Bob Evans and Chris Hughes discuss the evolving role of the CIO, and explore the relationship between a CIO and a CISO in this Digital CIO Summit moment.
The World Economic Forum (WEF) is anticipating a cyberstorm, which calls for a global, unified response across geopolitical borders.
In this CloudWorld News Desk interview, Oracle Senior VP of Cloud Infrastructure Mahesh Thiagarajan explains why some users are still reluctant to engage with multi-cloud platforms.
As a mode of communication for security teams, vulnerability reports require effective management but often involve a problematic process.
When faced with vulnerabilities, businesses often have to focus on the most severe cases. But, vulnerability management needs to go beyond these scoring frameworks.
Low-code/no-code app development has evolved to empower more users to innovate more freely and lower barriers for automated work.
It’s critical for employees to be trained to detect phishing activity to protect private business information from landing in the hands of a hacker.
With high-profile breaches occurring on a near-daily basis, CFOs must understand trends in cyber security & finance and mitigation.
Focusing on which cybersecurity technologies are best, it’s also important to understand the hacker mentality to fully prevent cyber threats.
There’s much to learn about SBOM, as it provides valuable insights that might otherwise take significant effort to discover.
Many companies have technical sprawl: apps, automation, SaaS & on-premise systems, and much more. What can the CFO do to mitigate risk and create a plan for strategic investments? In this “Back @ IT” episode, Aaron Back chats with Nick Lumsden to explore these areas more.