Many businesses report CIOs and CTOs expanding their roles to cover areas such as designing new business models and minimizing siloes. How has the #CIO or #CTO role changed at your organization over the last several years?

Many businesses report CIOs and CTOs expanding their roles to cover areas such as designing new business models and minimizing siloes. How has the #CIO or #CTO role changed at your organization over the last several years?

Continue ReadingMany businesses report CIOs and CTOs expanding their roles to cover areas such as designing new business models and minimizing siloes. How has the #CIO or #CTO role changed at your organization over the last several years?

What #EnterpriseIT applications of the #Metaverse can you think of? Here are two: workforce training and security breach simulation exercises. Other ideas?

What #EnterpriseIT applications of the #Metaverse can you think of? Here are two: workforce training and security breach simulation exercises. Other ideas?

Continue ReadingWhat #EnterpriseIT applications of the #Metaverse can you think of? Here are two: workforce training and security breach simulation exercises. Other ideas?

Australia’s Telecom Giant Optus Avoids Ransom Demand as Attacker Reverses Course

An alleged cybercriminal leaked records on 10,000 customers of Australia's telecom giant, Optus, then backed off its $1 million ransom demand. What is the takeaway when you're tasked with protecting customers from identity fraud? Comment to start a discussion and read to hear what the authorities have to say.

Continue ReadingAustralia’s Telecom Giant Optus Avoids Ransom Demand as Attacker Reverses Course

What #EnterpriseIT applications of the #Metaverse can you think of? Here are two: workforce training and security breach simulation exercises. Other ideas?

What #EnterpriseIT applications of the #Metaverse can you think of? Here are two: workforce training and security breach simulation exercises. Other ideas?

Continue ReadingWhat #EnterpriseIT applications of the #Metaverse can you think of? Here are two: workforce training and security breach simulation exercises. Other ideas?