When asked about technology purchase regrets, veteran tech exec Sanjay Macwan digs deep for a classic hyped technology that has yet to pan out: smart glasses.
IT leaders are increasingly looked to as C-suite entrepreneurs capable of contributing solutions aimed at top-line growth. Here’s how revenue-centric CIOs are getting it done.
Creating a culture of security starts on day one, say veteran security leaders. Here’s their advice for making that initial security training more effective.
Old perimeter-based defences can throw up roadblocks to implementing a zero trust strategy, but a measured, phased approach will see you through.
Forward-thinking CIOs are mapping out three-year plans that anticipate newly mainstreamed tech, blended teams and democratised IT.
From trying to change too much to underestimating the political nature of the role, IT leaders and advisors lend insights on what most often trips up first-time CIOs.
Security and privacy teams working with sales, marketing and design ensures a good user experience while protecting data and maintaining regulatory compliance.
IT leaders are not immune to infatuation with the promise of emerging tech. Here, CIOs share which technologies they believe are primed to underdeliver.
Stephanie Benoit Kurtz thought she had a good deal when, in one of her former CISO roles, she signed a three-year contract with a vendor for vulnerability management.
The financial services company has made massive investments in data and analytics to better detect and prevent fraud.
Farshchi joined the credit reporting agency in 2018 with a mandate for change following the company’s high-profile data breach.
HP CIO Ron Guerrier is working to diversify IT’s suppliers and boost the benefits they get from working with HP to build a more representative technology workforce.
As security budgets continue to rise, where is the money going? Recent surveys offer insight into CISO spending for the year ahead.
Allison Miller joined the social media company in February 2021, assuming a range of responsibilities, from security and privacy to trust and safety.
Don’t let these easy-to-overlook mistakes trip up a security strategy.