212-256-9890

The Virtual War Rages On: Twitter To Slash Millions Of Fake Accounts

 -

Twitter recently announced that they will begin removing tens of millions of suspicious accounts from users’ followers starting today, signaling a major new effort to restore trust on the popular platform. Twitter suspended more than 70 million fake accounts throughout May and June with about one million accounts deleted...

Read more
11 Jun, 2018

Are Executives “Sleeping” on Cybersecurity? Experts Say Yes.

 -

All companies connected to the internet are vulnerable to cyber attacks, with the potential losses significant. Nowadays, liability for data breaches that affect customers leads directly to the leadership of the C-Level suite. Now more than ever, executives need to personally know how strong their company’s cyber defenses are,...

Read more
16 May, 2018

Down on Music Row: The Transformational CISO Assembly Successfully Takes on Nashville

 -

Last week, The Millennium Alliance held the first cybersecurity event of the year to massive success. From May 9th to the 10th, The Transformational CISO Assembly brought together C-Level executives from all walks of security and IT to an intimate setting in one of the finest hotels in Nashville,...

Read more
07 Feb, 2018

Sertainty Reveals Cybersecurity Insights In Exclusive Interview

 -

With our Transformational CISO Assembly approaching, Digital Diary sat down with one of our sponsors, Sertainty, to gain a first-hand insight into the depths of cyber attacks and the measures that enterprises can go to in order to incorporate cybersecurity into business plans. Cyberspace has not been defensible, since...

Read more
13 Dec, 2017

What Are The Top Challenges That CIOs Deal With?

 -

CIOs face many challenges while keeping up with structured data and structured data, which can be a problem for businesses because having the ability to capture data can unlock insights, and the success of a business relies on those insights. Exposing the challenges of CIOs can be helpful because...

Read more

Amazon’s Alexa For Business Aims To Change How We Conduct Business

 -

By now, we are all familiar with Amazon’s Alexa, after it has made its way into the homes of many customers, changing the way everyday tasks are carried out, through mobile devices and even in their cars. “Tens of millions of people already count on Alexa at home, in their...

Read more
30 Nov, 2017

How Does A CIO Implement A Successful Approach To Information Security?

 -

Information security is a necessary component of any CIO’s strategy. This approach can also be referred to as “infosec” which basically refers to any strategy that is put in motion to protect, detect and documenter threats to all enterprises’ information, digital, or non-digital. This information is a priority to protect,...

Read more
20 Nov, 2017

Frost & Sullivan Reveal Endpoint Security Priorities Of Industry Leaders

 -

If it is one thing that is for sure, it is that IT security leaders must always be prepared to protect their company from the possibility of hackers targeting their servers, endpoints, and PCs. Because of this, it is important to have a strong endpoint security plan, as well...

Read more
31 Oct, 2017

The Role Of The Public Sector CIO vs. The Private Sector CIO

 -

The role of the CIO is complex and important for the infrastructure of an enterprise looking to combat and address cybersecurity issues. It can be broken down based on different priorities and can be placed into two different job titles: private CIOs and public sector CIOs. The role of...

Read more
11 Sep, 2017

Do You Have A Strong Endpoint Security Plan? If Not, You Need One

 -

Do you use computer devices such as laptops, tablets, desktop computers, or smartphones in order to carry out business operations? Do you store important information on these devices? If your answer is yes, that means you are using endpoint devices to deal with information, that can ultimately be turned into...

Read more