In episode 32, Chris looks at a new Cybersecurity Infrastructure Security Agency post that focuses on three critical steps for advancing vulnerability management across the ecosystem in IT.
Search Results: CIO (1586)
En este podcast, episodio 5, Pablo Moreno habla sobre datos con GBeast, una startup que desarrolla una aplicación de coaching virtual llamado ‘Agravain’, aprovechando las métricas y estadísticas de jugadores.
At the recent Oracle CloudWorld, Larry Ellison offered a rare glimpse into how he views the inner workings of the company he’s ruled over and guided since its founding in 1977.
Security and data breaches aren’t all bad news; they’re also opportunities to build on lessons learned and correct deficiencies, as Chris explains.
Bill Doerrfeld summarizes the key points from Sonatype’s “The State of the Software Supply Chain” report to help IT technology divisions better understand how to address open-source security today.
Acceleration Economy analyst and Paragon Films CIO Kenny Mullican looks at how AI-enabled intelligent process automation can be applied in a manufacturing industry context.
El uso de soluciones de código abierto crece más de un 33% interanual, también las amenazas y ciberataques inherentes a estas soluciones.
Data is vital. Data plus judgment plus context enables effective decisions and actions, writes Wayne.
Christian and Bob talk about why a recent study indicates that 40% of the Fortune 500 could be wiped off the map in the next decade.
In Ep. 26 of the Growth Swarm podcast, John, Bob, Scott, and Tony discuss reasons behind today’s economic uncertainty, and why the cloud offers extraordinary alternatives for businesses to create their own futures.
Los ciberatacantes a menudo tienden a persistir en un entorno, moviéndose lateralmente entre sistemas, esto es clave para mitigar el riesgo.
Committing to innovation and technology in uncertain economic times can both identify inefficiencies and shift the focus to more strategic bets that advance the business.
Threat hunting is often thought of as something one does to uncover as yet undetected threats in an organization. But there’s also attack-specific threat hunting, which, analyst Chris Hughes explains, is essential when responding to security breaches.
El low-code es una buena manera de hacer que los no tecnólogos ingresen al espacio tecnológico al democratizar el desarrollo de software.
Analyst Bob Evans explains how Oracle plans to achieve 65 billion dollars in revenue, powered by an infrastructure and applications increase.
Cuando un modelo de IA comienza a producir resultados que se desvían del resultado esperado original, se denomina ‘data drift’. Sin embargo antes de realizar cualquier ingeniería para corregir el modelo de IA, revise los nuevos datos que son procesados por el modelo.
Frente a un incidente de cyber-seguridad hay muchos ángulos que cubrir. El apoyo legal es vital para una óptima gestión.
CIO and analyst Kenny Mullican explains how to find the right partners for technology initiatives that require a collaborative co-creation approach.
Audio is as critical as visual when creating authentic immersive experiences. Brands delving into the Metaverse must take it seriously, explains Toni.
In Growth Swarm, Ep. 24, Tony, Bob, and Scott discuss how the evolved business technology purchase process requires vendors to have a greater understanding of buyer focus and how technology lines up with strategic initiatives.

















