Remove undefined
article thumbnail

The cyber security challenges in fintech and neobanking’s rise

CIO Business Intelligence

“The only solution to this dilemma is to make sure that the development lifecycle of applications become ‘secure by design.’ This effectively creates digital ‘guardrails’ for developers to still run fast, but avoid major accidents or weaknesses in the process,” he says. There are a few approaches that we suggest.

article thumbnail

CI&TO Abhi Dhar on embracing challenges and growing IT leaders

CIO Business Intelligence

You also have a reputation for developing talent and growing the next generation, including many leaders who’ve moved on to become great CIOs in their own right. You mentioned your ability to spot talent. Why is that a priority for you? But I can appeal to people’s desire to do the right thing and to work as part of a collective.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

We’re not bluffing: Poker and other games are good models of the autonomous enterprise

CIO Business Intelligence

We at Digitate are thinking about machines’ role at work too, as we develop software tools to make the autonomous enterprise real. However, the distinguishing factor remains the same: Whether the task under consideration handles data in a defined or undefined way. Undefined data activities do not adapt well to machine management.

article thumbnail

Criteria for a First Agile Project - Social, Agile, and Transformation

Social, Agile and Transformation

I cover topics for Technologists from CIOs to Developers - agile development, agile portfolio management, leadership, business intelligence, big data, startups, social networking, SaaS, content management, media, enterprise 2.0 and business transformation. Social, Agile, and Transformation. Isaac Sacolick.

Agile 100