20 Jul Do’s and Don’ts of Selecting Technology Provider
July 19, 2022—We discuss different aspects of selecting technology to buy. As usual both Johna and Greg disagree and agree in equal measure...
July 19, 2022—We discuss different aspects of selecting technology to buy. As usual both Johna and Greg disagree and agree in equal measure...
June 24, 2022—Hyperautomation examples in the real world help businesses automate as many of their processes as possible and achieve their strategic goals. AI is instrumental in these efforts...
June 28, 2022—If a CISO becomes the company scapegoat after a security incident, a strong golden parachute clause can mean the difference between a soft landing and a hard crash...
July 15, 2022—Must-do initiatives include eliminating generic credentials, regularly auditing IT admin accounts, and deploying MFA for infrastructure access...
July 7, 2022—Customer-facing applications create enormous amounts of data. AI and ML can assist in mining that data for unexpected items...
June 30, 2022—How will Digital Customer Experience (DCX) evolve in the future? What should technologists expect to see as data and applications are moved ever-closer to users? ...
June 28, 2022—Cold takes on the Broadcom/VMware acquisition. It's certain that big changes are coming...
June 23, 2022—How do the areas of automation, risk mitigation, and digital customer experience (DCX) overlap? How are they different? ...
June 21, 2022—We debate different sides regarding the practicality of ‘high faluting’ strategy documents....
June 17, 2022—Three cybersecurity companies compete for the attention of a board of CISO judges. Think Shark Tank for cybersecurity...