Outmaneuvering the Adversary: How to Detect Cyberthreats You Didn’t Know Were There

If you’re concerned about the increased threat of cyberattacks by state-sponsored hackers and hacktivist groups in the current geopolitical atmosphere, you’re certainly justified. Criminal groups are emerging from the shadows and pledging their allegiance to Russia. They’re conducting reconnaissance attacks and coalescing into the roles they’ll play in the global cyberwar many see on the…

Amplify Customer Experience to Propel Next-Level Growth

Customers today are buying based on their experience with a company and whether a product or service aligns with their personal values, including access, inclusivity, sustainability and trust. Customer experience (CX) should play the starring role in decision-making and should be woven into technology initiatives. To optimize technology for CX, CIOs must connect technology to…

Ready…Set…Start Your Containers

By Siva Sreeraman VP, CTO and Modernization Tribe Leader at Mphasis Many developers faced difficulties porting applications developed for a particular computing environment decades ago. Incompatibility and unreliability caused by configuration differences such as versions of compilers, loaders, runtime libraries, middleware, and operating systems in new environments contributed to increased project effort, cost, and timelines.…

Strong Business Continuity Management Brings Resilience

Business disruptions happen every day and can cause companies to lose millions of dollars and suffer reputational damage. But these losses can be minimized. When astute executives, including CIOs, cheat disruption by focusing on business continuity management (BCM) programs that build resilience, the enterprise transformation can prosper. CIOs should apply a business lens that informs how the business could be impacted (operationally, financially, legally, etc.) in the…

What is Customer Identity and Access Management?

Customer identity and access management (CIAM) is a type of identity technology that allows organizations to manage customer identities, providing security and an enhanced experience. The primary purpose of CIAM is to help organizations deliver a great experience to customers and to protect their user data. Digital transformation is changing everything about the way companies operate,…

Redefining the CIO role post-pandemic

As the CIO of Oxford Said Business School, Mark Bramwell’s role was complex enough when the global pandemic moved thousands of students and staff to distance learning. Almost overnight there was a heightened need to drive innovation and reinvent business-as-usual. “It has felt that as a school, team, and personally, we have never worked harder…

CIOs look to foster innovative IT cultures, post-COVID

Asked to define innovation today, most IT leaders will agree: It’s all about digitization and finding new and better ways of thinking about processes and services to solve a problem. “Around here, we think of it as a stool with three legs: quality/safety, patient satisfaction, and cost efficiencies,’’ says Sam Amirfar, CIO and chief medical…