Magazine Button


How are data centre providers offering a solution to the widening skills gap?

Kao Data, the specialist developer and operator of high-performance data centres for enterprise, cloud, HPC and AI, has launched the Kao Academy – an industry-first science, technology, engineering and maths (STEM) resource, designed to engage primary and early secondary school-aged children with the purpose and role of a data centre. Created in collaboration with Cambridge […]

Introducing Cloudforce One: Cloudflare’s new threat operations and research team

Blake Darché, Head of Threat Intelligence at Cloudflare, introduces Cloudforce One, a new threat operations and research team from Cloudflare. Meet Cloudflare’s new threat operations and research team: Cloudforce One. While this team will publish research, that’s not its reason for being. Its primary objective: track and disrupt threat actors. The security teams we speak with […]

Critical operations threatened by application incompatibility for over three-quarters of businesses

Over three-quarters of organisations (77%) have at least one application that is not compatible with the latest version of Windows, with up to a quarter of all applications (25%) incompatible for 89% of organisations. This is according to new research of UK and US CIOs commissioned by Cloudhouse – an application compatibility packaging and configuration management solutions […]

1,100 IT pros spotlight the security hazards of hybrid work

Anthony James, VP of Product Marketing at Infoblox, provides an insight into Infoblox’s survey into the global state of security, including the impact of remote workers. Today’s cybersecurity challenges are not that much different than from past years, with one slight twist – the attack surface has dramatically shifted. The pandemic forced us to rethink […]

The three IT questions CIOs should be able to answer . . . but probably can’t

Kevin Brown, SVP, EcoStruxure Solutions, Secure Power Division, Schneider Electric, discusses how new disruptive technologies, hybrid and distributed IT architectures and the need for actionable data insights surrounding cybersecurity, energy efficiency and sustainability, is changing the role of the CIO – forcing them to adapt and utilise both new skillsets and tech to future-proof their […]

Counting the cost of the biggest BEC attacks

Robust email protection is a necessity for protecting against one of the industry’s most sophisticated attack types; Business Email Compromise (BEC). Andrew Rose, Resident CISO, Proofpoint, offers some top tips to avoid falling victim to these types of attacks and highlights the importance of adding an extra layer of protection to your business to ensure […]

Going low-code to build a new interactive virtual experience

Shiv Dutt, VP – Digital Experience and Innovation at Pampered Chef, provides us with a first-person account explaining how the cookware company, owned by Berkshire Hathaway, has been utilizing’s low-code platform Interplay, to accelerate development. This means its development team can complete applications and put them into production in days rather than years. Speed […]

Building trust in a Zero Trust environment

Gil Vega, Chief Information Security Officer at Veeam, asks how companies can effectively navigate Zero Trust without creating friction among employers and employees. A recent study by MITRE and DTEX revealed that despite years of industry efforts against insider threats, there isn’t enough data – or systems advanced enough – to spot all malicious behavior. […]

Fueling growth in a technology renaissance

Chicago-based Amir Arooni, Executive Vice President and CIO, Discover Financial Services, tells us how the digital bank is embarking on its own technology renaissance through its Discover-run Runway program. He says: “Through Runway, we are providing consumers what they want, faster and growing our capacity to offer even more.” How has technology pervaded every aspect […]

Expert advice for layering up your defences this World Password Day

The annual World Password Day raises awareness of the importance of having robust and resilient password hygiene practices in place. We hear from various industry experts who discuss best practices for password security. Cian Heasley, Security Consultant at Adarma: “It’s common for people to resort to simple, easy to remember passwords reused across most, if […]

Eight guiding principles for Zero Trust in banking and financial services today

Security leaders will be familiar with the term ‘Zero Trust’ – an approach crucial as vulnerabilities and attacks are becoming more damaging to organisations. Hila Meller, BT Vice President Security, Americas, EMEA and APAC, discusses some of the guiding principles for Zero Trust in banking and financial services. When it comes to adopting a Zero […]

Nexsan: Using storage solutions to scale  

Massive data growth has changed the way SMEs operate, with it becoming increasingly critical for small businesses to store, protect and manage their data at scale. We explore how two US-based organisations used solutions from Nexsan to ensure their data was secure and scalable.    Wyoming Surgical Associates, PC deploys Nexsan E-Series P storage platform to […]

Browse our latest issue

Intelligent CIO North America

View Magazine Archive