Generative AI offers many opportunities to enable businesses, but also comes with security implications. Learn the impact on the future of work and how Generative AI is redefining the customer experience.
Cybersecurity
In this Cloud Data Strategy moment, Chris Hughes defines the areas of focus security leaders must consider when safeguarding data in the cloud.
One Medical Chief Strategy Officer Jenni Vargas explains how the healthcare platform’s distinct business model works, and why patients are flocking to it.
Wayne Sadin outlines why an overreliance on Microsoft Excel models is increasingly a problem for companies of all sizes and industries.
New data from cybersecurity provider Chainguard captures what’s working, and the relative difficultly levels, of various software supply chain practices.
New data from NetApp shows that even with the benefits of multi-cloud, this increasingly popular architecture introduces various forms of complexity for tech leaders.
Multi-cloud incident response is more complex than traditional incident response. Frank Domizio explains how and why organizations need to adapt.
Every company today is — or is on its way to becoming via digital transformation — a technology company, but where does all the technology come from? Partners ecosystems.
Contextualize what you need from data teams, so that they understand the why behind your ask, Rob Wood advises, as a way to build stronger relationships.
Multi-cloud computing allows organizations to tailor their cloud strategies, reduce costs, and avoid vendor lock-in, but it also brings unique cybersecurity challenges.
Our Securing Multi-Cloud Ecosystems guidebook is a comprehensive resource demonstrating the why & how of secure multi-cloud computing.
Zero trust, a cybersecurity framework that reduces uncertainty in access decisions, has gained popularity in recent years. CISO Chris Hughes explains zero trust, and why it matters, in detail.
Rob Wood looks at why pinpointing the right data, and reaching consensus between data and security teams on that data, is critical for reducing risk.
To implement zero trust, business leaders should know a cultural shift is required along with investment in the right tools and resources.
Ronak Mathur shares some of the speakers and customers in the AI, cybersecurity, and government fields that he is looking forward to hearing at the upcoming Digital CIO Summit.
The latest “Secrets Sprawl” report from GitGuardian highlights a troubling data point: the amount of human error that results in corporate secrets being exposed.
An in-depth look at automated vulnerability scanning within financial software, how it works, as well as top tools and best practices to get the job done.
As the pace of business accelerates, automating ERP processes helps companies remain competitive and achieve long-term success, says Kenny Mullican.
Effective zero trust requires a comprehensive understanding of the organization’s security landscape, a risk-based approach, and a commitment to continuous improvement. Learn how to manage the journey.
Rob Wood and Aaron Back explore the evolving relationship between CIOs and CISOs and discuss the importance of sharing customer stories.
To get the most out of training for multi-cloud environments, it’s important to vary the kinds of training offered to suit different learning styles, according to analyst Rob Wood.



















