Mekhala Roy Mekhala Roy is a former news and features writer for TechTarget. Mekhala Roy’s Most Recent Content Search CIO What is an organizational goal? 26 Aug 2024 Search CIO strategic management 09 May 2024 Search CIO 7 examples of digital transformation success in business 01 Dec 2023 Search CIO innovation management 27 Nov 2023 Search CIO IT strategic plan (information technology strategic plan) 08 Nov 2023 Search CIO 11 reasons why digital transformations fail, explained by pros 20 Oct 2023 Search CIO business process 19 Sep 2023 Search Security risk map (risk heat map) 08 Sep 2023 Search CIO hackathon 08 Mar 2023 Search CIO contingent workforce 06 Sep 2022 Search CIO Why a CISO-CIO reporting structure undermines security 04 Nov 2019 Search Security AI-enabled malware is coming, Malwarebytes warns 28 Jun 2019 Search Security Gartner: Application security programs coming up short 20 Jun 2019 Search Security Gartner: Cybersecurity skills shortage requires a new approach 18 Jun 2019 Search Security CrowdStrike IPO success puts spotlight on endpoint security 13 Jun 2019 Search Security Election security threats increasing pressure on state governments 12 Jun 2019 Search Security Why larger GDPR fines could be on the horizon 06 Jun 2019 Search Security Ransomware attacks on local and state governments increasing 31 May 2019 Search Security Recorded Future acquired by private equity firm for $780 million 30 May 2019 Search Security Microsoft bets on ElectionGuard SDK to fortify election security 23 May 2019 Search Security ZombieLoad: More side channel attacks put Intel chips at risk 16 May 2019 Search Security Effects of cybersecurity skills shortage worsening, new study says 10 May 2019 Search Security Enterprise security threats rising, consumer attacks falling 06 May 2019 Search Security CrowdStrike tackles BIOS attacks with new Falcon features 02 May 2019 Search Security FBI report says BEC attacks are increasing, evolving 26 Apr 2019 Search Security Flashpoint responds to evolving dark web threats 24 Apr 2019 Search Security Forcepoint pushes 'human-centric cybersecurity' approach 19 Apr 2019 Search Security Blue Hexagon bets on deep learning AI in cybersecurity 15 Apr 2019 Search Security New Baldr information stealer could target businesses 11 Apr 2019 Search Security Radware: DDoS amplification attacks increasing, evolving 05 Apr 2019 Search Security 'Triple threat' malware campaign combines Emotet, TrickBot and Ryuk 03 Apr 2019 Search Security Study: Cybersecurity professionals taking on more data privacy duties 29 Mar 2019 Search Security CrowdStrike: Cybercrime groups joining forces to pack more punch 26 Mar 2019 Search Security Study reveals sale of SSL/TLS certificates on dark web 22 Mar 2019 Search Security New Mirai malware variant targets enterprise devices 20 Mar 2019 Search Security SANS Institute: DNS attacks gaining steam in 2019 13 Mar 2019 Search Security Zscaler charts sharp increase in SSL threats like phishing, botnets 11 Mar 2019 Search Security FBI director calls for public-private cybersecurity partnerships 06 Mar 2019 Search Security Research sparks debate over password manager vulnerabilities 01 Mar 2019 Search Security Eclypsium: Bare-metal cloud servers vulnerable to firmware attacks 26 Feb 2019 Search Security CrowdStrike report says breakout time for threat actors is increasing 21 Feb 2019 Search Security Palo Alto Networks to acquire SOAR vendor Demisto 19 Feb 2019 Search Security Astaroth Trojan returns, abuses antivirus software 15 Feb 2019 Search Security Ponemon study: Poor password practices remain rampant 15 Feb 2019 Search Security 'SpeakUp' backdoor Trojan could spell further trouble for Linux servers 08 Feb 2019 Search Security Gartner: Expanding SOC capabilities a priority for enterprises 07 Feb 2019 Search Security Dell unveils endpoint security portfolio with CrowdStrike, Secureworks 31 Jan 2019 Search Security New DDoS attack technique puts CSPs at risk 30 Jan 2019 Search Security Top security initiatives for 2019 include MFA, end-user training 23 Jan 2019 Search Security Experts: A breach response plan is a must in 2019 18 Jan 2019 Search Security Enterprises betting on SOAR tools to fill security gaps 16 Jan 2019 Search Security Marriott data breach exposed 5 million unencrypted passport numbers 08 Jan 2019 Search CIO 5 cloud computing predictions, trends for 2019 21 Dec 2018 Search CIO What role does machine learning play in the threat hunting process? 21 Dec 2018 Search CIO Top 10 SearchCIO videos: IT industry leaders share DX advice 21 Dec 2018 Search CIO What are the benefits of serverless computing? 14 Dec 2018 Search CIO Lumentum CIO talks building an enterprise cloud computing strategy 26 Nov 2018 Search CIO What should CIOs look for when choosing public cloud platforms? 19 Nov 2018 Search CIO How automating feature engineering can help data scientists 13 Nov 2018 Search CIO How can enterprises benefit from automation in security? 09 Nov 2018 Search CIO IBM-Red Hat deal: Minimal influence on CIOs' cloud decisions, for now 02 Nov 2018 Search CIO Gartner Symposium 2018: 6 emerging trends in security 31 Oct 2018 Search CIO Will acquiring a cybersecurity company fix Facebook's security woes? 31 Oct 2018 Search CIO Gartner Symposium 2018: Enterprise cloud strategy mistakes to avoid 26 Oct 2018 Search CIO Technology risks: What CIOs should know and steps they can take 19 Oct 2018 Search CIO Gartner Symposium 2018: Digital business models shift IT priorities 16 Oct 2018 Search CIO Enterprise digital transformation: How CIOs can drive business growth 12 Oct 2018 Search CIO What tactics can organizations adopt to drive cloud security practices? 09 Oct 2018 Search CIO Lessons learned from the Facebook security breach 04 Oct 2018 Search CIO ITSM vs DevOps: Are DevOps, Agile overshadowing ITSM frameworks? 27 Sep 2018 Search CIO 4 factors to consider when making the shift to the cloud 24 Sep 2018 Search CIO Multi-cloud management best practices and pain points 19 Sep 2018 Search CIO Cloud migration best practices: 4 potential problems to avoid 14 Sep 2018 Search CIO Top disadvantages of cloud computing: What CIOs can do 14 Sep 2018 Search CIO Multi-cloud strategy: Determine the right cloud for your workloads 07 Sep 2018 Search CIO Transforming IT infrastructure and operations to drive digital business 30 Aug 2018 Search CIO Gartner Catalyst 2018: A future without data centers? 21 Aug 2018 Search CIO Implementing machine learning to keep Facebook user data safe 21 Aug 2018 Search CIO Facebook cybersecurity: How the company is building a diverse team 17 Aug 2018 Search CIO How to scale security: An inside look at how Facebook does it 16 Aug 2018 Search CIO Improving CISO-board communication: Partnership, metrics essential 10 Aug 2018 Search CIO Machine learning, AI in security: Advancing the cybersecurity landscape 07 Aug 2018 Search CIO What's driving the adoption of the CIO-CDO dual role? 31 Jul 2018 Search CIO SAP chief security officer talks cloud, security trends 30 Jul 2018 Search CIO ITSM in the era of cloud-based services 26 Jul 2018 Search CIO The cloud-enabled workforce: Prepping IT staff for success 19 Jul 2018 Search CIO How is cloud influencing the CDO role? 13 Jul 2018 Search CIO Embracing digital transformation: Airtel CIO discusses focus, benefits 29 Jun 2018 Search CIO Enterprise digital strategy: Design use cases that create business value 29 Jun 2018 Search CIO IT career skills: Does being a specialist make a difference? 20 Jun 2018 Search CIO How can companies protect against ransomware in the cloud? 08 Jun 2018 Search CIO Enterprise cybersecurity strategy: What a CIO needs to know 31 May 2018 Search CIO Enterprise data encryption: Preparing for a post-quantum future 29 May 2018 Search CIO CISO careers: Several factors propel high turnover 21 May 2018 Search CIO Digital transformation program: How to drive business success 14 May 2018 Search CIO Force multipliers in cybersecurity: Augmenting your security workforce 11 May 2018 Search CIO Best practices for cloud security: Be cognizant of what's in the cloud 04 May 2018 Search CIO Top 2018 cybersecurity trends to watch out for 30 Apr 2018 Search CIO Vulnerability management programs need an upgrade for the cloud era 27 Apr 2018 Search CIO The CIO voice in the boardroom: Skills needed to get there 24 Apr 2018 1 2