Digital transformation has brought on a new level of cybersecurity concerns around applications, and those need and those concerns warrant CEO focus, Tony Uphoff says.
Cybersecurity
Kieron Allen and Chris Hughes discuss how our cybersecurity analysts determined which companies made the new Top 10 list of Cybersecurity Business Enablers.
The Top 10 providers model – a Cloud Wars staple – now includes the top four tech pillars: cloud, cybersecurity, AI/hyperautomation, and data.
Low-code/no-code platforms begot citizen developers and their innovative solutions, but a lack of formal training brings risks that must be managed.
AI is increasingly mainstream, so it’s more important than ever to make sure that all organizations implement smart, unbiased security protocols.
Sensitive data is increasingly being filtered through SaaS solutions, which makes securing them more important than ever, says Robert Wood.
John Siefert, Aaron Back, and Tom Smith introduce our new Top 10 lists for data modernization, hyperautomation, and cybersecurity.
Frank Domizio explains the benefits of cybersecurity supply chain risk management (C-SCRM) and how to pick the right tools.
John Siefert, Chris Hughes, Frank Domizio, and Rob Wood explain why applying software composition analysis (SCA) early in the development cycle makes it easier to address security issues when they arise.
Acceleration Economy, which provides advisory services through real-world practitioners, defines a new level of value for digital business decision making.
Acceleration Economy Co-founders John Siefert and Bob Evans explain how our Digital CIO Summit equips CXOs to create opportunities with data, cybersecurity and other technology platforms.
Given that technology evolves and accelerates at a rapid pace, Tony Uphoff explains why the lines between a technology company and a company harnessing the power of technology are blurring.
Frank Domizio explains how security operations can be made more sustainable by working with a managed security service provider (MSSP) to reduce power consumption, as well as the cost of hiring and training cybersecurity talent.
Ronak Mathur shares three ways that CXOs can keep enterprise-wide AI and automation adoption moving forward.
Software composition analysis tools are valuable assets to secure systems and protect organizations, says Frank Domizio, but they will also directly benefit software developers.
In this CEO Outlook moment, Thomas Kurian explains why he thinks edge computing, cybersecurity, and the mainstreaming of AI will have the most impact this year.
CIOs and CISOs must learn to communicate openly to have the types of strong relationships that lead to healthy, successful companies. In this analysis, Kenny Mullican gives tips on how they can achieve them.
Learning when to say no is an important skill for CISOs, particularly, Robert Wood explains, when it comes to trendy or complex technologies and partnerships.
Drawing on examples from the retail and healthcare industries, Janet explains why partner strategies may be the missing link for modernizing data.
How do cybersecurity companies manage the complex nature of IT environments? In this Cybersecurity Minute, Robert Wood explains why portfolio companies have the solutions.