From hackathons and gamification to champion programs and callouts, there are many ways for security teams to build essential relationships with development teams.
Search Results: CISO (332)
Este artículo analiza los protocolos y herramientas de almacenamiento descentralizado de Web3, como IPFS y Filecoin, y explica cómo se comparan con las opciones de almacenamiento en la nube de AWS, Google y Microsoft Azure.
In Ep. 9 of the Cutting Edge podcast, Leonard Lee explains why customers have a growing concern about privacy at the edge, and offers some intriguing solutions to the issue that edge computing can provide.
It’s common for the C-suite to look at cybersecurity efforts with fear, uncertainty, and doubt (FUD). Here’s why that needs to stop, and how to do it.
Quantifying cyber risk helps board members and other business leaders see the importance of cybersecurity investment. As Chris Hughes explains, the FAIR model offers a framework to do this.
Any effective data governance should be developed with intention and supported by the organization, which starts at the top, writes Pablo Moreno.
Doing things the way they’ve always been done is never a good strategy where technology is concerned, and security is no exception, writes Robert Wood.
There’s a big push for SBOMs (software bills of material) as it’s becoming clear how crucial they are to cybersecurity. Read our guidebook to learn everything about SBOMs, including what they are and why they’re necessary, and how they work.
In Episode 51, Wayne uses a bet he once made with a CISO as a jumping-off point to discuss how the C-suite should approach cybersecurity.
Tenga una estrategia clara para iniciar una andadura en el metaverso. Descubra qué puede propuestas de valor puede encontrar en el metaverso.
Episode 21 of the Growth Swarm podcast covers the essential considerations, including real-time data, for CXOs who are leading digital transformation projects.
Episode 20 of the Growth Swarm podcast explores the ‘what,’ ‘why,’ ‘how,’ and ‘who’ of the oft-used term ‘digital transformation.’
Bill Doerrfeld revisits the past decade of rising software vulnerabilities, which reinforces the need to patch compromised servers, use active threat monitoring, and prepare for quick responses to future zero-day exploits.
Episode 19 of the Growth Swarm podcast explores B2B tech sales, and why success today means the focus must shift from the seller’s process to the buyer’s process.
Bob Evans and Smith’s CIO and VP of IT discuss inclusive leadership and culture, overcoming challenges, and how Workday has transformed the prestigious women’s liberal arts college in Massachusetts.
In Episode 18 of the Growth Swarm podcast, John Siefert, Bob Evans, Tony Uphoff, and Scott Vaughan discuss customer centricity, security, co-creation, and other multi-cloud concerns.
Worker shortages are nothing new, but the methods by which organizations can retain and recruit has evolved, as these eight tips address the IT talent gap demonstrate.
Kieron explains a possible future C-suite role — the chief futurist would be a professional with the skills required to assist a company with innovating in the Metaverse.
In Episode 44 of the CXO2 Minute, Wayne continues his examination of a CISO’s place within an organization and explains why boards are responsible for understanding all sides of technology.
In Episode 16 of Acceleration Economy’s Growth Swarm podcast, the panel addresses innovation, partnerships, and sustainability in the public sector.