Remove Architecture Remove Authentication Remove Case Study
article thumbnail

Prioritizing AI investments: Balancing short-term gains with long-term vision

CIO Business Intelligence

I state that with real conviction and genuinely authentic excitement. If we revisit our durable goods industry example and consider prioritizing data quality through aggregation in a multi-tier architecture and cloud data platform first, we can achieve the prerequisite needed to build data quality and data trust first.

article thumbnail

Case in point: taking stock of the CrowdStrike outages

CIO Business Intelligence

It was an interesting case study of global cyber impact, says Charles Clancy, CTO at Mitre. Akamai also has other measures in place to reduce the risk of problems third-party software causes, including microsegmentation and identity-based authentication and access controls.

CTO Hire 281
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 skills and traits of successful digital leaders

CIO Business Intelligence

Digital leaders must also possess the ability to articulate the importance of architecture, the ability to provide compelling, easy-to-use shared platforms that business areas can leverage, [and] the ability to co-create innovation with business areas and bring business area staff into innovation initiatives from the very beginning.

Industry 305
article thumbnail

6 key mobile and IoT/OT attack trend findings

Network World

Overall, ThreatLabz tracked a rise in financially motivated mobile attacks – with 111% growth in spyware and 29% growth in banking malware – most of which can bypass multifactor authentication (MFA). Meanwhile, IoT attacks grew 45% year-over-year, and ThreatLabz identified pervasive security risks in OT environments.

Mobile 418
article thumbnail

6 Ways Sanmina maximized its Zscaler Zero Trust Exchange investment

Network World

The rationale for transitioning from a legacy architecture to Zscaler zero trust When I joined Sanmina in 1999 as a technical support person, security measures were sorely lacking. We realized we simply couldn’t implement a zero trust architecture using traditional VPN technology. All in all, it’s a win-win for our entire enterprise.

Security 418
article thumbnail

Hadoop Security: New book by Ben Spivey and Joey Echeverria Is Exactly What The Community Needs

CTOvision

In this book, Cloudera professionals Ben Spivey and Joey Echeverria provide a thorough treatment of Hadoop security architecture and implementation to help architects navigate the common challenges of this phase. Example case studies demonstrate how the book’s material is immediately applicable to your use cases.

Security 150
article thumbnail

How an Infrastructure Switch Sped Up AI Model Results and Business Value for BEN Group

CIO Business Intelligence

These new advertiser challenges caused the company to develop AI models to find creators and influencers who provide more authentic, natural and non-disruptive brand-to-customer interactions. To learn more about BEN Group’s AI success, read their case study. New Title: Director of AI Research.

Groups 130