JZ Articles Posted Week of October 28
CxO
CIOs Under Pressure To Deliver AI Outcomes Faster
Salesforce CIO Juan Perez has spoken with a lot of IT leaders of late. His big takeaway? C-suite expectations may be too hasty (and underinformed) to deliver meaningful AI value in a responsible manner....more
Joe Sullivan: CEOs Must Be Held Accountable For Security Too
The former CSO at Uber was found guilty in 2022 of obstruction of justice relating to a breach. Now he's calling for clearer regulatory frameworks for security....more
CHRO Is The Third Fastest-Growing C-Suite Role, Linkedin Finds
LinkedIn attributed C-suite trends to other changes to the workplace, including the increased focus on AI and the rise of remote and hybrid work....more
7 Signs You May Not Be A Transformational CIO
Accelerating business change has become an IT imperative. But not all CIOs have positioned themselves and their teams to drive transformation across the business....more
How CIOs And CTOs Are Bridging Cross-Functional Collaboration
IT necessarily works across departments, but now, CIOs and CTOs are driving greater collaboration across the business....more
CISOs' Strategies for Managing A Growing Attack Surface
In this Help Net Security interview, Rickard Carlsson, CEO at Detectify, discusses the evolution of attack surface management in the context of remote work and digital transformation....more
Storage
2025-26 Top 5 Enterprise SDS Block Storage Solutions
DataCore Software SANsymphony, Hitachi Vantara VSP One SDS Block, OSNexus QuantaStor, StorONE Data Storage Platform, Veritas InfoScale...more
Western Digital matches Seagate's 32 TB HAMR capacity with 11-platter ePMR HDDs
Western Digital has matched Seagate's 32 TB HAMR disc capacity by adding an 11th platter to its conventional disk drives....more
AI
AI Leadership Insights: The AI Hype
In this Techstrong AI Leadership Insights video interview series, Amanda Razani speaks with Lee Caswell, SVP of product and solutions at Nutanix, about what enterprises need to address before falling into the AI hype....more
11 Key Roles For AI Success
To maximize the business value of artificial intelligence, AI teams require a diverse range of skills and roles, from data scientists and domain experts, to strategic decision-makers....more
AI Leadership Insights: Genai For Business Value
Claire Vo, chief product and technology officer for LaunchDarkly, explains why organizations need to encourage more experimentation with GenAI to discover the use cases that will deliver the most value to their business....more
ESG
Unlocking Hidden Value With ESG Synergies To Supercharge M&A Deals
Environmental, Social, and Governance (ESG) has been a key factor for mergers and acquisitions (M&A) in recent years....more
Security
Even Orgs With SSO Are Vulnerable To Identity-Based Attacks
Use SSO, don't use SSO. Have MFA, don't have MFA. An analysis of a snapshot of organizations using Push Security's platform finds that 99% of accounts are susceptible to phishing attacks....more
Advanced Tips For Leveraging The NIST Cybersecurity Framework For Compliance
Depending on the industry, location, and business operations of your organization, you may have any number of cybersecurity regulations to comply with. Keeping track of each law that affects your organization and the various requirements associated with them can be overwhelming, but the consequences of noncompliance are often far worse....more
领英推荐
Mandiant Founder Calls Chinese Wiretap Hack Unsurprising
Telecommunications providers have always been an ideal espionage target for foreign adversaries, Kevin Mandia said in an interview....more
Is AI The Secret Weapon In The Fight To Secure Identity?
It is not surprising that the increasing complexity and number of identities held by organizations has been accompanied by a surge in identity-related security breaches. In fact, a 2023 report revealed that 90% of organizations reported a security incident related to digital identities over the previous year....more
Cybersecurity Risk Assessment Best Practices
A cybersecurity risk assessment offers organizations a structured approach to identifying vulnerabilities and threats, thereby providing actionable insights for making strategic risk management decisions....more
Secure By Design: The (Necessary) Future Of Hardware And Software
ICE 2024: Leading figures discussed why secure by design is not only necessary, but absolutely imperative in today's complex connected world...more
MFA
Understanding the Importance of MFA: A Comprehensive Guide
Protecting digital identities is essential for individuals and organizations in a world where cyberattacks are becoming more sophisticated and frequent. If anything has proven to boost security massively, it has to be the proper utilization of Multi-Factor Authentication (MFA)....more
Humor
Yes, Your Network Is Down - You Annoyed Us So Much We Crashed It
By the end of a working week, it can be tempting to just blow up whatever tech you've toiled for days to tame. Which is why each Friday The Register offers a (hopefully) cathartic instalment of On Call, the reader-contributed column in which you share your tetchiest tech support tales....more
Gestalt IT
Commvault Shift's Cyber Resilience For The AI Era
At Commvault SHIFT 2024, The Futurum Group's Daniel Newman and Patrick Moorhead sat with CEO Sanjay Mirchandani, who discussed Commvault's strategic pivot towards a cloud-first approach in cyber resilience....more
You Don't Need Post-Quantum Crypto Yet
With the advent of quantum computers, the likelihood that modern encryption is going to be invalidated is a possibility. New standards from NIST have arrived that have ushered in the post-quantum era....more
DevOps
6 Enterprise DevOps Mistakes To Avoid
DevOps success in complex enterprise environments can be elusive. Here's where IT leaders too often go wrong - and how to get back on track....more
Compliance
7 Top Compliance Audit Software For 2024
We get it - keeping up with new, ever-changing compliance requirements can be a nightmare, often resulting in a mild headache at best....more
Encryption
Achieving End-To-End Data Security With The Right 'Fully Homomorphic Encryption'
Everyone knows the cost and frequency of data breaches are rising. The question is, do you know if your data is truly secure? I have news for you. It's not....more
About Jerry Zabell, Independent Consultant
As a solution consultant I focus on delivering comprehensive solutions in the technology sector which has been a game-changer. With a deep understanding of the IT landscape, I lead the charge in applications, BPO, infrastructure services, technology and staffing consulting My mission is to enable companies to excel in their business processes, emphasizing innovation and efficiency.
My role as VP of North American Sales with the companies I represent is to harnesses my strengths in new business development and technology, driving strategy forward .
My Consulting engagements have established me as a trusted partner in the tech industry, and it's through strategic leadership and a commitment to excellence that I continue to grow and enrich my partnerships.
This weekly newsletter is one of my value-added services that I believe you will find to be valuable.