How digital transformation impacted CIO and CTO roles

Transposit announced results from a recent research study about the evolving roles of the CIO and CTO, as well as the extent of and attitudes towards adoption of DevOps practices in enterprises. Conducted in July 2021, findings from 415 CIOs and CTOs a… Continue reading How digital transformation impacted CIO and CTO roles

40% of SaaS assets are unmanaged, putting companies at risk for data leaks

DoControl announced a report which provides data-driven insights into the growing number of external and insider threats due to vast amounts of unmanageable data in today’s enterprises. Based on customer data, the findings clearly illustrate there is a… Continue reading 40% of SaaS assets are unmanaged, putting companies at risk for data leaks

How to foster collaboration with the IT team for a successful zero trust implementation

The conversation surrounding deploying a zero trust strategy continues to gain importance following the announcement of President Biden’s recent Executive Order, which requires federal agencies to create a plan for adopting this security architecture. … Continue reading How to foster collaboration with the IT team for a successful zero trust implementation

Ransomware and cyber insurance: What are the risks?

High-profile ransomware events, such as the Colonial Pipeline and Kaseya attacks, continue to create eye-popping headlines about how easily a cybercriminal group can cripple key infrastructure, hospitals, and schools. And with ransomware attacks growin… Continue reading Ransomware and cyber insurance: What are the risks?

Can the public cloud become confidential?

It’s been often said that the only two certain things in life are death and taxes. Over the past ten years, it seems data breaches can be added to this list. Can an organization really be completely safe – without fear of losing confidential or r… Continue reading Can the public cloud become confidential?

How security leaders can build emotionally intelligent cybersecurity teams

How a leader motivates their team, gathers, and uses information, makes decisions, manages change initiatives, and handles crises is referred to as “leadership style”, and is known to be a key influencing factor in team dynamics. Daniel Goleman, an Ame… Continue reading How security leaders can build emotionally intelligent cybersecurity teams

Cyberattacks target the anywhere workforce, legacy security systems can’t provide protection

VMware released a report based on an online survey of 3,542 CIOs, CTOs and CISOs in December 2020 from across the globe. The report explores the impact of cyberattacks and breaches on organizations and details how security teams are adapting to these c… Continue reading Cyberattacks target the anywhere workforce, legacy security systems can’t provide protection

Cybersecurity, emerging technology and systemic risk: What it means for the medical device industry?

In late 2020, the World Economic Forum stated that “the approach to cybersecurity needs to be overhauled before the industry finds itself in any fit state to tackle the threat.” The WEF singled out five global cybersecurity challenges: 1. Increasing so… Continue reading Cybersecurity, emerging technology and systemic risk: What it means for the medical device industry?

Top concerns for IT leaders planning for hybrid workplace environments

Employee engagement (56%), burnout (53%), and reduced productivity (52%) are top concerns for IT leaders in 2021 and beyond, as they continue to enable remote workers and plan for new, hybrid workplace environments, according to Wrike. Last year’s shif… Continue reading Top concerns for IT leaders planning for hybrid workplace environments

DX projects hindered by lack of collaboration between security and networking teams

Netskope revealed a research showing a significant breakdown in collaboration between two of the central components of the IT team: networking and security. While 49% of security teams and 44% of networking teams report to the same manager, 37% of glob… Continue reading DX projects hindered by lack of collaboration between security and networking teams