IT Leadership

Tech industry experts delve into pivotal tech trends for 2024, examining cybersecurity evolution, the impact of AI on privacy, breakthroughs in quantum computing, and shifts in the tech startup world.

Employees in nearly three out of four organizations worldwide are using generative AI tools frequently or occasionally, but despite the security threats posed by unchecked use of the apps, employers don't seem to know what to do about it.

ANALYSIS

The Magic Presented at HP Imagine 2023

What HP presented should leapfrog the company ahead of its competitors over the next several years as we deal with the fallout of the hybrid workplace and the difficulties in managing and equipping a dispersed workforce.

I believe we are in the end days of the traditional PC and that it is due to evolve or be replaced by a smartphone derivative. Gelsinger is clearly on the “evolve” path as he discussed a very aggressive cadence for the next several generations of AI-enhanced PCs and servers.

Avoid AI hype and ruthlessly cut failed projects, advises a new Forrester report outlining best practices for enterprises adopting artificial intelligence.

Efforts to fortify cloud security and identity management are at the forefront of new U.S. measures to mitigate cyberthreats.

A Salesforce survey of more than 1,000 technologists found that 75% of UX designers, developers, and IT managers want to reduce software's environmental harm, but half are unsure how to implement such changes.

What makes good documentation? Fundamentally it's about organization and ease of visual tracking. Here are some manifestations of that, in no particular order.

There is a notable increase in tension between application security workers and application developers over consensus on cloud-native needs, in addition to a growing concern about retaining developer talent in this context.

As supply chain attacks continue to pose significant risks, SBOMs have become a vital tool for secure DevOps and enhanced threat intelligence. Let's explore the six main types of SBOMs, their use cases, and how to select the most suitable one for your organization's needs.

CISOs' concerns grow as 68% anticipate a material cyberattack within a year, showing a shift in attitude toward future threats. Increased attack vectors and a wider attack surface contribute to this sentiment, while employee turnover raises data security risks.

Tech execs looking to get the most value for their organizations from generative AI need to understand the basics of the technology, according to a new report by Forrester Research.

Companies that established open-source program offices over the last few years now need more C-suite oversight to drive education, awareness, and use of open-source software. That sets the stage for an expanded role of open-source program officers.

To help companies prepare for the changing nation-state attack landscape, Forrester has a new model to defend themselves and prepare for an expected onslaught of regulations to follow.

Technewsworld Channels