CIO Influence

Tag : Applications

Analytics Featured IT and DevOps Machine Learning Networking Security

Your Defenses Are Failing. It’s Time to Start Hunting

You have invested a significant amount of money in your organization’s digital defenses, including firewalls, antivirus software, and intrusion detection systems. However, clever attackers are...
Analytics Automation Cloud Featured IT and DevOps Machine Learning Networking Security Technology

The elastic enterprise: Architecting IT that expands and contracts with market volatility

For many years, technology environments were built on the idea that things were relatively predictable. Workloads peaked at known times, capacity planning followed the annual...
Apps CIO Influence News Networking

Microchip Introduces Flexible New Family of Gigabit Ethernet Switches with TSN/AVB and Redundancy For Industrial Applications

GlobeNewswire
Microchip’s next generation LAN9645xF and LAN9645xS GbE switches are highly configurable with multiple ports and advanced features Ethernet technology provides the high-speed, reliable communication needed...
CIO Influence News Drones Technology

Volatus Aerospace Secures Approval from Transport Canada to Launch Scalable Automated Drone Services in Canada and Provides Corporate Update

GlobeNewswire
Showcases strong technology partnerships with Kongsberg Geospatial and MatrixSpace, positioning Volatus as the integrator of a proven ecosystem. Strengthens Volatus’ competitive position as one of...
Application Security CIO Influence Interviews Cloud Machine Learning Security

CIO Influence Interview with Dilip Bachwani, Chief Technology Officer, Qualys

Paroma Sen
...
AIOps CIO Influence News Security

Palo Alto Networks Completes Acquisition of Protect AI

PR Newswire
Extends AI security leadership with comprehensive protection for the entire AI lifecycle Palo Alto Networks, the global cybersecurity leader, today announced it has completed its acquisition...
CIO Influence News Machine Learning Security

watchTowr Unveils AI-Powered Preemptive Exposure Management Platform to Outpace Rise of Zero-Day Exploitation

Business Wire
Combines proactive threat intelligence with real-world attacker telemetry and automated red teaming to allow organizations to rapidly understand exposure and stay ahead of in-the-wild exploitation...