feature7 key questions CIOs need to answer before committing to generative AIWhen asked, IT leaders, and the companies they represent, must be able to immediately harness the power of generative AI, and understand, as well as manage, potential vulnerabilities, biases, and other risks to protect sensitive data and maintain customer trust. By Maria Korolov21 Jun 202311 minsCIOICT PartnersGenerative AI feature The 12 biggest issues IT faces todayBy Mary Pratt12 Jun 202312 minsCIOGenerative AIIT Skillsinterview United Airlines CISO Deneen DeFiore on elevating cyber’s value to the businessBy Dan Roberts25 May 20238 minsCSO and CISOBusiness IT AlignmentData and Information Security featureWhy IT leaders are putting more business spin on security spendBy Robert Scheier 13 Apr 20237 minsCIOCSO and CISOBudgeting feature7 trends defining the enterprise IT market todayBy John Edwards 11 Apr 20239 minsPrivate 5GGenerative AIMachine Learning featureCIOs address the impact of hybrid workBy Pat Brans 28 Mar 20238 minsCIORemote WorkEmployee Experience featureWhat is data governance? Best practices for managing data assetsBy Thor Olavsrud 24 Mar 202310 minsIT Governance FrameworksBig DataData Mining featureHow automation in CSPM can improve cloud securityBy Enoch Anbu Arasu Ponnuswamy 15 Feb 20235 minsCloud SecurityComplianceData Center Automation featureThe essential check list for effective data democratizationBy Maria Korolov and Alex Korolov 20 Jan 202310 minsCIOCIOCIO ArticlesbrandpostSponsored by Veeam SoftwareResilient data backup and recovery is critical to enterprise success As global data volumes rise, business must prioritize their resiliency strategies.By Neal Weinberg 01 Jun 2023 4 minsSecuritybrandpostSponsored by FortinetWhat’s next for network firewalls?NGFWs aren’t done evolving. To keep up with evolving cyberthreats, organizations of all sizes must understand their future applications.By Nirav Shah 23 May 2023 6 minsSecurityopinionGenerative AI & data: Potential in cybersecurity if the risks can be curtailedHow do CIOs, CSOs, and cybersecurity teams learn to deal with technology that may pose serious security and privacy risks?By Rick Grinnell 13 May 2023 7 minsGenerative AIGenerative AIGenerative AIbrandpostSponsored by Cloud4WiElevating Wi-Fi Security and Connectivity with Passpoint: A Strategic Focus for CIOsPasspoint powers CIOs and their teams to overcome some of the biggest challenges in the industry by enhancing security, streamlining Wi-Fi management, and providing an unparalleled user experience for all stakeholdersBy Andrea Calcagno, CEO & Founder Cloud4Wi 08 May 2023 4 minsSecuritybrandpostSponsored by ProtivitiThe post-quantum cryptography conundrumBusinesses in every industry may experience new threats when bad actors acquire access to cryptanalytically-relevant quantum computers, but they can start defending themselves now.By Greg Hedges, Managing Director, Emerging Technology Solutions and Konstantinos Karagiannis, Director, Quantum Computing Lead 04 May 2023 7 minsSecurityopinionWhere is the AI?Thoughts from Cybersecurity Executives and Practitioners: Today’s hype may be more than the reality, but plenty of surprises will be ahead as this market evolves.By Rick Grinnell 12 Apr 2023 8 minsArtificial IntelligenceArtificial IntelligenceSecuritybrandpostSponsored by BroadcomThe future of trust—no more playing catch upBroadcom: 2023 Tech Trends That Transform ITBy Eric Chien, Director of Security Response, Symantec Enterprise Division, Broadcom 31 Mar 2023 5 minsSecuritybrandpostSponsored by TaniumTop 5 Security Trends for CIOsThis article highlights modern security trends for CIOs that weren’t on anybody’s radar as little as five years ago.By Jason Bloomberg, Managing Partner, Intellyx 15 Mar 2023 6 minsSecuritybrandpostSponsored by Tanium5 strategies for boosting endpoint managementHow should CIOs and other IT leaders respond to evolving cyber threats? Here are five tips. 15 Mar 2023 5 minsSecuritybrandpostSponsored by TaniumProactive cybersecurity: sometimes offence is the best defenseGoing on the offensive with cybersecurity involves taking extra steps to preemptively identify weaknesses before bad actors can take advantage of them. 15 Mar 2023 6 minsSecurityopinionHow to ensure security in a cloud migrationCIO followers expound on ways to stay secure when moving to the cloud.By Paul Desmond 07 Feb 2023 6 minsCloud ManagementCloud SecuritySecurityopinionFresh start: Time to reset passwords and rethink your password management strategyOrganizations need to assess how they provide and manage access to their critical systemsBy Rick Grinnell 07 Feb 2023 6 minsPasswordsPasswordsPasswords Show more Show less View all Resources whitepaper Adopting Google Value in Qatar with Google Cloud and Rackspace Technology with RAMP Funding Download the E-Book Now to embrace the power of GCP and accelerate your migration today with the help of Rackspace Technology. The post Adopting Google Value in Qatar with Google Cloud and Rackspace Technology with RAMP Funding appeared first on Whitepaper Repository. By Rackspace and Google Cloud 22 Jun 2023Digital TransformationIT SkillsIT Strategy whitepaper From Vulnerability Management to Exposure Management By XM Cyber 21 Jun 2023Digital TransformationIT SkillsSoftware Development whitepaper みずほ証券がプロセスを自動化し、仮想サーバーを迅速に提供 By RedHat 20 Jun 2023Automotive IndustryCloud ComputingDigital Transformation View all Podcasts podcastsThe C-level Strategic Guide for CIAM investmentWhat is customer identity and access management (CIAM) and why is it essential to your business? Simply put, if your customers don’t feel secure using your products or accessing your websites, they won’t sign up or share information. Join us as we explore the business challenges around CIAM, how to assess where you fall on the CIAM Maturity Curve, and how to move ahead. 5 episodesIdentity and Access Management Ep. 04 Episode 4: Adding Intelligence to Your CIAM Strategy 25 May 202120 mins OktaIdentity and Access ManagementSecurity Ep. 03 Episode 3: You've Passed CIAM 101 — Now It's Time to Automate 12 May 202115 mins OktaIdentity and Access ManagementSecurity Explore a topic Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations View all topics All topics Close Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations Emerging Technology Digital Transformation IT Strategy Innovation Diversity and Inclusion Project Management Show me morePopularArticles feature 10 highest-paying IT skills for 2023 By Sarah K. White 11 May 20238 mins SalariesIT JobsIT Skills feature 10 highest-paying IT jobs By Sarah K. White 27 Apr 20237 mins SalariesIT JobsCareers feature The RACI matrix: Your blueprint for project success By Bob Kantor 14 Sep 2022 IT Governance FrameworksProject Management ToolsIT Leadership