AI isn’t just another tool in the technology toolkit; it’s a revolution waiting to be led. As tech leaders, this is your moment—not merely to optimize but to revolutionize. This isn’t about minor efficiency gains; it’s about redefining what’s possible. AI has the potential to transform your specialists into versatile, strategic thinkers and to amplify […]
Preparing for a Billion Developers
With the vision of a billion developers, AI is evolving from a specialized tool to a platform that democratizes coding. As AI’s potential grows, so does the role of the CTO. No longer solely managing infrastructure, today’s CTO must architect a secure, adaptive, and data-driven environment ready to leverage AI responsibly and at scale. Here’s […]
Driving AI Transformation – Gigaom
As we head into 2025, CEOs are focused on a clear set of priorities—AI-enabled growth, dynamic capacity, risk management, and human-machine integration. Yet, many CIOs are still too focused on managing IT infrastructure and not stepping into their rightful role as strategic advisors. To meet the needs of today’s CEO, the CIO must transform from […]
The Modern CIO – Gigaom
At the recent Gartner Symposium, there was no shortage of data and insights on the evolving role of the CIO. While the information presented was valuable, I couldn’t help but feel that something was missing—the real conversation about how CIOs can step into their role as true agents of transformation. We’ve moved beyond the days […]
Don’t Ignore What You Can Easily Control: Your IP Infrastructure
In today’s rapidly evolving digital landscape, managing IP infrastructure has become increasingly complex and critical for organizations of all sizes. As networks grow and diversify, encompassing on-premises, cloud, and hybrid environments, the challenges of efficiently managing DNS, DHCP, and IP address management services—collectively known as DDI—have multiplied. This blog post explores the key challenges in […]
The Impact of GenAI on Data Loss Prevention
Data is essential for any organization. This isn’t a new concept, and it’s not one that should be a surprise, but it is a statement that bears repeating. Why? Back in 2016, the European Union introduced the General Data Protection Regulation (GDPR). This was, for many, the first time that data regulation became an issue, […]
Identity, Endpoint, and Network Security Walk into a Bar
With a macrotrend/backdrop of platformization and convergence, the industry is exploring places where identity security, endpoint security, and network security naturally meet. This intersection is the browser. The Browser: The Intersection of Identity, Endpoint, and Network Security Why? If we expect identity security, it must be tied to users, their permissions, authorization, and authentication. If […]
Sidecarless Service Meshes: Are They Ready for Prime Time?
Service meshes have become a cornerstone in the architecture of modern microservices, providing a dedicated infrastructure layer to manage service-to-service communication. Traditionally, service meshes have relied on sidecar proxies to handle tasks such as load balancing, traffic routing, and security enforcement. However, the emergence of sidecarless service meshes has introduced a new paradigm, promising to […]
Digital Experience Platforms: Transforming Marketing in the 21st Century
In today’s fast-paced digital landscape, creating engaging and personalized customer experiences is paramount to business success. Enter digital experience platforms (DXPs)—powerful systems designed to revolutionize how companies interact with their audiences across various digital channels. Let’s dive into the fascinating world of DXPs and explore how they are reshaping marketing strategies. The Genesis of Digital […]
“Gone Phishing”—Every Cyberattacker’s Favorite Phrase
Phishing—how old hat is that as a topic? Isn’t it solved for most of us by now? Can’t we speak about AI instead? That may be your response when you hear a security analyst talk about phishing and phishing prevention, but those assumptions couldn’t be further from the truth. Phishing continues to be one of […]