John Granger, SVP, IBM Consulting, explains how automating business processes can deliver beneficial outcomes and create opportunities.
Cybersecurity
The big change of zero trust can be intimidating to some, but security leaders can tailor their communication to make the shift more palatable.
Small- and medium-sized businesses can stay current on the latest threats and detect and prevent attacks with tailored threat intelligence data by leveraging open-source platforms, tools, and communities.
As a business leader today, your success relies on accurate data, real-time analytics, and actionable intelligence. Here are the tools to help you.
Janet Schijns talks about managed service providers and how they can reduce your costs while providing advanced IT skills.
Security teams can assist with financial automation projects that often require third-party tools. Rob Wood has some tips on how to select them.
Cybersecurity data can empower C-suite executives to make informed decisions, protect their organization, and drive business growth.
Bob Evans and Chris Hughes discuss the evolving role of the CIO, and explore the relationship between a CIO and a CISO in this Digital CIO Summit moment.
Embracing digital transformation, cybersecurity, energy-efficent infrastructure, and relevant data and systems helps meet sustainability goals.
Rob Wood explains how organizations can avoid complications from compliance and other requirements in financial automation projects.
In a statement, Lookout exec explains the data collection practices of TikTok and other mobile apps, cites need for awareness of mobile apps’ risk.
Day 3 of Acceleration Economy’s Digital CIO Summit included a CISO panel, discussions around cybersecurity, digital natives, and co-creation.
With its low-code platform, Appian empowers customers to build applications that automate key business functions. It’s prepared to guarantee their success.
MITRE’s new System of Trust risk model manager and a community engagement group introduces another great resource for software supply chain security and risk management.
New data from Palo Alto Networks’ incident response team highlights the expanding set of extortion tactics being used as part of ransomware attacks.
Expert practitioner-analysts offer guidance on safeguarding critical data from cyberattacks, including prioritizing data types and preventing silos, as well as ways to protect against data leakage and ransomware.
Tony Uphoff makes a case for cybersecurity as a growth driver, and offers five ways that CEOs can capitalize on it today.
CISO and Acceleration Economy analyst Rob Wood explains the benefits for security leaders of knowing where data exists. Without knowing, leaders cannot do anything with it.
NetApp exec Ronen Schwartz weighs in on new multi-cloud complexity research and how customers are challenged to deal with cybersecurity, ROI, and more.
There are many benefits to using the zero trust maturity model as a framework for cybersecurity planning and implementation, say Rob Wood.


















