fbpx
Home CxO Perspective

CxO Perspective

Mostafa Sayyadi, CAHRI, AFAIM, CPMgr

Employing IT professionals to Improve Employee Engagement and Enhance Knowledge Flow within Companies

Today‘s globalized nature of competitiveness is placing more pressure on organizations to employ effective leaders, males or females, who are capable to improve employee...
Mostafa Sayyadi, CAHRI, AFAIM, CPMgr

Investing in Technology to Manage Organizational Knowledge

One scholar that is well known in the Academy of Management, one of the largest leadership and management organizations in the world by the...
Rich Wagner, CEO, Prevedere

The New 3R’s of Business Intelligence

In the past, analysts considered the 3R’s – the right data, at the right time, for the right people – as core principles driving...
Bob Karschnia, VP/GM of Wireless, Emerson Automation Solutions

Meeting Wireless Network Management Challenges

The proliferation of wireless networks in industrial plants and facilities has provided substantial benefits to end users in the form of improved operations, but...
Shawn Campbell, Director of Product Management, SafeNet Assured Technologies

Bringing Biometrics to the Tactical Edge of Security – and Beyond

As security concerns mount domestically and abroad, databases are becoming a potent tactical tool, and a growing number of companies are arming the frontline...
Yaniv Avidan, Co-Founder & CEO, MinerEye

New article reveals the necessity of information governance and data classification for complying with...

Approaching the new General Data Protection Regulation (GDPR), effective from May 2018, companies based in Europe or having personal data of people residing in...
Brian Wilson, Chief Customer Officer, Zenoss

CIOs New Strategic Plans Emphasize the Business Value of IT

As an IT infrastructure software vendor selling a strategic solution, we routinely have access to strategic plans FROM CIOs of Global 2000 and Fortune...
By Guy Buesnel, PNT Security Technologist, Spirent Communications, Paignton, Devon, UK

The Dark art of GPS spoofing surfaces in the Black Sea – and why...

Whilst Global Navigation Satellite Systems (GNSS) spoofing has often been regarded as an exotic, unrealistic GNSS attack scenario, recent events have shown that spoofing...
By Mike Bursell, Chief Security Architect, Red Hat

Hygiene is universal: Five “hygienic” security practices that matter for cloud-native applications

By now, you’ve likely heard about Linux containers - if not from your IT or developer teams, then from the many analysts, journalists and...
George Viegas, Information Security and Privacy at Chapman University

Using ‘agile’ for successful technical information security programs

The agile process has been around for some time. It is well embedded in software companies and the software development lifecycle, but not so...

Digital Magazines