In the rapidly evolving landscape of AI development, its ethical dimensions have become a concern. AI ethicist Enrico Panai emphasizes that the conscientious development and implementation of AI do not hinder speed and innovation; rather, they serve as a catalyst for progress.
It shook the world when nearly 11 media companies, including The Guardian and The Washington Post, received a classified list of documents from a Russian cybersecurity contractor firm named Vulkan. Kukreja discusses safeguarding businesses by a stricter adherence to "assumed breach" principles.
Diversity, equity and inclusion go beyond mere representation of minority groups on paper. It requires empowerment, the ability to influence change, equal prospects and a sense of belonging. Without these elements, organizations would miss out on the extraordinary benefits of a varied workforce.
Sir Ziauddin Hospital in Pakistan has embarked on a transformative journey that involves transitioning to a hyper-converged, software-defined model. They're also shifting from a decentralized network topology to a centralized SD-WAN. Integration of AI technology is at the core of this transformation.
In the latest episode of Spotlight, editors at ISMG's CIO.inc review this month's most important technology conversations with IT leaders, and share their thoughts on some of the significant developments in the world of technology.
The German Federal IT security agency has set security levels for manufacturing companies. An organization aspiring for Level 5 (the highest level) must prove that all its suppliers and vendors in its supply chain are also certified for Level 5. This ensures consistency in security along the supply chain or value...
Process transformation serves as a vital element in creating competitive advantage. By continually refining and optimizing the internal operational workflows, organizations can enhance efficiency, reduce costs and deliver higher-quality products or services.
Both kinetic and non-kinetic warfare techniques have necessitated the use of advanced, modern technology to counter the enemies. Veda Defense is taking on the task of bolstering defense readiness by implementing an essential asymmetric doctrine by deploying artificial intelligence.
Global automotive leader Mahindra & Mahindra has taken lead in implementing generative AI's large learning models across both factory shop floors and customer-facing chatbots. Bhuwan Lodha, SVP and head of digital at M&M auto sector, emphasizes the need for enterprises to secure favorable ROI while embracing gen AI at...
Jose Soares, director IT, The Capital Hotels and Apartments in South Africa, discusses how the luxury hotel embraced change with digital transformation, cloud integration and unique customer experiences. He offers insights on platform building, cloud adoption and generative AI innovation.
The Philippines' Department of Environment and Natural Resources, DENR, is undergoing a rapid transformation. After taking over as technology director, Arlene Romasanta implemented a three-year strategic plan that can deliver robust ICT operations and an agile digital workforce.
SUNY Downstate Medical Center has embarked on a journey of cloud integration and clinical transformation, with IT at its core. The primary goal is twofold: to seamlessly migrate the majority of its workloads to the cloud while championing environmental sustainability and achieving carbon neutrality.
Dr. Sylvia Sathekge and Michael Nteere from Africa delve into the journey of CIOs, from mastering technology intricacies to strategic alignment. They also discuss CIO challenges, cybersecurity's role in digital transformation and the AI-driven IT future
TNB ILSAS Malaysia provides specialized technical and soft skills training for the dynamic energy sector that is fully aligned with local regulations. Adapting to the changes in the industry, it initiated two ambitious projects: seamless integrated digital learning and data-centric decision-making.
A cyber incident strategy helps businesses become compliant with new SEC disclosure rules. It can also reduce risks and cost of breach. But how does one go about creating a cyber incident strategy, and what are its essential elements?