Analysis

Beware – excessive permissions are the number one cloud threat

Eyal Arazi, of Radware, discusses the major security threats with migrating workloads to public cloud environments. Migrating workloads to public cloud environments opens up organizations to a slate of new,...

How to navigate the rise of data democratization: A guide for IT architects

In the face of data complexity, IT architects are responsible for making sure the backend data plumbing is well-conceived, so data teams across the organization can effectively leverage data. François...

Methodist Health System gains cost predictability with Cohesity on Cisco UCS

Methodist Health System serves the metropolitan-Omaha area in Nebraska. The health network deployed the jointly developed Cohesity on Cisco UCS data management solution for modern backup as well as Disaster...

IT is challenged but will emerge stronger than ever

Jacqui Guichelaar, Senior Vice President and Chief Information Officer at Cisco, discusses the recent Cisco survey in which CIOs reveal their fears, strengths and strategies for coping with the pandemic. In my...

Mobile telecom industry making rapid progress towards 5G

A BPI Network survey found operators are rethinking security in light of 5G network traffic, a dramatic increase in connected devices and new mission-critical use cases. Mobile service providers say they are making...

Seven ways cyber criminals steal your passwords

One way or another, passwords are always in the news. They’re either being stolen in data breaches, or mocked for being too simple; derided as pointless, or lamented for being technologically backward. However,...

Browse our latest issue

Intelligent CIO North America

View Magazine Archive