This week, Yahoo revealed that more than 1 billion accounts were compromised in a breach that took place in 2013. In Searchlight, Senior Executive Editor Linda Tucci spoke with experts to find out what’s different about the hack and how creating a layered approach to security and establishing a corporate security culture can help.
At the recent AI Summit in New York, Carlyle Group CIO Suhit Gupta talked about what makes artificial intelligence technology disruptive and why his organization is considering implementing this emerging technology. Editorial Director Sue Troy writes about the barriers to AI implementation and how to overcome those, as highlighted by Gupta at the event.
In this tip, Andrew Horne, IT practice leader at CEB, highlights CEB’s CIO outlook for 2017 in five steps.
This end-of-year story by Senior Site Editor John Moore looks back at the stories from 2016 that provide hints on how traditional enterprises can learn from startups.
In this tip, O.C. Tanner CTO Niel Nickolaisen forecasts the big IT trends for 2017 and offers pointers on what projects CIOs should be investing in. “We must identify the few things we need to do better than anyone else, innovate just those things and then leverage the innovation, specialization and expertise of others to provide what is not our specialty,” Nickolaisen suggests.
In this video, Ray Toler, vice president of IT and marketing at heat transfer technology company HTRI, advices new leaders in IT to learn their business; know what’s going on at the company and listen to people.
Last week, Forrester released a report on its post-election projections for the 2017 U.S. tech market. On TotalCIO, Features Writer Jason Sparapani highlights what analyst Andrew Bartels has to say about growing SaaS costs and why CIOs should pay attention to contract details and exit clauses.
Over on our SearchCompliance site, we have a four-part webcast on IoT cybersecurity by vArmour CISO Demetrios Lazarikos. In part one, Lazarikos explains the history of infosec and the three different categories included in the information security maturity model; in part two he talks about the future of IoT and its role in the evolution of technology; in part three Lazarikos briefs on some of the prominent IoT security issues and vulnerabilities and in the final part he answers questions on IoT security.