Mekhala Roy Mekhala Roy is a former news and features writer for TechTarget. Mekhala Roy’s Most Recent Content CIO What is an organizational goal? 26 Aug 2024 CIO strategic management 09 May 2024 CIO 7 examples of digital transformation success in business 01 Dec 2023 CIO innovation management 27 Nov 2023 CIO IT strategic plan (information technology strategic plan) 08 Nov 2023 CIO 11 reasons why digital transformations fail, explained by pros 20 Oct 2023 CIO business process 19 Sep 2023 Security risk map (risk heat map) 08 Sep 2023 CIO hackathon 08 Mar 2023 CIO contingent workforce 06 Sep 2022 CIO Why a CISO-CIO reporting structure undermines security 04 Nov 2019 Security AI-enabled malware is coming, Malwarebytes warns 28 Jun 2019 Security Gartner: Application security programs coming up short 20 Jun 2019 Security Gartner: Cybersecurity skills shortage requires a new approach 18 Jun 2019 Security CrowdStrike IPO success puts spotlight on endpoint security 13 Jun 2019 Security Election security threats increasing pressure on state governments 12 Jun 2019 Security Why larger GDPR fines could be on the horizon 06 Jun 2019 Security Ransomware attacks on local and state governments increasing 31 May 2019 Security Recorded Future acquired by private equity firm for $780 million 30 May 2019 Security Microsoft bets on ElectionGuard SDK to fortify election security 23 May 2019 Security ZombieLoad: More side channel attacks put Intel chips at risk 16 May 2019 Security Effects of cybersecurity skills shortage worsening, new study says 10 May 2019 Security Enterprise security threats rising, consumer attacks falling 06 May 2019 Security CrowdStrike tackles BIOS attacks with new Falcon features 02 May 2019 Security FBI report says BEC attacks are increasing, evolving 26 Apr 2019 Security Flashpoint responds to evolving dark web threats 24 Apr 2019 Security Forcepoint pushes 'human-centric cybersecurity' approach 19 Apr 2019 Security Blue Hexagon bets on deep learning AI in cybersecurity 15 Apr 2019 Security New Baldr information stealer could target businesses 11 Apr 2019 Security Radware: DDoS amplification attacks increasing, evolving 05 Apr 2019 Security 'Triple threat' malware campaign combines Emotet, TrickBot and Ryuk 03 Apr 2019 Security Study: Cybersecurity professionals taking on more data privacy duties 29 Mar 2019 Security CrowdStrike: Cybercrime groups joining forces to pack more punch 26 Mar 2019 Security Study reveals sale of SSL/TLS certificates on dark web 22 Mar 2019 Security New Mirai malware variant targets enterprise devices 20 Mar 2019 Security SANS Institute: DNS attacks gaining steam in 2019 13 Mar 2019 Security Zscaler charts sharp increase in SSL threats like phishing, botnets 11 Mar 2019 Security FBI director calls for public-private cybersecurity partnerships 06 Mar 2019 Security Research sparks debate over password manager vulnerabilities 01 Mar 2019 Security Eclypsium: Bare-metal cloud servers vulnerable to firmware attacks 26 Feb 2019 Security CrowdStrike report says breakout time for threat actors is increasing 21 Feb 2019 Security Palo Alto Networks to acquire SOAR vendor Demisto 19 Feb 2019 Security Astaroth Trojan returns, abuses antivirus software 15 Feb 2019 Security Ponemon study: Poor password practices remain rampant 15 Feb 2019 Security 'SpeakUp' backdoor Trojan could spell further trouble for Linux servers 08 Feb 2019 Security Gartner: Expanding SOC capabilities a priority for enterprises 07 Feb 2019 Security Dell unveils endpoint security portfolio with CrowdStrike, Secureworks 31 Jan 2019 Security New DDoS attack technique puts CSPs at risk 30 Jan 2019 Security SafeRide tackles connected vehicle security with machine learning 25 Jan 2019 Security Top security initiatives for 2019 include MFA, end-user training 23 Jan 2019 Security Experts: A breach response plan is a must in 2019 18 Jan 2019 Security Enterprises betting on SOAR tools to fill security gaps 16 Jan 2019 Security Marriott data breach exposed 5 million unencrypted passport numbers 08 Jan 2019 CIO 5 cloud computing predictions, trends for 2019 21 Dec 2018 CIO What role does machine learning play in the threat hunting process? 21 Dec 2018 CIO Top 10 SearchCIO videos: IT industry leaders share DX advice 21 Dec 2018 CIO What are the benefits of serverless computing? 14 Dec 2018 CIO Lumentum CIO talks building an enterprise cloud computing strategy 26 Nov 2018 CIO What should CIOs look for when choosing public cloud platforms? 19 Nov 2018 CIO How automating feature engineering can help data scientists 13 Nov 2018 CIO How can enterprises benefit from automation in security? 09 Nov 2018 CIO IBM-Red Hat deal: Minimal influence on CIOs' cloud decisions, for now 02 Nov 2018 CIO Gartner Symposium 2018: 6 emerging trends in security 31 Oct 2018 CIO Will acquiring a cybersecurity company fix Facebook's security woes? 31 Oct 2018 CIO Gartner Symposium 2018: Enterprise cloud strategy mistakes to avoid 26 Oct 2018 CIO Technology risks: What CIOs should know and steps they can take 19 Oct 2018 CIO Gartner Symposium 2018: Digital business models shift IT priorities 16 Oct 2018 CIO Enterprise digital transformation: How CIOs can drive business growth 12 Oct 2018 CIO What tactics can organizations adopt to drive cloud security practices? 09 Oct 2018 CIO Lessons learned from the Facebook security breach 04 Oct 2018 CIO ITSM vs DevOps: Are DevOps, Agile overshadowing ITSM frameworks? 27 Sep 2018 CIO 4 factors to consider when making the shift to the cloud 24 Sep 2018 CIO Multi-cloud management best practices and pain points 19 Sep 2018 CIO Cloud migration best practices: 4 potential problems to avoid 14 Sep 2018 CIO Top disadvantages of cloud computing: What CIOs can do 14 Sep 2018 CIO Multi-cloud strategy: Determine the right cloud for your workloads 07 Sep 2018 CIO Transforming IT infrastructure and operations to drive digital business 30 Aug 2018 CIO Gartner Catalyst 2018: A future without data centers? 21 Aug 2018 CIO Implementing machine learning to keep Facebook user data safe 21 Aug 2018 CIO Facebook cybersecurity: How the company is building a diverse team 17 Aug 2018 CIO How to scale security: An inside look at how Facebook does it 16 Aug 2018 CIO Improving CISO-board communication: Partnership, metrics essential 10 Aug 2018 CIO Machine learning, AI in security: Advancing the cybersecurity landscape 07 Aug 2018 CIO What's driving the adoption of the CIO-CDO dual role? 31 Jul 2018 CIO SAP chief security officer talks cloud, security trends 30 Jul 2018 CIO ITSM in the era of cloud-based services 26 Jul 2018 CIO The cloud-enabled workforce: Prepping IT staff for success 19 Jul 2018 CIO How is cloud influencing the CDO role? 13 Jul 2018 CIO Embracing digital transformation: Airtel CIO discusses focus, benefits 29 Jun 2018 CIO Enterprise digital strategy: Design use cases that create business value 29 Jun 2018 CIO IT career skills: Does being a specialist make a difference? 20 Jun 2018 CIO How can companies protect against ransomware in the cloud? 08 Jun 2018 CIO Enterprise cybersecurity strategy: What a CIO needs to know 31 May 2018 CIO Enterprise data encryption: Preparing for a post-quantum future 29 May 2018 CIO CISO careers: Several factors propel high turnover 21 May 2018 CIO Digital transformation program: How to drive business success 14 May 2018 CIO Force multipliers in cybersecurity: Augmenting your security workforce 11 May 2018 CIO Best practices for cloud security: Be cognizant of what's in the cloud 04 May 2018 CIO Top 2018 cybersecurity trends to watch out for 30 Apr 2018 CIO Vulnerability management programs need an upgrade for the cloud era 27 Apr 2018 1 2