023. As more organizations rely on HPC to speed time to results, especially for their data-intensive applications, the $40B market[1] faces challenges and opportunities. Fortunately, the HPC community […]
Salesforce to cut 10% of its global workforce in restructuring plan
Almost two months after cloud-based CRM software provider Salesforce announced it would be cutting around 950 jobs, the company has announced it will lay off about 10% of its workforce, roughly 8,000 employees, and close some offices as part of a restructuring plan. Salesforce had nearly 80,000 global employees as of February 2022, up from […]
IBM reorganizes partner program to incentivize indirect sales
IBM is reorganizing its partner program in a bid to serve clients through partners with the same level of expertise as it does directly. This is a big deal for all but its largest clients, as IBM has spent the last two years moving much of its focus to indirect sales channels. IBM now has […]
Kudzai Kanhutu, Dean Royal Australasian College of Physicians, Infectious diseases specialist with Royal Melbourne Hospital
Leading digital health expert, Kudzai Kanhutu reflects on how she and her peers helped Melbourne deal with Australia’s worst COVID experiences, forever transforming how we care for our sick and elderly. Watch the episode: CIO Leadership Live
Why it might be time to consider using FIDO-based authentication devices
Every business needs a secure way to collect, manage, and authenticate passwords. Unfortunately, no method is foolproof. Storing passwords in the browser and sending one-time access codes by SMS or authenticator apps can be bypassed by phishing. Password management products are more secure, but they have vulnerabilities as shown by the recent LastPass breach that […]
Picture This: How Graph Analytics Simplifies Complex Insights
Enterprises across multiple industries and domains are increasingly turning to graph analytics, thanks to its power to uncover complex non-linear patterns and relationships in a dataset that would not be easily visible or apparent using most traditional analytics techniques. Applications of graph analytics is wide-ranging, including customer relationship management, social network analysis, and financial crimes […]
9 ways IT leaders can impact sustainability initiatives
Companies across industries are committing to maximizing sustainability within their operations — and IT is at the heart of most of these efforts. In its Worldwide Sustainability/ESG 2023 Predictions, analyst firm IDC sees digital and sustainability transformations converging. “Decision makers are realizing that technology is essential for reaching their ESG goals,” noted Bjoern Stengel, IDC […]
5 questions CIOs must ask after Southwest Airlines’ failure
The last thing any CIO wants is to experience catastrophic operational issues during a peak season, but that’s exactly what executives at Southwest Airlines faced last week. While weather may have been the root cause, the 16,000 flights canceled between Dec. 19-28 far exceeded any other airlines’ operational impacts. Experts point to Southwest’s point-to-point operating […]
PyTorch suffers supply chain attack via dependency confusion
Users who deployed the nightly builds of PyTorch between Christmas and New Year’s Eve likely received a rogue package as part of the installation that siphoned off sensitive data from their systems. The incident was the result of an attack called dependency confusion that continues to impact package managers and development environments if hardening steps […]
LockBit apologizes for ransomware attack on hospital, offers decryptor
LockBit, a prominent ransomware-as-a-service (RaaS) operation, has apologized for an attack on the Toronto-based Hospital for Sick Children, also known as SickKids, and offered a free decryptor. SickKids, a major pediatric teaching hospital, announced on December 19 that it had called a Code Grey system failure, as it was responding to a cybersecurity incident that […]
New Platform Lets IT Leader Put Its Philosophy into Action
Manfred Grossmann has seen the scenario play out over and over. “I think companies that sell new products in an IT environment don’t always use them themselves,” said the vice president of corporate IT and project excellence for digital service provider Sycor Group. “Like everybody else, they focus on things that are not quite new.” […]
NHL turns to venue metrics data to drive sustainability
To reduce its carbon footprint and mitigate climate change, the National Hockey League (NHL) has turned to data and analytics to gauge the sustainability performance of the arenas where its teams play. In October, the league, with partner SAP, launched NHL Venue Metrics, a sustainability platform that teams and their venue partners can use for […]
10 IT resolutions for 2023
This past year was another pivotal one for IT, with IT leaders learning new lessons for implementing value-oriented IT initiatives and establishing thriving workplace cultures against the backdrop of economic uncertainty. CIOs anticipate addressing these and other challenges in the year ahead, but they also have big plans for 2023. These plans go beyond any […]
PureGym’s new CIO Andy Caddy plans for international expansion
Andy Caddy, formerly the group CIO at Virgin Active and group CTO at Whitebread, joins CIO UK Leadership Live to discuss his return to the CIO hotseat at low-cost gymnasium group PureGym, his development as a technology leader over a 30-year career, avoiding a race to the bottom in a low-cost fitness market, and why […]
Ransomware ecosystem becoming more diverse for 2023
The ransomware ecosystem has changed significantly in 2022, with attackers shifting from large groups that dominated the landscape toward smaller ransomware-as-a-service (RaaS) operations in search of more flexibility and drawing less attention from law enforcement. This democratization of ransomware is bad news for organizations because it also brought in a diversification of tactics, techniques, and […]
5 ways CIOs will disappoint their CEOs in 2023
Surveys can be useful, but when it comes to setting IT’s priorities they’re more rearview mirror than windshield. Which is why we at CIO Survival Guide headquarters have an alternative to suggest: List the promises you’ve made to the CEO for 2023, along with a compendium of what the various business punditries the CEO reads […]