CIO Influence

Category : Guest Authors

Guest Authors IT services Machine Learning Natural Language Regulation and Compliance Managment Security

Apple Tsunami Drives Urgent Need for Device Security

Jason Dettbarn
Apple devices have been sneaking up on businesses, and now the tsunami is here. IDC predicts a 20% increase in business use of Macs this...
Analytics Automation Guest Authors Machine Learning Regulation and Compliance Managment Security

Data Minimization: A Strategic Approach to Mitigating Insider Threats and Cybersecurity Risks

Rich Vibert
I think we can all agree that today, data is a company’s most valuable asset—and its greatest liability. As organizations generate and collect more data...
Cloud Computing Data Management Guest Authors Security

Addressing the Short and Long Term Challenges of Today’s Modern Data Landscape

Tobie Hitchcock
The explosion of data created and consumed across the world is eye-catching: by 2025, global data creation is expected to triple the amount from just...
Analytics Cloud Computing Digital Transformation Guest Authors Security Technology

Navigating the Complex Landscape of Identity Security in Modern Enterprises

Baber Amin
In today’s rapidly evolving digital landscape, enterprises face an increasingly complex set of challenges when it comes to identity security. In the age of digital...
Analytics Guest Authors Machine Learning Natural Language Security

How to Stop AI From Fueling Insider Risk

Mike Crouse
In the last six months alone, the use of artificial intelligence (AI) in the workplace has doubled. Now, three-quarters of the workforce uses AI tools,...
Apps Automation Bots/Intelligent Assistants Digital Transformation Guest Authors IT and DevOps IT services Machine Learning Natural Language Security

An Evolutionary Approach to Artificial Intelligence

Manoj Chaudhary
Jitterbit’s AI-infused, low-code Harmony platform is empowering customers with intelligent automation for accelerated transformation As artificial intelligence becomes a transformational force industrywide, AI is disrupting...
Guest Authors IT services Regulation and Compliance Managment Security

Navigating CMMC 2.0: A Critical Guide for Manufacturers in the Defense Industrial Base

Tim Golden
The Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) 2.0 is a critical framework designed to bolster the cybersecurity posture of the Defense Industrial Base...
AIOps Analytics Automation Data Storage Datacentre Guest Authors IT services Machine Learning

Simplifying IT Operations with AI Triggers Windfall for Enterprises

Eric Herzog
With data volumes, applications and workloads increasing exponentially, the need for Artificial Intelligence for IT Operations (AIOps) is already surging. The AIOps market size is...
Digital Transformation Guest Authors IT services Machine Learning Security Voice

Companies See Investment in Cybersecurity Protection Software as Leading Defense Against Deepfake Attacks

David Jani
The influx of more sophisticated cyberattacks in the form of deepfakes is forcing companies to rapidly adapt to changing times and ramp up their cybersecurity...