Remove Authentication Remove Books Remove Security
article thumbnail

14 essential book recommendations by and for IT leaders

CIO Business Intelligence

Why not pick up a book that will inspire you to be a more effective leader, help you spot challenges and pitfalls in your IT strategies and processes, or prepare for the future of information technology? And this group of CIOs, CTOs, and technical CEOs have strong favorites — books they turn to again and again for inspiration.

Devops 327
article thumbnail

Global AI regulations: Beyond the U.S. and Europe

CIO Business Intelligence

China follows the EU, with additional focus on national security In March 2024 the Peoples Republic of China (PRC) published a draft Artificial Intelligence Law, and a translated version became available in early May. Lastly, China’s AI regulations are focused on ensuring that AI systems do not pose any perceived threat to national security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

7 signs you may not be a transformational CIO

CIO Business Intelligence

Focused on digitization and innovation and closely aligned with lines of business, some 40% of IT leaders surveyed in CIO.com’s State of the CIO Study 2024 characterize themselves as transformational, while a quarter (23%) consider themselves functional: still optimizing, modernizing, and securing existing technology infrastructure.

Survey 328
article thumbnail

Overcoming the Equation: Security = Friction

CTOvision

Why does security have to be so onerous? Is this password secure enough: Mxyzptlk? Wait, that might be vulnerable to a comic book dictionary attack (bonus points for Superman fans), so let’s add some numbers and special characters: M4xyZ!ptL#K. Now that’s secure – good luck remembering it! By George Romas.

Security 249
article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

Hadoop Security: New book by Ben Spivey and Joey Echeverria Is Exactly What The Community Needs

CTOvision

We hold Ben Spivey and Joey Echeverria in the highest regard, and are very pleased to give this book our highest possible endorsement. Hadoop Security: Protecting Your Big Data Platform is packed with the protective strategies, tips and techniques you will want to build into your designs early in your data modernization efforts.

Security 150
article thumbnail

It's 2017 and changing other people's flight bookings is incredibly easy

Network World

The travel booking systems used by millions of people every day are woefully insecure and lack modern authentication methods. They presented their findings Tuesday at the 33rd Chaos Communications Congress in Hamburg. To read this article in full or to leave a comment, please click here

Hotels 170