February 10, 2020
From data analytics to cybersecurity to customer experience, hereâs where CIOs will direct their IT budgets this year. Read more â¶
6 tips for building your cybersecurity bench
Public cloud: Real-world examples of strategic success
How to bring security into agile development and CI/CD
Eli Lilly AI automates adverse reaction reporting
8 top OSINT tools: Find sensitive public info before hackers do
Why hacking must be addressed in digital privacy policymaking
4 lessons from the Hertz vs. Accenture IT disaster
How one law firm made security a business development opportunity
In the current business landscape, critical systems such as ERP, CRM, collaboration and communication platforms, customer-facing apps, and other business tools are moving to the cloud. Read more â¶
You can only control a limited number of the variables that lead people to leave a job. Here are some suggestions for keeping your talent and helping them thrive. Read more â¶
DEALPOST
These eleven beginner-friendly courses will introduce you to the platform and its most important features. Read more â¶
The public cloud has gone mainstream, with companies leveraging it as a strategic tool for digital transformation. IT leaders lend advice on migrating to public cloud services to drive business agility and innovation. Read more â¶
Align to DevSecOps and shift-left security to improve coding practices, eliminate vulnerabilities in development, and deliver highly secure apps to production Read more â¶
The 144-year-old pharmaceutical team built a platform that uses AI to process data about adverse events. Read more â¶
Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed. Read more â¶
Virtually all attention to date has been focused on developing legal and regulatory remedies to address digital privacy. But little attention has been paid to the flip side of this two-sided coinânamely, digital hacking. Read more â¶
A tremendous amount of information and specific insight can be gleaned by analyzing projects gone wrong. Here are four lessons IT leaders can apply to any outsourcing agreement. Read more â¶
Mark Walmsley, CISO at international law firm Freshfields, says a proactive approach to security helps the business win clients and gets its lawyers to embrace security. Read more â¶
Digital tools are reducing costs and driving innovation in the insurance sector. Read more â¶