CIO Influence

Category : Guest Authors

Analytics CIO insights Data Management Guest Authors Machine Learning Security

What Cybersecurity Teams Should Understand About AI

Piyush Sharma
Artificial Intelligence (AI) is on track to become the norm in cybersecurity. A recent Deloitte study has revealed that 84% of cybersecurity programs implement AI...
Analytics Automation Guest Authors IT and DevOps Machine Learning Security

Is A Human Touch Needed When Compliance Has Automation?

Sam Peters
Compliance leaders in the U.S. are operating in a storm. From state-level privacy laws like the California Consumer Privacy Act (CCPA) to sector-specific rules such...
Cloud Financial Services Guest Authors IT services Security

DORA Has Been a Wake-up Call for Financial Services. Hereโ€™s How.

Andre Troskie
Few industries are under the same level of regulatory scrutiny as financial services. New frameworks are introduced all the time, and for good reason: the...
Cloud Data Management Guest Authors Machine Learning Security Technology

Building Trust in Tech Transitions: How CTOs Can Turn Anxiety Into Adoption

Mike Gibson
Adopting new technologies, whether it be cloud infrastructure, AI tools, or APIs, can often feel like a high-stakes gamble for organizations. The cost of failure...
Analytics Data Management Guest Authors Networking Security

Beyond Defaults: Closing the Resilience Gap Against Evolving Ransomware Threats

Nir Dvorkin
The contemporary cybersecurity landscape often sees a pervasive, and frequently misleading, reliance on “built-in” security features across devices and operating systems. Built-in meaning, the default...
Business Cloud Guest Authors Machine Learning Security

Todayโ€™s CISO: Navigating AI Risk, Cloud Complexity, and Evolving Threats

Chaim Mazal
CISOs and AI are experiencing a love-hate relationship. AI is transforming how businesses operate, including security operations, but as organizations rush to reap the rewards,...
Business Cloud Guest Authors Security

How Hands-On Seed Investors Are Reshaping Cybersecurity Go-to-Market

Justin Somaini
Too many early-stage cybersecurity startups waste critical time and capital building in isolation. They develop features without input from real buyers, polish decks that donโ€™t...
Guest Authors IT and DevOps Networking Security Technology

Securing Desktops Against Ransomware: Practical Lessons Beyond the Perimeter

Jeremy Moskowitz
Desktop security has taken on new urgency in todayโ€™s hybrid IT environments. While firewalls and endpoint detection platforms still play an important role in cybersecurity,...
Analytics Automation Cloud Enterprise software Guest Authors IT and DevOps Machine Learning Security

AI Traffic Is Disrupting Enterprise Infrastructure โ€“ Hereโ€™s How To Respond

Benjamin Barrier
In June 2025 alone, enterprise traffic monitoring observed 1.2 billion requests from OpenAI crawlers across major digital platforms. AI traffic more than tripled in just...
Automation Data Management Guest Authors IT and DevOps Machine Learning Security

Data Privacy: A Growing Financial Burden for Businesses

Daniel Barber
As consumers reclaim control over their personal data, companies that ignore this shift are paying the price. Data privacy is no longer a future concernโ€”itโ€™s...