CIO Influence

Category : Guest Authors

Blockchain Bots/Intelligent Assistants Guest Authors Machine Learning Security Technology

Bots and Deepfakes: How Do We Navigate the New Era of Digital Identity?

Terence Kwok
The need for secure and trustworthy online interactions has never been greater. The internet is now interwoven into our daily lives, from social media to...
Data Management Guest Authors IoT SaaS

Turning Nature Data into Action: Lessons from Building Software for Our Future

Sebastian Leape
As ecosystems degrade and species vanish at alarming rates, the consequences are rippling through both natural systems and the global economy. There is growing recognition...
Digital Transformation Guest Authors Regulation and Compliance Managment Security

Navigating the Evolving Cyber Insurance Landscape: 7 Insights for CIOs

Joseph Dhanapal
With the rise in cyberattacks and breaches, cyber insurance has become essential for business continuity. Ransomware is driving the majority of claims, with AM Best...
Financial Services Guest Authors Machine Learning Natural Language Security

AI, Financial Crime, and the Battle for Control: Who’s Winning the Arms Race?

Sophia Qureshi
A new battleground has emerged between financial institutions and fraudsters. And the weapon of choice is artificial Intelligence (AI). As financial leaders grapple with rapid...
Cloud Computing Financial Services Guest Authors IT and DevOps

The Cost of Delaying Smart Cloud Strategies for Cloud-Reliant Companies

Maxim Melamedov
Effective financial management is at the core of Financial Operations (FinOps), promoting responsible spending when it comes to cloud computing, including efficient use and scaling...
Data Management Data Storage Datacentre Guest Authors Machine Learning

Data Storage and AI: Bridging the Gap with Data Orchestration

Jimmy Tam
In the rapidly evolving world of artificial intelligence (AI) and machine learning (ML), the demand for processing power has reached unprecedented heights. Leveraging AI and...
Cloud Guest Authors IT and DevOps Security Technology

Key Strategies for CIOs to Drive Cyber Resilience

Theresa Lanowtiz
In todayโ€™s dynamic cybersecurity landscape, effective organizational resilience depends heavily on aligning business priorities with IT and cybersecurity strategies. Yet, there remains a persistent disconnect...
Analytics Digital Transformation Financial Services Guest Authors Machine Learning Security

How to Balance Trust and Risk in Modern Identity Management

Rohan Pinto
Trust and risk, though opposites in meaning, are intrinsically linked in identity management. Thatโ€™s because digital identities serve as gateways to an organizationโ€™s most valuable...