Insights

The three IT questions CIOs should be able to answer . . . but probably can’t

Kevin Brown, SVP, EcoStruxure Solutions, Secure Power Division, Schneider Electric, discusses how new disruptive technologies, hybrid and distributed IT architectures and the need for actionable data insights...

Counting the cost of the biggest BEC attacks

Robust email protection is a necessity for protecting against one of the industry’s most sophisticated attack types; Business Email Compromise (BEC). Andrew Rose, Resident CISO, Proofpoint, offers some top tips to a...

Going low-code to build a new interactive virtual experience

Shiv Dutt, VP – Digital Experience and Innovation at Pampered Chef, provides us with a first-person account explaining how the cookware company, owned by Berkshire Hathaway, has been utilizing Iterate.ai’s low-code pla...

Building trust in a Zero Trust environment

Gil Vega, Chief Information Security Officer at Veeam, asks how companies can effectively navigate Zero Trust without creating friction among employers and employees. A recent study by MITRE and DTEX revealed that despite...

Fueling growth in a technology renaissance

Chicago-based Amir Arooni, Executive Vice President and CIO, Discover Financial Services, tells us how the digital bank is embarking on its own technology renaissance through its Discover-run Runway program. He says:...

Expert advice for layering up your defences this World Password Day

The annual World Password Day raises awareness of the importance of having robust and resilient password hygiene practices in place. We hear from various industry experts who discuss best practices for password security....