This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
For example, blockchain may be able to give organizations a level of trust and security when they string multiple AI agents together to create a multi-step business or IT process, he says. A recent criticism of blockchain comes from Jim Fowler, CTO at insurance carrier Nationwide.
Dun and Bradstreet has been using AI and ML for years, and that includes gen AI, says Michael Manos, the companys CTO. How do you build privacy, safety, security, and interoperability into the AI world? These are also areas where organizations are most willing to use contract talent. The second area is responsible AI.
The World Economic Forum shares some risks with AI agents , including improving transparency, establishing ethical guidelines, prioritizing data governance, improving security, and increasing education. Examples include scanning invoices, extracting basic contract information, or capturing information from PDF forms.
Both types of gen AI have their benefits, says Ken Ringdahl, the companys CTO. The main commercial model, from OpenAI, was quicker and easier to deploy and more accurate right out of the box, but the open source alternatives offered security, flexibility, lower costs, and, with additional training, even better accuracy.
HP Enterprise Security Solutions to help 33 U.S. Department of Homeland Security (DHS) has awarded the company a cybersecurity contract worth up to $32.4 Department of Homeland Security (DHS) has awarded the company a cybersecurity contract worth up to $32.4 By Bob Gourley. PALO ALTO, Calif. —
SAP CTO Juergen Mueller will step down from SAP’s executive board at the end of September. “I SAP had only just renewed Mueller’s contract, announcing in April that it was extending it by three years to the end of 2027. Hasso Plattner, chairman of SAP at the time of the announcement, said then. “We
IT consultants are often hired to provide companies guidance on what technologies they should use to achieve their aims, according to career website Indeed. These include strategy consultants, systems consultants, and security consultants, among others, says Paul Farnsworth, CTO attechnology careers site Dice.
It was an interesting case study of global cyber impact, says Charles Clancy, CTO at Mitre. Several hospitals canceled surgeries as well, and banks, airports, public transit systems, 911 centers, and multiple government agencies including the Department of Homeland Security also suffered outages. The overall cost was estimated at $5.4
Weve developed our own agentic AI for code management, says Charles Clancy, CTO at Mitre. Mitre had to create its own system, Clancy added, because most of the existing tools use vendor-managed cloud infrastructure for the AI inference part. We cant do that for security reasons, he says. Thats been positive and powerful.
What is a CTO? The chief technology officer (CTO) is the senior executive who focuses on the technological requirements, opportunities, and challenges within an organization. What does a CTO do? What does a CTO do? Years ago, the CTO most often led the infrastructure function.
Many companies are still hiring developers, but not at the same rate as five years ago. In those years, many companies hired more programmers than they would need over the long term, says Sarah Doughty, vice president of talent operations at IT recruiting firm TalentLab.
Hundreds of companies around the world, including major American firms, have accidentally hired North Korean employees pretending to be something else. Grimes outlined KnowBe4's own recent experience , in which they identified and terminated an employee who was part of this covert operation. And it's a really big problem."
If a model hallucinates just 5% of the time, thats enough for most users to consider it useless. They couldnt hire people from outside either, because they hadnt anticipated the need early enough to put it in their budgets. The CIO has to be an evangelist, educator, and realist all at the same time, says Fernandes.
The UK study also revealed that women of all backgrounds and ethnicities make up around 22% (approximately 424,000), compared to 48% of the entire UK workforce, with Black women in particular facing a wide range of obstacles, including discrimination and being accused by colleagues or superiors of being merely ‘diversity hires.’
The reasons include higher than expected costs, but also performance and latency issues; security, data privacy, and compliance concerns; and regional digital sovereignty regulations that affect where data can be located, transported, and processed. Adding vaults is needed to secure secrets.
Few would swap sunny San Francisco and the innovation of Silicon Valley for a train ticketing company serving disgruntled UK commuters, but try telling that to Trainline CTO, Milena Nikolic. There’s a reported international expansion on the horizon, government contracts to win and a new CDO, hired from Meta, now reporting into Nikolic. “I
But all of these things had time to mature and explore the design space to find optimal solutions. Dealing with the scale that the internet can deliver, has unfortunately left us with a series of other non-optimal cyber security approaches and solutions. In cybersecurity we’re have a hard time dealing with scale.
in Advanced Research Contracts For its Labs Division. This builds on the growth that the company posted in the quarter previous to this period , and in a time when the company launched its first small business offering. In the first quarter of 2014, the company’s advanced research division—Invincea Labs—secured $8.1M
So, when Synack , a crowdsourced cybersecurity vendor, told me it secured a contract with the IRS, I was intrigued. First, a little bit about what Synack does: The company is following something of an ongoing trend in the security space in that it wrangles a bunch of “ethical hackers” to essentially try and break a client's IT systems.
While many Defense Contractors are finding it hard to make money from this market, in part due to the reducing DoD Budget, SPAWAR System Center Atlantic’s scale-back of Non-Navy Work, and a locked-in, post-pillar (multi-year multiple award contract vehicles) environment, there were many new faces at the event, indicating hopes for a brighter future.
As a CEO, it can be tough to differentiate between highly-skilled CTO candidates, but viewing potential hires through the lens of these three competencies will […].
SSC LANT has been hired by Marine Corps to make this system faster. CTO Cyber Security DoD and IC Government Organizations Research GCSS-MC Marine Space and Naval Warfare Systems Command SSC LANT' This includes modernization of GCSS-MC’s engineering, infrastructure, logistics and program management. To read more please log in.
And with his dual titles at the company—CIO and CTO—Rex Lee is in the driver’s seat to support digital transformation and implement shared knowledge across teams and management. There was a time when if you asked people in the cybersecurity team what their job was, they would’ve said to secure the company and make sure things are safe.
Contract type? CTO Cyber Security DoD and IC Events Government Research Startup News Tech Trends Charleston Commanding Officer Executive director Government Events Small business SSC LANT United States Department of Defense Wall Street' What quarter? It’s good for both Industry and Government. To read more please log in.
Cybersecurity will continue to be a top priority for Indian CIOs in the year ahead, according to a recent survey of technology executives by Gartner: 64% of Indian CIOs surveyed said they will increase their spending on security-related technologies in 2022, higher than the global average of 57%. Her colleague, CTO Rajaneesh R Kini, agrees.
Staples has hired its first chief information security officer (CISO), a key new member of the office supply giant's team that combines traditional IT and digital transformation. New Staples CISO Brett Wahlin.
F5 Photo) — Seattle-based networking and security giant F5 hired John Maddison as chief product marketing and technology alliances officer. Maddison was previously at California-based computer and network security company Fortinet for more than 12 years, leaving the role of chief marketing officer.
The role of a Fractional Chief Technology Officer (CTO) is to provide technical expertise and leadership to a company on a part-time or temporary basis. This can be a useful option for startups or small businesses that may not have the resources to hire a full-timeCTO or may not need one on a permanent basis.
and high-ranking former officials from government organizations, including the Central Intelligence Agency (CIA), Defense Intelligence Agency (DIA), Department of Defense (DoD), Department of Homeland Security (DHS), National Geospatial-Intelligence Agency (NGA) and National Security Agency (NSA).
Stephen Kowski, Field CTO at SlashNext, highlighted the concerning trend of cybercrime evolving into a service-based industry, saying: "The takedown of HeartSender reveals how cybercrime has evolved into a sophisticated service industry, where even non-technical criminals can easily purchase and deploy advanced phishing tools to target businesses.
Other top concerns are data privacy and security challenges (31%) and lack of cloud security and cloud expertise (24%). After some time, people have understood the storage needs better based on usage and preventing data extract fees.” I strike this language from all my contracts.” 1 barrier to moving forward in the cloud.
The company wanted to leverage all the benefits the cloud could bring, get out of the business of managing hardware and software, and not have to deal with all the complexities around security, he says. She hired Ryan Haunfelder as director of data and analytics, and they formally embarked on an upgrade to Deltek Vantagepoint.
Government-Wide Acquisition Contracts (GWAC) are pre-competed vehicles that enable any government agency to buy cost-effective, innovative solutions to meet information technology requirements. These vehicles are easy and fast for government to use, offering quick access to qualified IT service providers via streamlined contracting.
This is a great opportunity to work directly with peers in the federal technology ecosystem to enhance the cyber security of your organization and to share lessons learned. Toaster Wars of 2025 – Addressing Embedded Device and Internet of Things Security Before it is Too Late! Seating is limited and tickets are going fast.
After executive stints at Nordstrom, Starbucks, and Nike, Courtney Kissler is now the CTO and senior vice president of technology at Seattle online retailer Zulily. Boston-based Valo Health has hired longtime Amazon leader Nish Lathia as its first chief product officer. Courtney Kissler. Zulily Photo). Nish Lathia. Valo Health Photo).
However, barriers such as adoption speed and security concerns hinder rapid AI integration, according to a new survey. There is a sense of urgency to leverage AI effectively, but adoption speed and security challenges are hindering efforts. CIOs rank AI as a top priority alongside cybersecurity for IT departments.
Qumulo does not have an overall CTO. MTI) hired Craig Parietti as CFO and Tony Woods as VP of human resources. Business texting startup ZipWhip hired Ravi Angadi as chief product officer and promoted Nimrod Vered to chief engineering officer. The company hired Jared Nieuwenhuis as marketing director for North America.
Recruiting and hiring high-end IT talent is among the most challenging tasks IT leaders face today. The IT skills shortage is critical, with CIOs losing talented employees faster than they can hire them,” said Mbula Schoen, senior director analyst at Gartner, in a recent Q&A. “IT CIOs, and their recruiting teams, are well aware.
The company is paying Redfin $100 million to secure the exclusive agreement. More than three times as many households moved into a new rental than purchased a home in 2024,” the company said in announcing Sherman’s promotion. . “The rental market is a significant and growing opportunity for Zillow.
This applies to his IT group as well, specifically, in using AI to automate the review of customer contracts, Nardecchia says. This adds additional context to our security layer and allows us to grant access to just what our users need — and no more — when they need it,’’ Vaithylingam says.
The Department of Defense contract announcements for 1 June 2020 announced an award for Wickr that will enable this provider of secure communications to serve the US Air Force to […].
Thumu joins the company following the sudden departure in May of two of former CTO Rathi Murthy and Sreenivas Rachamadugu , former senior vice president, core services product and engineering. They were ousted due to a “violation of company policy,” according to the company, which did not provide additional details.
While it’s critical to control costs continuously, it becomes even more imperative during times of economic pressure,” says Jon Pratt, CIO at security managed services provider 11:11 Systems. Following are some actions IT leaders can take now to secure those funds for the future.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content