Articles

  • 2 days ago | informationweek.com | Mary Shacklett

    More enterprises have moved to pay-for-performance salary and promotion models that measure progress toward goals -- but how do you measure goals for a maintenance programmer who barrels through a request backlog but delivers marginal value for the business, or for a business analyst whose success is predicated on forging intangibles like trust and cooperation with users so things can get done?

  • 1 week ago | networkcomputing.com | Mary Shacklett

    Enterprises are realizing they might need more ammunition in their never-ending battle against ransomware. Enter network forensics, a branch of digital forensics. Network forensics practitioners are the detectives of network security, focused on monitoring and evaluating all the digital traffic on a network. Their goal is to uncover information about intrusions, such as malware, and to gather legal evidence in the event of a court case.

  • 1 week ago | informationweek.com | Mary Shacklett

    The average age of a CIO is 55, so most have already had some thoughts about retirement and what they want their legacy to be.  What do CIOs value for their lasting career contributions? I’ve had this conversation with many CIOs, and I’ve considered the matter myself. Predictably, the answers are not of a one-size-fits-all variety. Here is what I’ve learned from other CIOs about what they wanted to feel they achieved: 1.

  • 2 weeks ago | informationweek.com | Mary Shacklett

    An AI integration modifies a business process and how employees work, but it also requires an integration with IT infrastructure and systems. This is where some of IT’s most technically savvy staff will be working, and they will want to discuss technology integration approaches and ideas.

  • 2 weeks ago | informationweek.com | Mary Shacklett

    In February 2024, CNN reported, “A finance worker at a multinational firm was tricked into paying out $25 million to fraudsters using deepfake technology to pose as the company’s chief financial officer in a video conference call.” In Europe, a second firm experienced a multimillion-dollar fraud when a deepfake emulated a board member in a video allegedly approving a fraudulent transfer of funds. “Banks and financial institutions are particularly at risk,” said The Hack Academy.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
350
Tweets
179
DMs Open
No
Mary Shacklett
Mary Shacklett @MaryShacklett
15 Jun 21

Writing a disaster recovery plan has been the responsibility of IT departments for years--but now these plans must be recalibrated to failover for edge and cloud environments.

Mary Shacklett
Mary Shacklett @MaryShacklett
15 Jun 21

The digital twin is the grandchild of early flight simulation models that were first used by the NASA Flight Search Division before the start of the space program. It is a product of data scientists, subject matter experts, IT, big data and analytics.

Mary Shacklett
Mary Shacklett @MaryShacklett
15 Jun 21

The use of drones and IoT in field operations has enormous potential. The technology is there, but the legal and regulatory fields still need to catch up.