www.idgconnect.com Open in urlscan Pro
151.101.66.165  Public Scan

Submitted URL: http://edt.idgconnect.com/c/1pe1BtZib0wxDKObHqrTPaMJyahGL
Effective URL: https://www.idgconnect.com/?utm_source=Adestra&utm_medium=email&utm_content=Header%20logo%20link&utm_campaign=IDG%20Connect...
Submission: On July 14 via api from SG — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" id="gsc-i-id1" dir="ltr" spellcheck="false" placeholder="Start Searching"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url(&quot;https://www.google.com/cse/static/images/1x/en/branding.png&quot;) left center no-repeat rgb(255, 255, 255); outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

IDG CONNECT

 * Opinion
 * Interviews
 * Analysis/Review
 * White Papers

Welcome! Here are the latest Insider stories.
 * WS02 CEO templates transformation for CIOs and Sri Lanka
 * Human vigilance vital in tackling enterprise vulnerability
 * Pegasystems CTO: No silver bullets, low-code software dos & don’ts
 * Stack Overflow CEO sets sights on a billion-user opportunity

More Insider Sign Out
Sign In Register
×

search
 

Sign Out
Sign In Register
NEW Insider PRO Learn More
Latest Insider
 * Escaping operational black holes with unified ‘full-fidelity’ observability
 * Tech start-ups are the solution to boosting economic growth in Africa
 * CIOs take a business approach to technical debt
 * Calling time on enterprise scale real-time services

NEW FROM IDG
Learn More
Business
 * Careers
 * Digital Transformation
 * IT Leadership
 * IT Skills

technology
 * Artificial Intelligence
 * Cloud Computing
 * Data Privacy
 * Security
 * Internet of Things

in-depth
 * Analysis
 * Features
 * Interviews
 * Opinion

region
 * Africa
 * Asia-Pacific
 * Europe
 * Middle East
 * North America
 * South America

Regular features
 * CIO Spotlight
 * C-suite career advice
 * CTO Sessions
 * Secret CSO

Resource Library
Welcome! Check out the latest Insider stories here.
Sign Out
Sign In Register

More from the Foundry Network
The voice of IT leadership
Analytics Careers CIO Role Digital Transformation Leadership Government Project
Management
Security at the speed of business
Application Security Cloud Security Identity Management Information Security
Network Security Risk Management Security Software
Making technology work for business
Blockchain Collaboration Mobile Office Software Security Systems Management
Windows
From the data center to the edge
Data Center Internet of Things Linux Networking SD-WAN Servers Storage Wi-Fi
Building the next-gen enterprise
Analytics Cloud Computing Databases Devops Machine Learning Open Source Software
Development
 * About Us |
 * Contact |
 * Privacy Policy |
 * Cookie Policy |
 * Member Preferences |
 * Tax Strategy |
 * California: Do Not Sell My Personal Info |

 * Follow Us
 * 
 * 
 * 


×

Close


DATA MESH VS DATA FABRIC: UNDERSTANDING THE POPULAR DATA ARCHITECTURES


HACKING THE CLOUD: WHY APIS ARE NOW A TOP THREAT


WS02 CEO TEMPLATES TRANSFORMATION FOR CIOS AND SRI LANKA

 * Don't Miss:
 * The biggest security threat of 2022
 * Cloud computing trends for 2022
 * Understanding greenfield, brownfield & bluefield technology

Latest Profiles
View All
 * CTO Sessions: Thomas Benjamin, NI
 * C-suite career advice: Randall Ward, Appfire
 * CIO Spotlight: Darren Person, The NPD Group
 * Secret CSO: Martin Jartelius, Outpost24


CTO SESSIONS: THOMAS BENJAMIN, NI

DO YOU HAVE ANY TROUBLE MATCHING PRODUCT/SERVICE STRATEGY WITH TECH STRATEGY? “I
BELIEVE IN THIS SIMPLE FORMULA: CUSTOMER VALUE =(BLEND) PEOPLE + PROCESS +
REUSABLE SERVICES (PLATFORM) + APPLICATIONS.”

--------------------------------------------------------------------------------

IDG Connect
|
 * 
 * 


DATA MESH VS DATA FABRIC: UNDERSTANDING THE POPULAR DATA ARCHITECTURES

THIS ARTICLE HIGHLIGHTS KEY DIFFERENCES AND SIMILARITIES BETWEEN DATA MESH AND
DATA FABRIC ARCHITECTURE. LEARN HOW THE COMBINATION OF BOTH APPROACHES CAN BUILD
A VERSATILE DATA PRODUCT PLATFORM FOR YOUR ENTERPRISE.

--------------------------------------------------------------------------------

Yash Mehta
|
 * 
 * 


C-SUITE CAREER ADVICE: RANDALL WARD, APPFIRE

HOW IMPORTANT ARE SPECIFIC CERTIFICATIONS? “WE LOOK TO HIRE THOSE WITH STRONG
CHARACTER AND HANDS-ON EXPERIENCE. THAT REAL EXPERIENCE WINS OVER EDUCATION,
BECAUSE WE CAN TEACH CERTIFICATIONS, BUT WE CAN’T TEACH CHARACTER AND...

--------------------------------------------------------------------------------

IDG Connect
|
 * 
 * 


HACKING THE CLOUD: WHY APIS ARE NOW A TOP THREAT

THE APPLICATION PROGRAMMING INTERFACE (API) IS NOW INTEGRAL TO MANY SERVICES BUT
IT’S ALSO A KEY TARGET FOR ATTACKERS. JASON KENT, HACKER IN RESIDENCE AT
CEQUENCE SECURITY, LOOKS AT WHY INSECURE APIS ARE NOW TOPPING THREAT CHARTS.

--------------------------------------------------------------------------------

Jason Kent
|
 * 
 * 


CIO SPOTLIGHT: DARREN PERSON, THE NPD GROUP

WHAT ADVICE WOULD YOU GIVE TO ASPIRING IT LEADERS? “FIRST AND FOREMOST, MAKE
SURE THAT TECHNOLOGY IS SOMETHING THAT EXCITES YOU…. BE WILLING TO CONTINUALLY
RE-EVALUATE YOUR WORK.”

--------------------------------------------------------------------------------

IDG Connect
|
 * 
 * 





WS02 CEO TEMPLATES TRANSFORMATION FOR CIOS AND SRI LANKA

WS02 DANCES TO DEMAND FOR DIGITAL TRANSFORMATION DESPITE LOCAL AND INTERNATIONAL
CHALLENGES.

--------------------------------------------------------------------------------

Mark Chillingworth
|
 * 
 * 


BUILDING CONTINUOUS DATA PROTECTION AGAINST RANSOMWARE ATTACKS

THE LARGEST RANSOMWARE ATTACK IN HISTORY - WANNACRY - TORE ACROSS THE GLOBE IN
2017, INFECTING A QUARTER MILLION MACHINES IN MORE THAN 150 COUNTRIES. SINCE
THEN A LOT HAS CHANGED IN THE WORLD OF RANSOMWARE, BUT HAVE WE LEARNT
ANYTHING?...

--------------------------------------------------------------------------------

Christopher Rogers
|
 * 
 * 


IT'S TIME TO RE-EDUCATE OUR APPROACH TO EDUCATION & TRAINING

ALL FORMS OF EDUCATION AND TRAINING ADD TO THE DIVERSITY OF SKILLS AND
CAPABILITIES THAT MAKE UP A TECHNOLOGY OR LEADERSHIP TEAM

--------------------------------------------------------------------------------

Mark Chillingworth
|
 * 
 * 


SECRET CSO: MARTIN JARTELIUS, OUTPOST24

LOOKING BACK WITH 20:20 HINDSIGHT, WHAT WOULD YOU HAVE DONE DIFFERENTLY? “IF I
GOT TO GO BACK IN TIME, I WOULD TELL YOUNG ME THAT WHAT I THOUGHT WERE TECHNICAL
PROBLEMS IN ALMOST 9 OUT OF 10 CASES WERE HUMAN PROBLEMS.”

--------------------------------------------------------------------------------

IDG Connect
|
 * 
 * 


CTO SESSIONS: VENKAT RANGAN, CLARI

WHAT PREDICTIONS DO YOU HAVE FOR THE ROLE OF THE CTO IN THE FUTURE? “CTOS WILL
NEED TO ADAPT TO THE NEEDS OF “DIGITAL-NATIVE” PEOPLE COMING INTO THE WORKFORCE
IN LARGE NUMBERS. THIS GENERATION OF WORKERS DEMAND DIGITAL AGILITY,...

--------------------------------------------------------------------------------

IDG Connect
|
 * 
 * 




HUMAN VIGILANCE VITAL IN TACKLING ENTERPRISE VULNERABILITY

SOPHOS SENIOR VICE PRESIDENT ASIA PACIFIC JAPAN GAVIN STRUTHERS DISCUSSES
REGIONAL RANSOMWARE TRENDS AND THE NEED FOR HEIGHTENED GLOBAL VIGILANCE.

--------------------------------------------------------------------------------

Shilpa Pai Mizar
|
 * 
 * 


C-SUITE CAREER ADVICE: JOHAN SALENSTEDT, CONFIGIT

WHAT TIPS WOULD YOU GIVE TO SOMEONE AIMING FOR A C-LEVEL POSITION? “EMBRACE
UNANTICIPATED DISRUPTIONS.”

--------------------------------------------------------------------------------

IDG Connect
|
 * 
 * 


CONTEXTUAL AI HOLDS THE KEY TO ITS BUSINESS VALUE

THROUGH PATTERN DETECTION, MACHINE LEARNING IS ALREADY TRANSFORMING BUSINESS
PROCESSES BY MAKING SENSE OF AND AUTOMATICALLY CAPTURING AND FILING INCOMING
CONTENT. YET IT IS ONLY WHEN INTELLIGENT PROCESS AUTOMATION IS APPLIED WITH...

--------------------------------------------------------------------------------

John Bates
|
 * 
 * 


CIO SPOTLIGHT: FELIX QUINTANA, MX TECHNOLOGIES

DO YOU HAVE KPIS TO QUANTIFY THE VALUE OF IT? “WE ARE A DATA-DRIVEN COMPANY, SO
WE ARE CONSTANTLY MONITORING AND ANALYSING OUR OBJECTIVES… THIS INVOLVES
MEASURING THINGS LIKE CUSTOMER SATISFACTION, NET PROMOTER SCORE, AND ROI ON
THE...

--------------------------------------------------------------------------------

IDG Connect
|
 * 
 * 


PEGASYSTEMS CTO: NO SILVER BULLETS, LOW-CODE SOFTWARE DOS & DON’TS

WE’VE KNOWN LOW-CODE SOFTWARE SHORTCUTS IN ONE FORM OR ANOTHER FOR MANY YEARS
BEFORE THE CURRENT REVOLUTION. PEGASYSTEMS CTO DON SCHUERMAN REFLECTS BACK ON
THIS TECHNOLOGY’S CURRENT GUISE AND HELPS TO PROVIDE A FEW LOW-CODE DOS AND...

--------------------------------------------------------------------------------

Adrian Bridgwater
|
 * 
 * 





IDG Connect Follow us
 * 
 * 
 * 

 * About Us
 * Contact
 * Privacy Policy
 * Cookie Policy
 * Member Preferences
 * Tax Strategy
 * California: Do Not Sell My Personal Info

Copyright © 2022 IDG Communications, Inc.

Explore the Foundry Network descend
 * CIO
 * Computerworld
 * CSO Online
 * InfoWorld
 * Network World