strategy

Confessions of a CTO
Chief technology officers (CTOs) are typically juggling the joint responsibility of maintaining the organization’s overarching technology infrastructure and enabling business …

Digital transformation requires security intelligence
Embracing change and resilience became the mantra for business continuity as organizations powered through the pandemic. Incorporating digital technologies were critical to …

Internal auditors stepping up to become strategic advisors in the fight against fraud
A report from the Internal Audit Foundation, The Institute of Internal Auditors (IIA) and Kroll, is based on a recent global survey and focus groups with internal auditors, …

The CISO as brand enabler, customer advocate, and product visionary
Just over a quarter-century ago, the first Chief Information Security Officer (CISO) was minted in the financial vertical, and everyone lived happily ever after. The End. If …

Mainframe still powering critical business operations
Rocket Software released a report, based on a survey of over 500 U.S. IT professionals in firms using mainframes focused on their priorities, challenges and plans for …

Cloud native application security is a critical priority, risk perception is worryingly low
Aqua Security has announced the results of a study which reveals that UK organizations have a long road ahead when it comes to understanding, planning and deploying their …

What’s stopping organizations from becoming data-driven?
A study conducted among CIOs, chief data officers and vice presidents in data-oriented positions released by Domo, pointed to a significant data decision gap impacting …

Cloud-native adoption shifts security responsibility across teams
Styra released a research report which explores how in sync, or misaligned, IT leaders and developers are when it comes to cloud-native technology use and security during …

The importance of data in the metaverse
A research from Bright Data has highlighted the importance of data in virtual environments such as the metaverse. The survey, conducted by Vanson Bourne, generated insights …

Companies should evolve their cybersecurity strategy in light of the Great Resignation
While the obvious challenge of the Great Resignation is rising labor shortages, the phenomenon is now posing a critical risk to another important aspect of the workforce: …

Qualys platform study: Log4Shell, the menace continues
The anatomy of Log4Shell By now, we are all familiar with the fact that Log4Shell is just about as critical as a critical vulnerability can get – scoring a 10 out of 10 on the …

Top data governance challenges and strategies for high-growth startups
Hyper-growth startups face a unique set of challenges when it comes to secure data access. Their priority is to drive rapid innovation, scale their customer base and grow …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025