JZ Articles Posted Week of October 28

JZ Articles Posted Week of October 28

CxO

CIOs Under Pressure To Deliver AI Outcomes Faster

Salesforce CIO Juan Perez has spoken with a lot of IT leaders of late. His big takeaway? C-suite expectations may be too hasty (and underinformed) to deliver meaningful AI value in a responsible manner....more

Joe Sullivan: CEOs Must Be Held Accountable For Security Too

The former CSO at Uber was found guilty in 2022 of obstruction of justice relating to a breach. Now he's calling for clearer regulatory frameworks for security....more

CHRO Is The Third Fastest-Growing C-Suite Role, Linkedin Finds

LinkedIn attributed C-suite trends to other changes to the workplace, including the increased focus on AI and the rise of remote and hybrid work....more

7 Signs You May Not Be A Transformational CIO

Accelerating business change has become an IT imperative. But not all CIOs have positioned themselves and their teams to drive transformation across the business....more

How CIOs And CTOs Are Bridging Cross-Functional Collaboration

IT necessarily works across departments, but now, CIOs and CTOs are driving greater collaboration across the business....more

CISOs' Strategies for Managing A Growing Attack Surface

In this Help Net Security interview, Rickard Carlsson, CEO at Detectify, discusses the evolution of attack surface management in the context of remote work and digital transformation....more

Storage

2025-26 Top 5 Enterprise SDS Block Storage Solutions

DataCore Software SANsymphony, Hitachi Vantara VSP One SDS Block, OSNexus QuantaStor, StorONE Data Storage Platform, Veritas InfoScale...more

Western Digital matches Seagate's 32 TB HAMR capacity with 11-platter ePMR HDDs

Western Digital has matched Seagate's 32 TB HAMR disc capacity by adding an 11th platter to its conventional disk drives....more

AI

AI Leadership Insights: The AI Hype

In this Techstrong AI Leadership Insights video interview series, Amanda Razani speaks with Lee Caswell, SVP of product and solutions at Nutanix, about what enterprises need to address before falling into the AI hype....more

11 Key Roles For AI Success

To maximize the business value of artificial intelligence, AI teams require a diverse range of skills and roles, from data scientists and domain experts, to strategic decision-makers....more

AI Leadership Insights: Genai For Business Value

Claire Vo, chief product and technology officer for LaunchDarkly, explains why organizations need to encourage more experimentation with GenAI to discover the use cases that will deliver the most value to their business....more

ESG

Unlocking Hidden Value With ESG Synergies To Supercharge M&A Deals

Environmental, Social, and Governance (ESG) has been a key factor for mergers and acquisitions (M&A) in recent years....more

Security

Even Orgs With SSO Are Vulnerable To Identity-Based Attacks

Use SSO, don't use SSO. Have MFA, don't have MFA. An analysis of a snapshot of organizations using Push Security's platform finds that 99% of accounts are susceptible to phishing attacks....more

Advanced Tips For Leveraging The NIST Cybersecurity Framework For Compliance

Depending on the industry, location, and business operations of your organization, you may have any number of cybersecurity regulations to comply with. Keeping track of each law that affects your organization and the various requirements associated with them can be overwhelming, but the consequences of noncompliance are often far worse....more

Mandiant Founder Calls Chinese Wiretap Hack Unsurprising

Telecommunications providers have always been an ideal espionage target for foreign adversaries, Kevin Mandia said in an interview....more

Is AI The Secret Weapon In The Fight To Secure Identity?

It is not surprising that the increasing complexity and number of identities held by organizations has been accompanied by a surge in identity-related security breaches. In fact, a 2023 report revealed that 90% of organizations reported a security incident related to digital identities over the previous year....more

Cybersecurity Risk Assessment Best Practices

A cybersecurity risk assessment offers organizations a structured approach to identifying vulnerabilities and threats, thereby providing actionable insights for making strategic risk management decisions....more

Secure By Design: The (Necessary) Future Of Hardware And Software

ICE 2024: Leading figures discussed why secure by design is not only necessary, but absolutely imperative in today's complex connected world...more

MFA

Understanding the Importance of MFA: A Comprehensive Guide

Protecting digital identities is essential for individuals and organizations in a world where cyberattacks are becoming more sophisticated and frequent. If anything has proven to boost security massively, it has to be the proper utilization of Multi-Factor Authentication (MFA)....more

Humor

Yes, Your Network Is Down - You Annoyed Us So Much We Crashed It

By the end of a working week, it can be tempting to just blow up whatever tech you've toiled for days to tame. Which is why each Friday The Register offers a (hopefully) cathartic instalment of On Call, the reader-contributed column in which you share your tetchiest tech support tales....more

Gestalt IT

Commvault Shift's Cyber Resilience For The AI Era

At Commvault SHIFT 2024, The Futurum Group's Daniel Newman and Patrick Moorhead sat with CEO Sanjay Mirchandani, who discussed Commvault's strategic pivot towards a cloud-first approach in cyber resilience....more

You Don't Need Post-Quantum Crypto Yet

With the advent of quantum computers, the likelihood that modern encryption is going to be invalidated is a possibility. New standards from NIST have arrived that have ushered in the post-quantum era....more

DevOps

6 Enterprise DevOps Mistakes To Avoid

DevOps success in complex enterprise environments can be elusive. Here's where IT leaders too often go wrong - and how to get back on track....more

Compliance

7 Top Compliance Audit Software For 2024

We get it - keeping up with new, ever-changing compliance requirements can be a nightmare, often resulting in a mild headache at best....more

Encryption

Achieving End-To-End Data Security With The Right 'Fully Homomorphic Encryption'

Everyone knows the cost and frequency of data breaches are rising. The question is, do you know if your data is truly secure? I have news for you. It's not....more


PARTNERS

About Jerry Zabell, Independent Consultant

As a solution consultant I focus on delivering comprehensive solutions in the technology sector which has been a game-changer. With a deep understanding of the IT landscape, I lead the charge in applications, BPO, infrastructure services, technology and staffing consulting My mission is to enable companies to excel in their business processes, emphasizing innovation and efficiency.

My role as VP of North American Sales with the companies I represent is to harnesses my strengths in new business development and technology, driving strategy forward .

My Consulting engagements have established me as a trusted partner in the tech industry, and it's through strategic leadership and a commitment to excellence that I continue to grow and enrich my partnerships.

This weekly newsletter is one of my value-added services that I believe you will find to be valuable.

要查看或添加评论,请登录

社区洞察

其他会员也浏览了