Contributor

author_image

IDG Connect's expert contributors come from across the spectrum of IT and business job titles.

Why a CISO should be advising your board

Business Management

Why a CISO should be advising your board

How CISOs on the board can improve cybersecurity—and how AI should be introduced into the conversation.

IPv4 shortage: a timebomb for CTOs?

Internet

IPv4 shortage: a timebomb for CTOs?

With the global stock of IPv4 addresses almost entirely depleted, what are the potential dangers to organisations and why is the growth of IPv6 still so slow?

Preparing IoT deployment: 5 questions to ask

Internet of Things (IoT)

Preparing IoT deployment: 5 questions to ask

Five key questions every business must ask itself before embarking on an IoT plan

The CIO identity crisis

Human Resources

The CIO identity crisis

As the drive to achieve digital transformation causes job roles to change, where does that leave the CIO?

From security to strategy: the evolving role of the CISO

Human Resources

From security to strategy: the evolving role of the CISO

Why and how CISOs need to adapt in order to thrive in the increasingly digitalised enterprise.

The fight for power in the Fourth Industrial Revolution

Artificial Intelligence

The fight for power in the Fourth Industrial Revolution

How the Fourth Industrial Revolution has the power to reduce the productivity and economic gaps between developed and emerging countries.

Time-as-a-Service: How is time revolutionising business?

Business Management

Time-as-a-Service: How is time revolutionising business?

The business implications misaligned clocks… and how TTaaS can help.

Open for business: How open source is changing the technology industry

Open Source

Open for business: How open source is changing the technology industry

The adoption of open source software is fundamentally changing the technology industry as a whole. However, do the benefits outweigh the risk?

Looking at cybersecurity through financially-tinted glasses

Security

Looking at cybersecurity through financially-tinted glasses

The problem of technical security debt, and how businesses can work on minimising this debt.

Utilising NGFW to secure personal data in financial institutions

Data Privacy and Security

Utilising NGFW to secure personal data in financial institutions

The vulnerabilities associated with new open APIs and 'shadow IT' practices implemented by employees and why they need to be addressed to protect a company's brand...

Previous 1

Recommended for You

International Women's Day: We've come a long way, but there's still an awfully long way to go

Charlotte Trueman takes a diverse look at today’s tech landscape.

Trump's trade war and the FANG bubble: Good news for Latin America?

Lewis Page gets down to business across global tech

20 Red-Hot, Pre-IPO companies to watch in 2019 B2B tech - Part 1

Martin Veitch's inside track on today’s tech trends

Poll

Do you think your smartphone is making you a workaholic?