Frank Domizio shares his thoughts on cybersecurity’s place in the C-suite today, as well as the value of customer stories on software and other technology solutions.
Contextualize what you need from data teams, so that they understand the why behind your ask, Rob Wood advises, as a way to build stronger relationships.
Multi-cloud computing allows organizations to tailor their cloud strategies, reduce costs, and avoid vendor lock-in, but it also brings unique cybersecurity challenges.
Our Securing Multi-Cloud Ecosystems guidebook is a comprehensive resource demonstrating the why & how of secure multi-cloud computing.
API-driven partnership strategies fuel revenue, co-creation initiatives, and great customer experience. Get tips on building and executing a strategy for your organization.
Wayne Sadin shares takeaways from a recent panel discussion he attended, which covered topics from data management to AI and machine learning bias.
Zero trust, a cybersecurity framework that reduces uncertainty in access decisions, has gained popularity in recent years. CISO Chris Hughes explains zero trust, and why it matters, in detail.
Rob Wood looks at why pinpointing the right data, and reaching consensus between data and security teams on that data, is critical for reducing risk.
To implement zero trust, business leaders should know a cultural shift is required along with investment in the right tools and resources.
In the latest Growth Swarm podcast, John Siefert, Bob Evans, Tony Uphoff, and Scott Vaughan discuss generative AI’s potential effect on today’s advertising-driven, attention-based economy.
Strong relationships between the CISO, the chief data officer, and the others involved with data will strengthen an organization’s data strategy, says Rob Wood.
Ronak Mathur shares some of the speakers and customers in the AI, cybersecurity, and government fields that he is looking forward to hearing at the upcoming Digital CIO Summit.
To prevent data breaches, organizations must prioritize data governance; there’s a big collaboration opportunity between the CISO and CDO roles in this endeavor.
The latest “Secrets Sprawl” report from GitGuardian highlights a troubling data point: the amount of human error that results in corporate secrets being exposed.
An in-depth look at automated vulnerability scanning within financial software, how it works, as well as top tools and best practices to get the job done.
Rob Wood explains why security teams need to be trained to assess risk and maintain compliance across different clouds.
As the pace of business accelerates, automating ERP processes helps companies remain competitive and achieve long-term success, says Kenny Mullican.
Effective zero trust requires a comprehensive understanding of the organization’s security landscape, a risk-based approach, and a commitment to continuous improvement. Learn how to manage the journey.
Rob Wood and Aaron Back explore the evolving relationship between CIOs and CISOs and discuss the importance of sharing customer stories.
Endor Labs released a report that identifies the top 10 open source software risks, including known vulnerabilities, compromised legitimate packages, untracked dependencies, and more. Chis Hughes explains.
Process mining offers great opportunity to fine-tune business processes but also introduces potential risks, which can be mitigated with strong governance measures.



















