Remove Network Remove Presentation Remove Technical Advisors Remove Technical Review
article thumbnail

6 signs an IT manager is struggling — and how to help

CIO

“IT middle managers play a critical role, and companies often neglect and underinvest in them,” says Dan Roberts, host of the Tech Whisperers Podcast and author of Confessions of a Successful CIO. Tech leaders say relationship building is the key. Your failure or success will be highly dependent on your network.

article thumbnail

Meet the 50 CISOs to Watch in 2024

Lacework

Lacework is proud to present our second annual group of 50 CISOs to Watch, a compilation of the most visionary and effective cybersecurity leaders in the industry. Beyond technology, it’s their adaptability, creative problem-solving, and commitment to progress. LinkedIn Anand Singh Alkami Technology, Inc.

Security 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2023 CIO Hall of Fame inductees on building a successful IT leadership career

CIO

Yet the leading tech execs who make up CIO’s 2023 CIO Hall of Fame share many of the same attributes, attitudes, and ambitions. For example, most say they love both technology and problem-solving — a combination that often got them interested in the IT profession in the first place. Second, be intentional.

article thumbnail

5 Reasons Why NIS2 Directive Preparation Should Start Now, Part Two: Implementation Takes Time

Ivanti

In a previous blog post, I discussed the two main areas to audit before the European Union’s updated Network and Information Security Directive (NIS2) becomes ratified law in October 2024. Review your current supply chain security flaws. Specifically, these audits would: Identify your gaps with the NIS2 directive’s requirements now.

article thumbnail

Cyber Canon Book Review: Hacks that Shocked the World

Palo Alto Networks

Please write a review and nominate your favorite. . Cyber Canon Book Review: “Cyber Wars: Hacks That Shocked the Business World” by Charles Arthur. Book Reviewed by: Tracy Z. Each chapter could easily stand alone as a resource for presenting warnings and best practices for enterprise security.

article thumbnail

The Dark Side of AI in Cybersecurity — AI-Generated Malware

Palo Alto Networks

“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more. threat actors will use AI to automate their work and be much more effective."

Malware 72
article thumbnail

Is the metaverse inching closer to reality?

Capgemini

It is right to question technologies that promise so much when many have not lived up to the hype. Many of us will be overly familiar with the 2D environment of a video call, where some people prefer to stay off-camera and social cues can be limited by technical issues. In many ways, the metaverse can address this issue.