CIO Influence

Category : Guest Authors

Automation Data Management Financial Services Guest Authors Machine Learning Security Technology

It’s Time To Reconsider How We Are Building Cyber Resilience In The Age Of AI

Clyde Williamson
For thousands of years, security meant walls. No city embodied that more than Constantinople, a fortress of moats, towers, and Theodosian Walls that had repelled...
Automation Cloud Guest Authors IT and DevOps Machine Learning Mobile Networking Tech Technology

The AI Operating Model: Redefining IT for Continuous Value

Paul Dorney
As AI becomes embedded into everything from operations to customer engagement, itโ€™s no longer a specialized initiative: itโ€™s core infrastructure. Yet, most IT teams are...
Analytics CIO insights Data Management Guest Authors Machine Learning Security

What Cybersecurity Teams Should Understand About AI

Piyush Sharma
Artificial Intelligence (AI) is on track to become the norm in cybersecurity. A recent Deloitte study has revealed that 84% of cybersecurity programs implement AI...
Analytics Automation Guest Authors IT and DevOps Machine Learning Security

Is A Human Touch Needed When Compliance Has Automation?

Sam Peters
Compliance leaders in the U.S. are operating in a storm. From state-level privacy laws like the California Consumer Privacy Act (CCPA) to sector-specific rules such...
Cloud Financial Services Guest Authors IT services Security

DORA Has Been a Wake-up Call for Financial Services. Hereโ€™s How.

Andre Troskie
Few industries are under the same level of regulatory scrutiny as financial services. New frameworks are introduced all the time, and for good reason: the...
Cloud Data Management Guest Authors Machine Learning Security Technology

Building Trust in Tech Transitions: How CTOs Can Turn Anxiety Into Adoption

Mike Gibson
Adopting new technologies, whether it be cloud infrastructure, AI tools, or APIs, can often feel like a high-stakes gamble for organizations. The cost of failure...
Analytics Data Management Guest Authors Networking Security

Beyond Defaults: Closing the Resilience Gap Against Evolving Ransomware Threats

Nir Dvorkin
The contemporary cybersecurity landscape often sees a pervasive, and frequently misleading, reliance on “built-in” security features across devices and operating systems. Built-in meaning, the default...
Business Cloud Guest Authors Machine Learning Security

Todayโ€™s CISO: Navigating AI Risk, Cloud Complexity, and Evolving Threats

Chaim Mazal
CISOs and AI are experiencing a love-hate relationship. AI is transforming how businesses operate, including security operations, but as organizations rush to reap the rewards,...
Business Cloud Guest Authors Security

How Hands-On Seed Investors Are Reshaping Cybersecurity Go-to-Market

Justin Somaini
Too many early-stage cybersecurity startups waste critical time and capital building in isolation. They develop features without input from real buyers, polish decks that donโ€™t...
Guest Authors IT and DevOps Networking Security Technology

Securing Desktops Against Ransomware: Practical Lessons Beyond the Perimeter

Jeremy Moskowitz
Desktop security has taken on new urgency in todayโ€™s hybrid IT environments. While firewalls and endpoint detection platforms still play an important role in cybersecurity,...