Sat.Nov 10, 2018 - Fri.Nov 16, 2018

The Fight For Cybersecurity Brand Dominance Intensifies

Forrester IT

Everything Is An Endpoint Brings Blackberry Back From The Dead For many, the fact that Blackberry still exists – and the fact that it spent $1.4 Billion of the $2.4 Billion in capital it had – is the most surprising part of the Cylance acquisition.

Fix your data before you move it to the cloud

David Linthicum

Data seems to be a forgotten component of a good system architecture. In cloud migrations, I’m often taken back how the data that was bad on-premises is worse in the cloud. What does bad data look like? Poor data structures, redundant data, no single source of truth, and security and compliance issues all top the list. Indeed, too many enterprises have just kicked the data can down the road using cloud computing camouflage. InfoWorld explains: What is cloud-native?

Improving Customer Experience by Automating Incident Response

Social, Agile and Transformation

The tools and practices of IT Operations have to get better and easier. Every IT Ops engineer has the job of responding to alerts when a website is down or unresponsive. To restore service, the engineer follows a certain procedure to restart the web server and validate that the website is operational. Maybe it happens again a few days later and another engineer repeats the procedure to restore. AI cio cloud computing crisis management customer experience DevOps it management

Please Spread The Word: Cybersecurity Scholarships From (ISC)² and the Center for Cyber Safety and Education

CTOvision

The following info comes via friends at isc2.org, please share this with any you believe eligible: Each year, (ISC)² and the Center for Cyber Safety and Education partner together to offer scholarships to students around the world. There are three categories of scholarships in this program: Graduate, Undergraduate and Women’s. All are open to students […]. CTO Cyber Security News Training and Education

Team Leadership in the Age of Agile

Speaker: Roy Osherove, Technology and Leadership Consultant

Why is implementing new frameworks, from SCRUM to self-organized teams, so much harder than understanding them? Roy Osherove has the solution. Tune in and learn to recognize what state your team is in, to support them accordingly, and to help them adopt the best practices given where they are today.

Examine The Cybersecurity Risk Ratings Market With The Forrester New Wave™ Evaluation

Forrester IT

The Forrester New Wave™: Cybersecurity Risk Ratings, Q4 2018 Earlier today, we published “The Forrester New Wave™: Cybersecurity Risk Ratings, Q4 2018” evaluation.

More Trending

How Can A CIO Help To Transform WebMD Into An Action Center

The Accidental Successful CIO

Everyone already knows about WebMD Image Credit: Peter Morville. In this modern age in which we are living, what do you do when you start to feel not so good?

The importance of maintaining cyber security in your business

CTOvision

Read why Scott Bordoni says that maintaining cybersecurity is important for any business – big or small on IT Pro Portal : Technology over the past few decades has become an increasingly integral aspect of the workplace. From email correspondence and financial transactions to professional networking and collaborative work documents, businesses rely on technology to be […].

eCommerce Will Account for 36% of Global Fashion Retail Sales by 2022

Forrester IT

Fashion is the second largest retail category after grocery. The eCommerce shift is a significant, palpable movement in most economies. A quarter of clothing, accessories, and footwear (fashion) spending already occurs online and is still rapidly growing.

2018 AT&T Business Summit: Security “in” and “of” the Cloud

Cloud Musings

While public cloud is undoubtedly an outsized piece of the conversation, news headlines of the latest data breach can make this move a very frightening proposition.

Best Practices for Micro-Services Management, Traceability and Visualization

Speaker: Robert Starmer, Cloud Advisor, Founding Partner at Kumulus Technologies

Moving to micro-services, or even working with distributed applications in a traditional environment, brings with it a host of interactions that are often difficult to understand. This session will provide an overview of service mesh, a review of the Istio service mesh itself, and dive into best practices and integration models for integrating the traceability model into a distributed application.

Become a Strategic Partner to Your CEO

CEB IT

Picture the scene: The company’s strategic planning session for 2019 starts in 15 minutes, but Jay, the CIO, still hasn’t received a meeting invitation. Instead, 15 minutes later, he sees the chief financial officer, chief operating officer, chief security officer, chief marketing officer and chief human resources officer enter the meeting room and shut the door behind them. Does this situation feel familiar? If it does, you may think that your role has been sidelined.

13 Tech Experts Share What Facebook Should Do Post-Data Breach

CTOvision

Facebook has had a harrowing 2018. First the Cambridge Analytica data breach scandal and then the issue of selling personal user information to Chinese smartphone companies for profit. And now, the recent data breach which could have affected millions of its users. When a business experiences a security breach, there are a lot of steps […]. Cyber Security News Facebook

A Tantalizing Sequel to Web CMS is Coming Soon

Forrester IT

After months of research, I am excited to publish our evaluation of the Web CMS market (Forecast, NowTech, and Wave). Thank you to all the folks who worked so hard to make this happen!

Mobile 172

Is AI Just a Buzzword? 4 Experts Weigh In on the Future of AI

Datacponomy

Perhaps even moreso than even big data or blockchain, AI is fast becoming the buzzword on everyone’s lips. Machine learning has been a promising field for years, but with the astonishing success of deep learning techniques, we’re rapidly being propelled into an automated future.

Achieve a Culture of Resilience in I&O

CEB IT

Regardless of the type of environment you work in, you’ve likely experienced some type of outage or loss of service at some point during your work day. Outages can be frustrating, but they’re also inevitable. However, in today’s 24/7 digital world, the response to downtime becomes more critical than ever before. An organization’s people and culture are some of the most vital components in delivering a resilient digital infrastructure.

FTC Launches New Cyber Security Tools for Small Business

CTOvision

The Federal Trade Commission (FTC) has launched a resource to raise awareness about the vital role cybersecurity plays for the 32+ million small businesses in the US. This effort was part of the National Cyber Security Awareness Month (NCSAM) in October, which has been recognized every month since 2003. The NCSAM was established with the collaboration […]. Cyber Security

Reflection On Web Summit 2018

Forrester IT

Web Summit took place for the third time in Lisbon earlier in November. Over the years, Web Summit has become one of the leading global conferences to discuss everything technology.

Cloud security: The essential checklist

David Linthicum

Cloud security is one of those things that everyone knows they need, but few people understand how to deal with. I The good news is that it’s actually pretty simple, and somewhat similar to security for your enterprise systems. Here’s a checklist of what you may need and how to make these features work. InfoWorld explains: What is multicloud? The next step in cloud computing. | Get started: Going multicloud? Avoid these 3 pitfalls. Understand the multicloud management trade-off.

How to Prepare for a CIO Exit

CEB IT

With 30% to 50% of executives, including CIOs, leaving the role within the first 18 months, an exit plan is critical for both the executive and the organization. While some of these transitions might be planned, such as retirement or a new job, others might be unexpected, such as a forced resignation or demotion. Perhaps the only constant when it comes to transitions is that they are inevitable, and that it takes time and effort to craft an exit plan that is favorable to all stakeholders.

How To 153

Ransomware is the most significant cyber threat to SMBs

CTOvision

While the hype around ransomware attacks has died down, it still construes a significant risk to small and medium businesses, especially those who don’t afford high-quality anti-virus solutions and other tools. Ransomware continues to be the leading cyberattack method experienced by small-to-medium sized businesses (SMBs) according to new research from Datto Inc. The firm surveyed 2,400 managed […]. Cyber Security News

Survey 147

Your People Problem With Emerging Technology And Innovation

Forrester IT

Nearly half of the firms we survey are prioritizing innovation as key to their business strategy. When I step back and think about it, the why is easy to understand; exponential changes like Moore’s Law in the past and Metacalfe’s Law today are accelerating the pace of business.

Survey 161

Fix your data before you move it to the cloud

David Linthicum

Data seems to be a forgotten component of a good system architecture. In cloud migrations, I’m often taken back how the data that was bad on-premises is worse in the cloud. What does bad data look like? Poor data structures, redundant data, no single source of truth, and security and compliance issues all top the list. Indeed, too many enterprises have just kicked the data can down the road using cloud computing camouflage. InfoWorld explains: What is cloud-native?

3 Avoidable Traps to Keep Your New CIO’s Career on Track

CEB IT

John took on the new CIO role at an oil and gas company fully expecting to succeed. He had successfully climbed the rungs of leadership ladder, and been vetted, tested and proven through much of his career. He was, by all accounts, destined for success. Within a few months, however, he became just another statistic. Another one of the 30% to 50% of qualified executives who are asked or forced to leave a new role within their first 18 months.

How AI Is Revolutionizing Digital Marketing

CTOvision

ReadNicole Martin explain how AI is revolutionizing digital marketing on Forbes : Artificial Intelligence and digital marketing are beginning to go hand in hand. With the ability to collect data, analyze it, apply it and then learn from it- AI is transforming digital strategy. As it continues to advance, so will the capabilities to use […]. Artificial Intelligence CTO News

AI Tech Shines A Path To Empathetic Triggers

Forrester IT

I’ve always been attracted to the power of empathy. That being said, I’m a longtime fan of “soft” skills — skills that are helpful in relationship-building, making me a better friend and (presumably) a more tolerable colleague. Empathy clearly fits squarely there. But a more savvy marketer?

Turn your data geeks into customer geeks

Eric D. Brown

What would you do if you had so much data about your customers that you know could know (almost) everything about your customer when they contacted you?

Data 139

IBM Watson IoT’s Chief Data Scientist Advocates For Ethical Deep Learning and Building The AI Humans Really Need

Datacponomy

In terms of pioneering data-based technology, IBM are the gold standard. Indeed, IBM has held the record for receiving the most patents every year for the past 25 years and has developed countless revolutionary technologies, from SQL to the world’s fastest supercomputer.

IBM 94

Assisted Intelligence vs. Augmented Intelligence

CTOvision

In the conversation around the application and adoption of artificial intelligence (AI) and cognitive technologies, two recurring types of solutions usually come up: AI solutions meant to work in conjunction with people to help them accomplish their tasks better, and AI solutions meant to function entirely independent of human intervention. In Cognilytica’s nomenclature, we’ve usually […].

Data Protection Vendors Are Emerging From The Stone Age

Forrester IT

A little over a year and a half ago, I completed an evaluation of data resiliency vendors, published as “The Forrester Wave™: Data Resiliency Solutions, Q3 2017.” ” I gleaned many insights from the assessment process as I spoke with vendors about their offerings and road map and with end users about their successes and challenges. […

Data 153

Securing the IoT has become business-critical

Network World

The IoT era has arrived. Here's some proof: 83% of organizations say the Internet of Things (IoT) is important to business today, and 92% say it will be in two years. That's according to a recent DigiCert survey conducted by ReRez Research of 700 organizations in five countries to better understand the IoT and IoT security. Anecdotally, I always find that markets have matured when it’s no longer an unusual thing.