feature7 key questions CIOs need to answer before committing to generative AIWhen asked, IT leaders, and the companies they represent, must be able to immediately harness the power of generative AI, and understand, as well as manage, potential vulnerabilities, biases, and other risks to protect sensitive data and maintain customer trust. By Maria Korolov21 Jun 202311 minsCIOICT PartnersGenerative AI feature The 12 biggest issues IT faces todayBy Mary Pratt12 Jun 202312 minsCIOGenerative AIIT Skillsinterview United Airlines CISO Deneen DeFiore on elevating cyber’s value to the businessBy Dan Roberts25 May 20238 minsCSO and CISOCSO and CISOCSO and CISO featureWhy IT leaders are putting more business spin on security spendBy Robert Scheier 13 Apr 20237 minsCIOCSO and CISOBudgeting feature7 trends defining the enterprise IT market todayBy John Edwards 11 Apr 20239 minsPrivate 5GGenerative AIMachine Learning featureCIOs address the impact of hybrid workBy Pat Brans 28 Mar 20238 minsCIORemote WorkEmployee Experience featureWhat is data governance? Best practices for managing data assetsBy Thor Olavsrud 24 Mar 202310 minsIT Governance FrameworksBig DataData Mining featureHow automation in CSPM can improve cloud securityBy Enoch Anbu Arasu Ponnuswamy 15 Feb 20235 minsCloud SecurityComplianceData Center Automation featureThe essential check list for effective data democratizationBy Maria Korolov and Alex Korolov 20 Jan 202310 minsCIOCIOCIO ArticlesbrandpostSponsored by VMwareAuthentix: On a Mission to Provide Every Swiss Company with Professional Cybersecurity ServicesBy Ken Phillips 22 Sep 2022 5 minsIT LeadershipSecuritybrandpostSponsored by InfinidatLeading IT Analyst Firm GigaOm Recognizes Infinidat as the Industry Leader in Ransomware Protection for Block StorageAccording to GigaOm, Infinidat distinguishes itself for its modern, software-defined storage architecture, securing enterprise storage with a strategic, long-term approach, broad and deep functionality, and high quality of innovation.By Sapna Capoor, Director of Global Communications at Infinidat 21 Sep 2022 5 minsSecuritybrandpostSponsored by OktaHow Modern Identity Governance is Driving Enterprise ProductivityWhile a remote workforce brings potential risks, CIOs have recognized it also offers significant upside for businesses. Here’s why they’re pushing for rapid technology adoption. By Paresh Bhaya, Senior Director of Okta Identity Governance 01 Sep 2022 6 minsSecuritybrandpostSponsored by InfinidatGuarantee that Your Enterprise Will Recover from a Ransomware or Malware CyberattackEnterprises and service providers need assurance that they will recover and restore their data at a rapid speed in the wake of a cyberattack. IT leaders are turning to this best practice.By Eric Herzog, CMO, Infinidat 24 Aug 2022 4 minsSecurityopinion5 challenges for securing the futureEveryone has a role in cybersecurity today; working together to address these challenges will materially reduce risk.By Thornton May 02 Jun 2022 5 minsSecurity PracticesSecuritybrandpostSponsored by HPEDisruption Doesn’t Make an Appointment. A Guide for Handling the Unwelcome Knock.Here are some best practices to steer your immediate actions and near-term responses when disruption comes calling.By Lois Boliek 11 May 2022 6 minsIT LeadershipSecuritynewsDid SAP spy on its employees, German union asksThe service sector union Ver.di has made public an internal data leak at SAP. Sensitive information from the workforce is said to have been widely accessible.By Martin Bayer 21 Apr 2022 3 minsData PrivacyEnterprise ApplicationsSecurityfeatureState of the CIO, 2022: Focus turns to IT fundamentalsCIOs are once again walking a tightrope between innovation and operational excellenceu2014this time, buoyed by strong LOB alliances and a lingering pandemic glow.By Beth Stackpole 21 Mar 2022 14 minsCIODigital TransformationInnovationbrandpostSponsored by HPECan Security Really Be Open Source?By Sunil James 25 Feb 2022 6 minsZero TrustIT LeadershipSecurityfeature3 areas where AIops excels — and 2 where it still falls shortAIops speeds IT discovery and troubleshooting, but it isnu2019t magic. And operations staff must still prepare the data for machine learning and manually solve some issues. By Robert Scheier 21 Jan 2022 9 minsMachine LearningArtificial IntelligenceIT Operationsfeature8 top priorities for CIOs in 20222022 promises to be both exciting and challenging for IT leaders. To get the most value from IT in the year ahead, tech chiefs should focus on the following key initiatives.By John Edwards 18 Jan 2022 8 minsHiringDigital TransformationIT StrategyfeatureTop 7 challenges IT leaders will face in 2022Facilitating hybrid working environments and ensuring a skills match for future success top the list of tough, ongoing issues IT leaders must navigate this year. By Paul Heltzel 11 Jan 2022 10 minsHiringHiringHiring Show more Show less View all Resources whitepaper The Ultimate Cloud Security Buyer’s Guide- How to evaluate a cloud native application protection platform This buyer’s guide tells business leaders everything they need to know to evaluate and choose the right cloud native application protection platform for their organisation. The post The Ultimate Cloud Security Buyer’s Guide- How to evaluate a cloud native application protection platform appeared first on Whitepaper Repository. By Westcon 12 Jun 2023Application SecurityCloud ComputingSecurity Monitoring Software whitepaper The Ultimate Cloud Security Buyer’s Guide- How to evaluate a cloud native application protection platform By Westcon 07 Jun 2023Application SecurityCloud ComputingSecurity Monitoring Software whitepaper Driving the future of work through enterprise-wide SASE By Westcon and Palo Alto 09 Mar 2023Network SecuritySASESecurity View all Podcasts podcastsThe C-level Strategic Guide for CIAM investmentWhat is customer identity and access management (CIAM) and why is it essential to your business? Simply put, if your customers don’t feel secure using your products or accessing your websites, they won’t sign up or share information. Join us as we explore the business challenges around CIAM, how to assess where you fall on the CIAM Maturity Curve, and how to move ahead. 5 episodesIdentity and Access Management Ep. 04 Episode 4: Adding Intelligence to Your CIAM Strategy 25 May 202120 mins OktaIdentity and Access ManagementSecurity Ep. 03 Episode 3: You've Passed CIAM 101 — Now It's Time to Automate 12 May 202115 mins OktaIdentity and Access ManagementSecurity Explore a topic Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations View all topics All topics Close Analytics Careers Cloud Computing Enterprise Applications IT Leadership IT Management IT Operations Industry Artificial Intelligence Data Management Data Center Vendors and Providers Networking Software Development Business Operations Emerging Technology Digital Transformation IT Strategy Innovation Diversity and Inclusion Project Management Show me morePopularArticles feature 10 highest-paying IT skills for 2023 By Sarah K. White 11 May 20238 mins SalariesSalariesSalaries feature 10 highest-paying IT jobs By Sarah K. White 27 Apr 20237 mins SalariesSalariesSalaries feature The RACI matrix: Your blueprint for project success By Bob Kantor 14 Sep 2022 IT Governance FrameworksIT Governance FrameworksIT Governance Frameworks