Insights

Introducing Cloudforce One: Cloudflare’s new threat operations and research t...

Blake Darché, Head of Threat Intelligence at Cloudflare, introduces Cloudforce One, a new threat operations and research team from Cloudflare. Meet Cloudflare’s new threat operations and research team: Cloudforce On...

Critical operations threatened by application incompatibility for over...

Over three-quarters of organisations (77%) have at least one application that is not compatible with the latest version of Windows, with up to a quarter of all applications (25%) incompatible for 89% of organisations....

1,100 IT pros spotlight the security hazards of hybrid work

Anthony James, VP of Product Marketing at Infoblox, provides an insight into Infoblox’s survey into the global state of security, including the impact of remote workers. Today’s cybersecurity challenges are not that muc...

The three IT questions CIOs should be able to answer . . . but probably can’t

Kevin Brown, SVP, EcoStruxure Solutions, Secure Power Division, Schneider Electric, discusses how new disruptive technologies, hybrid and distributed IT architectures and the need for actionable data insights...

Counting the cost of the biggest BEC attacks

Robust email protection is a necessity for protecting against one of the industry’s most sophisticated attack types; Business Email Compromise (BEC). Andrew Rose, Resident CISO, Proofpoint, offers some top tips to a...

Going low-code to build a new interactive virtual experience

Shiv Dutt, VP – Digital Experience and Innovation at Pampered Chef, provides us with a first-person account explaining how the cookware company, owned by Berkshire Hathaway, has been utilizing Iterate.ai’s low-code pla...

Browse our latest issue

Intelligent CIO North America

View Magazine Archive