article thumbnail

13 essential skills for accelerating digital transformation

CIO Business Intelligence

Digital transformation is indeed a cornerstone of business strategy today, as 89% of enterprises see digital business as core to their growth, according to Gartner’s Board of Directors 2023 Survey. This ability to understand customer feedback beyond periodic surveys is going to be a critical skill going forward.”

article thumbnail

The move toward enterprise security technology integration

Network World

82% of survey respondents “strongly agree” or “agree” with the statement: "My organization is actively building a security architecture that integrates multiple individual product." 73% of survey respondents “strongly agree” or “agree” with the statement: "My organization tends to select best-of-breed products." Here are the results:

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The biggest enterprise technology M&A deals of the year

CIO Business Intelligence

NetApp added some new functionality to its portfolio of cloud management tools in late February with the acquisition of Fylamynt, a young low-code cloud ops automation company. SaaS vendor management platform Vendr is buying SaaS management platform vendor Blissfully. The price tag, a whopping $68.7

article thumbnail

The year’s top 10 enterprise AI trends — so far

CIO Business Intelligence

It took years for traditional AI—ML and neural networks—to get to the point where they could be embedded. Today, most major AI platforms, including OpenAI, have APIs allowing enterprises, and enterprise software vendors, to quickly add gen AI functionality into their systems. Gen AI took a few months.

article thumbnail

7 challenges facing CIOs and IT leaders in 2020

mrc's Cup of Joe Blog

In short, it encrypts files on the infected computer(s) or network, making them inaccessible. A recent survey found that 70% of enterprise ransomware victims paid the ransom. Protecting against the growing ransomware threat. You’re forced to pay a ransom payment to restore file access. It’s lucrative.

article thumbnail

Why Organizations Fail to Secure Third-Party Remote Access

SecureWorld News

So in our survey research, over two thirds of respondents stated that third-party remote access was high risk or very high risk for them. The other issue is the downtime and critical systems that are managed by a vendor. Don't outsource that to your vendors. It's too important, it's too critical.