CIO Influence

Category : Guest Authors

Data Management Guest Authors IT and DevOps Security Technology

Industries Under Siege: The Rising Threat of Cyberattacks in 2024

George Jones
Industries are the backbone of global economies, driving innovation, creating jobs, and fostering prosperity. However, they are increasingly vulnerable to cyberattacks, which threaten economic stability...
Guest Authors IT and DevOps Machine Learning Natural Language Security

Precision-Guided RAG: Transforming Customer Support for the Modern Enterprise

Karan Sood
As the overseers of tech advancement and operations within an organization, CIOs must remain agile in the face of fast-paced change triggered by new technologies....
Cloud Data Management Guest Authors Machine Learning Natural Language SaaS Security

Cloud and AI: Data management and data protection are primary pain points for CIOs and CISOs

Kim Larsen
In the rapidly evolving technology landscape, organizations are facing growing challenges when it comes to data protection and disaster recovery. Recent research by Keepit and...
Cloud Data Management Digital Transformation Guest Authors Machine Learning Natural Language Security

Mastering API Security: Essential Principles for Success

Eric Schwake
The use of APIs across organizations’ digital infrastructure has increased exponentially within the past several years. As the primary link between customers and their desired...
Analytics Digital Transformation Guest Authors Machine Learning Security

Securing Software Supply Chains: How Technology Leaders Can Build a Unified Front

Aran Azarzan
In the fast-evolving landscape of enterprise cybersecurity, one of the most critical yet often overlooked vulnerabilities lies within the software supply chain (SSC). The expansive...
Analytics Automation Cloud Guest Authors Regulation and Compliance Managment Security

Why Secure Collaboration is Critical for an Effective Cybersecurity Incident Response

Corey Hulen
Today, it takes an average of 277 days to identify and contain a single attack, according to research from IBM and Ponemon Institute. Improving response...