Cybersecurity process towards Data Privacy

Data Privacy: Danger or Opportunity?

It’s become a common story. Data is a crucial target for attackers and has become an ever-increasing challenge for companies to protect. Think about the number of technological changes in the last ten years. Things like IoT (mobile phones, cars, appliances), e-commerce, number and access to applications, the cloud, AI, and APIs, to name a few. All have increased opportunities to use our private data without our permission or to take what is ours.

Read More »

Business Lessons From Barry

Thinking like battle-tested CIOs Technology management for non-tech leaders and executives The following blog comes from our very own veteran CIO leader, Ed Escobedo. A decade ago, I spent a

Read More »

The T’s in IT

Thinking like battle-tested CIOsTechnology management for non-tech executives The following blog is from TAG CXO friend and veteran CIO Paul Cottey. You are a new CEO. Congratulations! You have a

Read More »

Stop using bricks when a tent will do

Thinking like battle-tested CIOs Technology management for non-tech executives There are two types of IT programs: Robust, solid, long-lasting systems and processes – like bricks used to build a house.OrQuick,

Read More »

Why don’t we take IT more seriously?

A blog for thinking like battle-tested CIOs – Technology management for non-tech executives From data storage and processing to automation and innovation – the role of information technology in business is far reaching. Even with

Read More »