Remove Research Remove Security Remove Strategy Remove Technical Advisors
article thumbnail

Top 10 barriers to strategic IT success

CIO

When asked which challenges most often force IT to redirect time and focus away from strategy and innovation tasks, CIOs most commonly cited staff and skills shortages, changing business conditions, and addressing security threats. Tech debt and legacy tech Technical debt and legacy tech are both big speedbumps.

article thumbnail

The Dark Side of AI in Cybersecurity — AI-Generated Malware

Palo Alto Networks

“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more. And there is a bit of a longer version for that answer. And there is a bit of a longer version for that answer.

Malware 84
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet the 50 CISOs to Watch in 2024

Lacework

Lacework is proud to present our second annual group of 50 CISOs to Watch, a compilation of the most visionary and effective cybersecurity leaders in the industry. In a field driven by constant change, what sets a cybersecurity leader apart? With new cybersecurity regulations like the U.S.

Security 132
article thumbnail

IT leaders uplift women to fill tech talent gaps

CIO

As companies scramble to find qualified IT talent, they are struggling to achieve greater female representation in their technology ranks, particularly in key areas such as software engineering and cybersecurity. A 2020 World Economic Forum report found that women make up a similar percentage (26%) of data and AI positions in the workforce.

article thumbnail

AI, Cybersecurity and the Rise of Large Language Models

Palo Alto Networks

Artificial intelligence (AI) plays a crucial role in both defending against and perpetrating cyberattacks, influencing the effectiveness of security measures and the evolving nature of threats in the digital landscape. staff researcher and Doren Rosen, Sr. As cybersecurity continuously evolves, so does the technology that powers it.

article thumbnail

6 IT rules worth breaking — and how to get away with it

CIO

Management rules typically exist to enable faultless decision-making, set a foundation for consistent operation, and provide protection from risk, observes Ola Chowning, a partner at global technology research and advisory firm ISG. Breaking a rule often happens after the CIO weighs the risk of removing or retaining a mandate,” she notes.

article thumbnail

14 in-demand cloud roles companies are hiring for

CIO

After marked increase in cloud adoption through the pandemic, enterprises are facing new challenges, namely around the security, maintenance, and management of cloud infrastructure. Following are the roles companies are most likely to have added to support their cloud investments, according to Foundry’s research.

Cloud 325