News Stay informed about the latest enterprise technology news and product updates.

What IT execs should learn from the Yahoo breach

This week, Yahoo revealed that more than 1 billion accounts were compromised in a breach that took place in 2013. In Searchlight, Senior Executive Editor Linda Tucci spoke with experts to find out what’s different about the hack and how creating a layered approach to security and establishing a corporate security culture can help.

At the recent AI Summit in New York, Carlyle Group CIO Suhit Gupta talked about what makes artificial intelligence technology disruptive and why his organization is considering implementing this emerging technology. Editorial Director Sue Troy writes about the barriers to AI implementation and how to overcome those, as highlighted by Gupta at the event.

In this tip, Andrew Horne, IT practice leader at CEB, highlights CEB’s CIO outlook for 2017 in five steps.

This end-of-year story by Senior Site Editor John Moore looks back at the stories from 2016 that provide hints on how traditional enterprises can learn from startups.

In this tip, O.C. Tanner CTO Niel Nickolaisen forecasts the big IT trends for 2017 and offers pointers on what projects CIOs should be investing in. “We must identify the few things we need to do better than anyone else, innovate just those things and then leverage the innovation, specialization and expertise of others to provide what is not our specialty,” Nickolaisen suggests.

In this video, Ray Toler, vice president of IT and marketing at heat transfer technology company HTRI, advices new leaders in IT to learn their business; know what’s going on at the company and listen to people.

Last week, Forrester released a report on its post-election projections for the 2017 U.S. tech market. On TotalCIO, Features Writer Jason Sparapani highlights what analyst Andrew Bartels has to say about growing SaaS costs and why CIOs should pay attention to contract details and exit clauses.

Over on our SearchCompliance site, we have a four-part webcast on IoT cybersecurity by vArmour CISO Demetrios Lazarikos. In part one, Lazarikos explains the history of infosec and the three different categories included in the information security maturity model; in part two he talks about the future of IoT and its role in the evolution of technology; in part three Lazarikos briefs on some of the prominent IoT security issues and vulnerabilities and in the final part he answers questions on IoT security.

Please follow @SearchCIO, @SearchCIOSMB and @ITCompliance to get updates on new stories throughout the week.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close