Three ways IT can mitigate DNS security threats: A guide

You may think your domain name system is secure. But have you peeked under the hood recently? If you have, you may have seen the metaphorical tangle of wires and junk clogging up the system and quickly backed away, hoping that nothing will catch fire.

The DNS is the complex, interdependent addressing system that directs users to every aspect of your organisation’s digital experience. Executives tend to...

By Peter La Mantia, 04 October 2019, 0 comments. Categories: Applications, Authentication, CIO, Data Loss, Security.

How automation will impact the future of IT skills

In casual conversation, artificial intelligence (AI) and automation are talked about as if they’re interchangeable, but this doesn’t reflect reality. Automated processes serve the sole function of automating specific tasks without human intervention. AI, on the other hand, is the simulation of actual human intelligence to work on tasks independently.

Despite the clear distinction between AI and automation, a...

By Sascha Giese, 30 September 2019, 0 comments. Categories: Applications, CIO, Cloud , Data & Analytics, Productivity.

How to get ahead as a CIO: Why transformation alone isn’t enough

In the past 24 months, many CIOs have begun the strategic transition of steering their organisation through the digital transformation journey. Becoming an enabler for the business is a relatively straightforward evolution, but what the business really needs is the tech savvy visionary. However, if, as a CIO, you are placing exclusive focus on digital transformation, you risk missing the bigger picture. The CIOs who have one eye on delivering more than digital transformation are moving to establish themselves...

By Robert Rhame, 27 September 2019, 0 comments. Categories: CIO, Enterprise Mobility, Productivity.

Why businesses need to develop a Matrix Mindset

Digital technology is a pervasive force that impacts every part of our existence. It will be embedded in everything – our bodies, our houses, the cities and world we live in – all with the capability to augment our daily lives.

A key component of this will be a synergistic combination of cloud and AI, part of what LEF defines as “The Matrix”, creating an intelligent, pervasive infrastructure that will increasingly be able to perform just about everything that companies and individuals...

By Glen Robinson, 26 September 2019, 0 comments. Categories: CIO.

Organisations still trying to find sweet spot between innovation and security focus, argues CompTIA

It is a question which organisations continue to ponder: what is the right balance between innovation and security? A new report from CompTIA argues that companies are working to balance both sides of the coin – but with issues along the way.

The report, ‘Cybersecurity for Digital Operations’ which is based on a survey of 500 US businesses, found almost half (45%) of organisations polled were...

By James Bourne, 19 September 2019, 0 comments. Categories: CIO, Data Loss, IoT, Security.

One in five CISOs reports directly to the CEO today as organisations focus more on IoT and cloud

The latest study from Wipro has found that one in five CISOs are now reporting directly to the CEO, with cloud and Internet of Things (IoT) strategies increasingly on the radar.

Wipro’s latest study, titled “2019 State of Cybersecurity Report”, is based on three months of primary and secondary research, including surveys of security leadership, operational analysts, and 211 global organisations across 27...

By Enterprise CIO, 04 September 2019, 0 comments. Categories: CIO, Research, Security.

Mobile identity is the new security perimeter: How enterprises need to secure their mobile worlds

  • 86% of enterprise executives say that mobile threats are growing faster than any other according to Verizon’s Mobile Security Index 2019 and 67% of enterprise execs are less confident about the security of their mobile devices compared to other IT assets.
  • Mobile devices are hackers’ favorite platform to target, with over 905,000 malware packages installed in Q1 of this year alone and over 5.3 million in 2018, 

By Louis Columbus, 03 September 2019, 0 comments. Categories: Authentication, CIO, Employees, Identity, Security.

Alerts are ignored and turnover is high as security teams suffer from incident overload, report says

If everything incident which happens at an organisation is of super-critical importance, then how can the system fully function? Alert overload for security teams is not uncommon, yet a new report from Critical Start encapsulates the issues many personnel face.

The company’s report, ‘The Impact of Security Alert Overload’, polled more than 50 security operations centre (SOC) professionals across enterprise...

By James Bourne, 02 September 2019, 0 comments. Categories: CIO, Collaboration, Data Loss, Employee Education, Employees, Research, Security.

Tackling cybercrime one step at a time: How businesses can stay connected and protected

As concern around cyber security continues to rapidly grow and threats become increasingly complex, the challenges faced by businesses are mounting considerably. In fact, when assessing the cyber security risk, it is no longer a question of if a business will be attacked, but when.

Today, significant cyber security breaches are becoming commonplace in newspaper headlines, with British Airways among one of the latest organisations to face the consequences of a data breach. This resulted in around 500,000...

By Shani Latif, 22 August 2019, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Enterprise Mobility, Security.

Want the benefits of blockchain but easy implementation with it? The answer may be here

Blockchain has been around for a little over a decade now. Yet while most IT folk understand that it’s about transaction security, business decision-makers have still to tune in. Ultimately, a hesitant business stance towards adopting blockchain has left many organisations with substandard, costly and centralised data security systems.

One reason organisations have been hesitant to even trial blockchain, is the perceived cost of experimentation, development and implementation. But this cost has fallen...

By Chris Obdam, 16 August 2019, 0 comments. Categories: Applications, CIO, Development, RMAD.

Are CIOs investing in the right technology to manage the next phase of digital transformation?

Have you noticed that your digital transformation projects are getting shorter in implementation periods? How often have you discovered a new technology that could change the outcome of what you are doing midway through a project, when it wasn’t available at the outset? Are you increasingly nervous of your competitors stealing a march on you in the race to transform?

I don’t expect...

By Neil Lonergan, 01 August 2019, 0 comments. Categories: Applications, CIO, IoT, Marketing.

Why AI cybersecurity is a leap forward in threat intelligence

No sector is immune from cyber attacks and attackers do not discriminate against size of organisation. The objective may be financial or even political, what is certain is that the increasing level of sophistication means that they present some of the most the most strategically significant risks to business today.

Cybersecurity is driven by the need to remain one step ahead of the attacker. As...

By Neil Kell, 11 July 2019, 0 comments. Categories: Applications, CIO, Data & Analytics, Data Loss, Security.

Today’s CIO needs to learn the language of the board: The first lesson

As IT has become more integral to business the role of the CIO is changing. In fact, of all the roles within an organisation, the job of the CIO has changed the most in recent years.  And as businesses everywhere go through their own flavour of digital transformation, the role will continue to evolve.   Where once they were primarily concerned with building and delivering technology, CIOs today are likely to focus more on influencing the...

By Agata Nowakowska, 10 July 2019, 0 comments. Categories: CIO, Employees.

Hiscox cyber readiness report notes air of cautious optimism among enterprises

A new report from insurer Hiscox has revealed that while the numbers for cyberattack cost and frequency continue to rise, knowledge and concern is increasing with it.

The report, which analysed 5,400 firms across seven countries, argued cyber threat has “become the unavoidable cost of doing business today.”

Looking at the top figures make for pessimistic reading. The number...

By James Bourne, 09 July 2019, 0 comments. Categories: CIO, Employees, Enterprise Mobility, Security.

The CIO's role is moving to customer obsession - but many lack the tools to do it

The CIO role is moving ever further towards customer experience as a priority; yet new research argues a 'digital deadlock' means the C-suite is struggling at delivering new KPIs.

The study, from analytics provider Accedian, argued that three in five (61%) CIOs polled feel entirely responsible for customer experience. The vast majority (99%) agreed that this aspect was in their job description.

95% of CIOs polled said their teams were at least partially responsible for delivering excellent customer...

By James Bourne, 26 June 2019, 0 comments. Categories: Applications, CIO, Data & Analytics, Research.

The changing role of the CIO: Evolution and embracing agile management

Since the dawn of the digital age, expectations of the chief information officer (CIO) continue to change. As the pace of digitisation continues to accelerate and new technologies are introduced, CIOs are becoming increasingly responsible for the variety of data sources that proliferate and impact every department in an organisation.

It is expected that the CIO will plan and develop a computing infrastructure that supports all business and product lines in heterogeneous computing environments both...

By Oded Blatman, 19 June 2019, 0 comments. Categories: CIO, Employees.

The 2019 CIO strategy analysed: Leaders needed combining CIO knowledge and CEO flair

The role of the CIO in 2019 remains a fascinating one. Where do companies invest in their technology initiatives? What position does the CIO hold? What emerging technologies need to be explored?

According to the 2019 CIO survey from Harvey Nash and KPMG, which polled more than 3,600 IT leaders, almost two thirds (63%) of organisations are now allowing technology to be managed outside the IT department.

By James Bourne, 14 June 2019, 0 comments. Categories: CIO, Development, Employees, Enterprise Mobility, Research.

The seven mistakes CIOs can make with blockchain – and how to overcome them

Gartner appears to really have it in for blockchain – or at least, wants to make sure organisations don’t dive in head first and make a serious mistake.

The analyst firm has put together a list of seven mistakes to avoid in blockchain projects as part of its latest research, including misunderstanding use cases, wrongly assuming key standards, and ignoring governance issues.

By James Bourne, 12 June 2019, 0 comments. Categories: Applications, Big Data, CIO, Research.

MobileIron aims to kill off the password completely with further move to Zero Trust

Enterprise mobile software provider MobileIron has announced an update to its Access mobile security and identity platform with a zero sign-on solution which aims to finally replace the password as a security authenticator.

The company’s vision is to enable enterprises to use their mobile devices as their digital identity to access enterprise services and data, built on its unified endpoint management (UEM) platform and powered by...

By James Bourne, 08 May 2019, 0 comments. Categories: CIO, Employees, Enterprise Mobility, Privacy, Security.