This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
It was an interesting case study of global cyber impact, says Charles Clancy, CTO at Mitre. Several hospitals canceled surgeries as well, and banks, airports, public transit systems, 911 centers, and multiple government agencies including the Department of Homeland Security also suffered outages. The overall cost was estimated at $5.4
Many companies are still hiring developers, but not at the same rate as five years ago. In those years, many companies hired more programmers than they would need over the long term, says Sarah Doughty, vice president of talent operations at IT recruiting firm TalentLab.
Dun and Bradstreet has been using AI and ML for years, and that includes gen AI, says Michael Manos, the companys CTO. How do you build privacy, safety, security, and interoperability into the AI world? These are also areas where organizations are most willing to use contract talent. The second area is responsible AI.
The World Economic Forum shares some risks with AI agents , including improving transparency, establishing ethical guidelines, prioritizing data governance, improving security, and increasing education. Examples include scanning invoices, extracting basic contract information, or capturing information from PDF forms.
Both types of gen AI have their benefits, says Ken Ringdahl, the companys CTO. The main commercial model, from OpenAI, was quicker and easier to deploy and more accurate right out of the box, but the open source alternatives offered security, flexibility, lower costs, and, with additional training, even better accuracy.
HP Enterprise Security Solutions to help 33 U.S. Department of Homeland Security (DHS) has awarded the company a cybersecurity contract worth up to $32.4 Department of Homeland Security (DHS) has awarded the company a cybersecurity contract worth up to $32.4 By Bob Gourley. PALO ALTO, Calif. —
SAP CTO Juergen Mueller will step down from SAP’s executive board at the end of September. “I SAP had only just renewed Mueller’s contract, announcing in April that it was extending it by three years to the end of 2027. Hasso Plattner, chairman of SAP at the time of the announcement, said then. “We
IT consultants are often hired to provide companies guidance on what technologies they should use to achieve their aims, according to career website Indeed. These include strategy consultants, systems consultants, and security consultants, among others, says Paul Farnsworth, CTO attechnology careers site Dice.
Weve developed our own agentic AI for code management, says Charles Clancy, CTO at Mitre. Mitre had to create its own system, Clancy added, because most of the existing tools use vendor-managed cloud infrastructure for the AI inference part. We cant do that for security reasons, he says. Thats been positive and powerful.
What is a CTO? The chief technology officer (CTO) is the senior executive who focuses on the technological requirements, opportunities, and challenges within an organization. What does a CTO do? What does a CTO do? Years ago, the CTO most often led the infrastructure function.
Hundreds of companies around the world, including major American firms, have accidentally hired North Korean employees pretending to be something else. Grimes outlined KnowBe4's own recent experience , in which they identified and terminated an employee who was part of this covert operation. And it's a really big problem."
Software architecture: Designing applications and services that integrate seamlessly with other systems, ensuring they are scalable, maintainable and secure and leveraging the established and emerging patterns, libraries and languages. Data protection and privacy: Ensuring compliance with data regulations like GDPR and CCPA.
Too quickly people are running to AI as a solution instead of asking if its really what they want, or whether its automation or another tool thats needed instead, says Guerrier, currently serving as CTO at the charity Save the Children. Whats our risk tolerance, and what safeguards are necessary to ensure safe, secure, ethical use of AI?
If a model hallucinates just 5% of the time, thats enough for most users to consider it useless. They couldnt hire people from outside either, because they hadnt anticipated the need early enough to put it in their budgets. The CIO has to be an evangelist, educator, and realist all at the same time, says Fernandes.
The 36,000-square-foot innovation hub will be led by the company’s CTO, Saurabh Mittal, and Markandey Upadhyay, head of business intelligence unit for Piramal. Blockchain holds promise for financial service companies as it can lead to cheaper and faster transactions, enhanced security, and automated contracts.
The UK study also revealed that women of all backgrounds and ethnicities make up around 22% (approximately 424,000), compared to 48% of the entire UK workforce, with Black women in particular facing a wide range of obstacles, including discrimination and being accused by colleagues or superiors of being merely ‘diversity hires.’
The reasons include higher than expected costs, but also performance and latency issues; security, data privacy, and compliance concerns; and regional digital sovereignty regulations that affect where data can be located, transported, and processed. Adding vaults is needed to secure secrets.
Few would swap sunny San Francisco and the innovation of Silicon Valley for a train ticketing company serving disgruntled UK commuters, but try telling that to Trainline CTO, Milena Nikolic. There’s a reported international expansion on the horizon, government contracts to win and a new CDO, hired from Meta, now reporting into Nikolic. “I
But all of these things had time to mature and explore the design space to find optimal solutions. Dealing with the scale that the internet can deliver, has unfortunately left us with a series of other non-optimal cyber security approaches and solutions. In cybersecurity we’re have a hard time dealing with scale.
in Advanced Research Contracts For its Labs Division. This builds on the growth that the company posted in the quarter previous to this period , and in a time when the company launched its first small business offering. In the first quarter of 2014, the company’s advanced research division—Invincea Labs—secured $8.1M
To achieve this, SAP must continuously harmonize its product landscape and consistently implement uniform standards, for example, in data models and identity and security services, said DSAG CTO Sebastian Westphal. The CTO emphasizes that all newly developed functions by SAP are fully integrated into the overall system.
So, when Synack , a crowdsourced cybersecurity vendor, told me it secured a contract with the IRS, I was intrigued. First, a little bit about what Synack does: The company is following something of an ongoing trend in the security space in that it wrangles a bunch of “ethical hackers” to essentially try and break a client's IT systems.
While many Defense Contractors are finding it hard to make money from this market, in part due to the reducing DoD Budget, SPAWAR System Center Atlantic’s scale-back of Non-Navy Work, and a locked-in, post-pillar (multi-year multiple award contract vehicles) environment, there were many new faces at the event, indicating hopes for a brighter future.
As a CEO, it can be tough to differentiate between highly-skilled CTO candidates, but viewing potential hires through the lens of these three competencies will […].
SSC LANT has been hired by Marine Corps to make this system faster. CTO Cyber Security DoD and IC Government Organizations Research GCSS-MC Marine Space and Naval Warfare Systems Command SSC LANT' This includes modernization of GCSS-MC’s engineering, infrastructure, logistics and program management. To read more please log in.
Security was another constant challenge. In response, traders formed alliances, hired guards and even developed new paths to bypass high-risk areas just as modern enterprises must invest in cybersecurity strategies, encryption and redundancy to protect their valuable data from breaches and cyberattacks. The Cloud Act in the U.S.
And with his dual titles at the company—CIO and CTO—Rex Lee is in the driver’s seat to support digital transformation and implement shared knowledge across teams and management. There was a time when if you asked people in the cybersecurity team what their job was, they would’ve said to secure the company and make sure things are safe.
Contract type? CTO Cyber Security DoD and IC Events Government Research Startup News Tech Trends Charleston Commanding Officer Executive director Government Events Small business SSC LANT United States Department of Defense Wall Street' What quarter? It’s good for both Industry and Government. To read more please log in.
Cybersecurity will continue to be a top priority for Indian CIOs in the year ahead, according to a recent survey of technology executives by Gartner: 64% of Indian CIOs surveyed said they will increase their spending on security-related technologies in 2022, higher than the global average of 57%. Her colleague, CTO Rajaneesh R Kini, agrees.
Staples has hired its first chief information security officer (CISO), a key new member of the office supply giant's team that combines traditional IT and digital transformation. New Staples CISO Brett Wahlin.
F5 Photo) — Seattle-based networking and security giant F5 hired John Maddison as chief product marketing and technology alliances officer. Maddison was previously at California-based computer and network security company Fortinet for more than 12 years, leaving the role of chief marketing officer.
Stephen Kowski, Field CTO at SlashNext, highlighted the concerning trend of cybercrime evolving into a service-based industry, saying: "The takedown of HeartSender reveals how cybercrime has evolved into a sophisticated service industry, where even non-technical criminals can easily purchase and deploy advanced phishing tools to target businesses.
Its a very long and painful process, notes Don Henderson, CTO at BetaNXT, a wealth management company that provides tech services to clients. While legacy systems can be costly to maintain and be vulnerable to security risk, thats not always the case, he says. Were also running legacy Oracle version 12 from 2012, he adds.
The role of a Fractional Chief Technology Officer (CTO) is to provide technical expertise and leadership to a company on a part-time or temporary basis. This can be a useful option for startups or small businesses that may not have the resources to hire a full-timeCTO or may not need one on a permanent basis.
and high-ranking former officials from government organizations, including the Central Intelligence Agency (CIA), Defense Intelligence Agency (DIA), Department of Defense (DoD), Department of Homeland Security (DHS), National Geospatial-Intelligence Agency (NGA) and National Security Agency (NSA).
Other top concerns are data privacy and security challenges (31%) and lack of cloud security and cloud expertise (24%). After some time, people have understood the storage needs better based on usage and preventing data extract fees.” I strike this language from all my contracts.” 1 barrier to moving forward in the cloud.
The company wanted to leverage all the benefits the cloud could bring, get out of the business of managing hardware and software, and not have to deal with all the complexities around security, he says. She hired Ryan Haunfelder as director of data and analytics, and they formally embarked on an upgrade to Deltek Vantagepoint.
Government-Wide Acquisition Contracts (GWAC) are pre-competed vehicles that enable any government agency to buy cost-effective, innovative solutions to meet information technology requirements. These vehicles are easy and fast for government to use, offering quick access to qualified IT service providers via streamlined contracting.
This is a great opportunity to work directly with peers in the federal technology ecosystem to enhance the cyber security of your organization and to share lessons learned. Toaster Wars of 2025 – Addressing Embedded Device and Internet of Things Security Before it is Too Late! Seating is limited and tickets are going fast.
After executive stints at Nordstrom, Starbucks, and Nike, Courtney Kissler is now the CTO and senior vice president of technology at Seattle online retailer Zulily. Boston-based Valo Health has hired longtime Amazon leader Nish Lathia as its first chief product officer. Courtney Kissler. Zulily Photo). Nish Lathia. Valo Health Photo).
Recruiting and hiring high-end IT talent is among the most challenging tasks IT leaders face today. The IT skills shortage is critical, with CIOs losing talented employees faster than they can hire them,” said Mbula Schoen, senior director analyst at Gartner, in a recent Q&A. “IT CIOs, and their recruiting teams, are well aware.
The Department of Defense contract announcements for 1 June 2020 announced an award for Wickr that will enable this provider of secure communications to serve the US Air Force to […].
This applies to his IT group as well, specifically, in using AI to automate the review of customer contracts, Nardecchia says. This adds additional context to our security layer and allows us to grant access to just what our users need — and no more — when they need it,’’ Vaithylingam says.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content