article thumbnail

Key skills tech leaders need to secure a board seat

CIO

Rona Bunn is CIO for the National Association of Corporate Directors (NACD), where she facilitates digital orchestration and leads information technology, data, and digital experience. Tech leaders must go beyond focusing on preserving technology assets and enabling operational efficiency—that’s an old conversation.

article thumbnail

Governance and Fighting the Curse of Complexity

CIO

Password strategies. Throw in all the technical debt – and the cultural tendency (and often necessity) of building connections for backward compatibility. New systems, new technologies, new approaches will continue to increase IT complexity. The most powerful solution isn’t downloaded from a tech company’s site.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Monday scams? Fakespot says it can identify fraudulent reviews and sellers online

TechCrunch

It’s using AI to notify online shoppers when the products they’re looking to buy are fake listings or when reviews they’re reading on marketplaces like Amazon or eBay are a fiction. Like many other startups, Fakespot was originally focused on helping enterprise customers identify counterfeit outfits and fake reviews.

article thumbnail

The only CIO resolution that matters

CIO

To wit, across nearly every discipline, one finds magnum opuses entitled “Lessons Learned” or “The Year in Review” as the year draws to a close. Perhaps in an age when our forebears huddled around campfires waiting for warmer weather annual reviews were the optimal way to accumulate knowledge and empower human agency.

article thumbnail

Elevate your digital transformation with impactful sustainability

CIO

The Equinix Global Tech Trends Survey found that 71% of global IT decision-makers agree that sustainability strategy and practices are critical to the longevity of their business, and 65% said their companies would only work with IT partners who can prove they meet key carbon-reduction targets.

article thumbnail

What you need to know about Okta’s security breach

CIO

A DLP-like technology can be effective in preventing users from uploading files with sensitive data unknowingly. A simple deception strategy can help detect adversary presence before an attacker establishes persistence or exfiltrates data. Exfiltration The adversary uses their access to download sensitive data and extort the victim.

article thumbnail

How the tech industry is responding to Russia’s invasion of Ukraine

TechCrunch

The impacts of the invasion are also, undoubtedly, being felt across Ukraine’s wider tech ecosystem, which includes not only hundreds of startups and larger tech firms, but also research and development offices for some of the world’s biggest technology brands. GET IN TOUCH.