7 mistakes to avoid with low-code deployments

7 mistakes to avoid with low-code deployments

Enterprises are deploying more low-code tools and processes, as they look to increase the efficiency of software development and to support digital business efforts. A key to success with the technology is learning to avoid common mistakes. Research firm Gartner has forecast that the worldwide low-code development market will total $13.8 billion in 2021, an increase of 23% from 2020. The surge in remote development during the pandemic has continued to boost low-code adoption, it…

Read More

Avery Dennison CIO Nick Colisto on enabling business innovation

Avery Dennison CIO Nick Colisto on enabling business innovation

How can IT leaders create the conditions for digital business innovation—from fostering effective collaboration with business partners to establishing the right processes, frameworks, and culture? That’s the central question CIO contributing editor Julia King posed to Avery Dennison CIO Nick Colisto in their conversation at the CIO 100 Symposium and Awards, where Colisto was inducted into CIO’s Hall of Fame. Colisto describes his role at the Glendale, California-based Fortune 500 materials science and manufacturing company as…

Read More

We want to leapfrog our legacy culture

We want to leapfrog our legacy culture

Over her 25-year career, Deanna Steele has led IT and digital organizations at companies in various stages of startup, acceleration, and turnaround. Much of this experience has been in the retail sector, including VP roles in technology at Hot Topic, Express, and Ascena Retail, CIO at Ingram Content Group, and CI&DO at J.Jill. This past June she joined Advantage Solutions, whose data and technology solutions help retailers and brands drive demand and operate more efficiently….

Read More

Log4j vulnerability: Why your hot take on it is wrong

Log4j vulnerability: Why your hot take on it is wrong

Commentary: Those searching for a single cause for the Log4j vulnerability – whether it’s open source is not secure, or open source is not sustainable – are getting it wrong. It’s a complicated issue. Image: your/Shutterstock Excuse me if I don’t want to hear your “hot take” on the Log4j vulnerability. By all means, give me the details of what happened, as well as how it’s impacting companies like mine. Even better, give me insight…

Read More

Have you been SMISHED lately? Texting scams are on the rise

Have you been SMISHED lately? Texting scams are on the rise

RALEIGH, N.C. (WNCN) – Chances are, you’ve recently been SMISHED.  Smishing is the combination of SMS Texting and Phishing used by scammers to defraud you and it has exploded recently.  With all the robocalls out there, many folks are more inclined to not answer their phone or even respond to an email, but they will respond to a text message.  “I don’t check my emails as often as I check my texts,” said Raleigh resident Zoe Harnell. …

Read More

IFPO releases frontline security professional report

IFPO releases frontline security professional report

IFPO releases frontline security professional report | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

How to execute a successful ransomware tabletop exercise

How to execute a successful ransomware tabletop exercise

How to execute a successful ransomware tabletop exercise | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Find network breaches before they crush your business

Find network breaches before they crush your business

Find network breaches before they crush your business | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The Cybersecurity and Geopolitical Podcast: Episode 7

The Cybersecurity and Geopolitical Podcast: Episode 7

The Cybersecurity and Geopolitical Podcast: Episode 7 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Mitigating Industrial Production Risk with Tripwire | The State of Security

Mitigating Industrial Production Risk with Tripwire | The State of Security

It seems that the most popular topics in cybersecurity for the last year has been zero trust as well as the convergence of Information Technology (IT) and Operational Technology (OT). These developments are good, as they signal some positive motion towards better overall security. Some of the current risks are worth noting, with a forward glance to protecting specific industries such as oil and gas production plants. What qualifies Tripwire as a capable partner in this…

Read More
1 3,137 3,138 3,139 3,140 3,141 3,829