APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • CXO Insights

    Apac CIOOutlook: Contributors

    The Next Wave in Software Engineering After CMM

    The Next Wave in Software Engineering After CMM

    By Bill Curtis, SVP & Chief Scientist of CAST & Director of the Consortium for IT Software Quality

    More Cattle, Fewer Pets Reaching the Tipping Point in High-cost Storage Disruption

    More Cattle, Fewer Pets Reaching the Tipping Point in High-cost Storage Disruption

    By Brent Compton, Director, Storage Solutions, Red Hat

    Five Trends Improving Enterprise Storage

    Five Trends Improving Enterprise Storage

    By Travis Vigil, ED, Product Management, Dell Storage

    The Impact of the Industrial Internet on Data Storage: Connected Machines & Devices + Analytics = New Opportunities, New System Demands

    The Impact of the Industrial Internet on Data Storage: Connected Machines & Devices + Analytics = New Opportunities, New System Demands

    By Dr. Richard Soley, Executive Director, Industrial Internet Consortium

    Big Data and Storage

    Big Data and Storage

    By Bill Piper, VP of Hardware Engineering, Wells Fargo

    Software-defined Storage Designed for Virtual Workspace Delivery

    Software-defined Storage Designed for Virtual Workspace Delivery

    By Momchil Michailov, VP, Storage Technologies, Citrix

    3 Trends Driving Storage Innovation

    3 Trends Driving Storage Innovation

    By Steve Moyer, VP of Storage Software Engineering, Micron Technology

    Transforming Your Business through Secure Mobile Strategies

    Transforming Your Business through Secure Mobile Strategies

    By Todd Inskeep, Global Security Assessments VP- Global Security Services, Samsung

    Enhance Governance Over Cloud Adoption

    Enhance Governance Over Cloud Adoption

    By Mike Kelley, Global IT Sr Manager Information Security, Risk & Compliance, Dana Holding Corporation

    The Dawn of Hybrid Web Application Firewall-Why it will define security for the foreseeable future

    The Dawn of Hybrid Web Application Firewall-Why it will define security for the foreseeable future

    By Carl Herberger, VP-Security Solutions, Radware

    Five Enterprise IT Security Stats That May Surprise You

    Five Enterprise IT Security Stats That May Surprise You

    By Mark Birmingham, Director, Global Product Marketing, Kaspersky Lab

    Secure Your Cloud

    Secure Your Cloud

    By Sherry Ryan, VP & CISO, Juniper Networks

    Cloud Adoption Rate Hike Spurs Demand for Security Professionals

    Cloud Adoption Rate Hike Spurs Demand for Security Professionals

    By Julie Peeler, Foundation Director, (ISC)²

    The Great Threat Intelligence Debate

    The Great Threat Intelligence Debate

    By Dan Holden, Director-Security Research, Arbor Networks

    Securing the Airways Mobile Communications are Wide Open to Hacking. Encryption Delivers a Much-Needed Solution.

    Securing the Airways Mobile Communications are Wide Open to Hacking. Encryption Delivers a Much-Needed Solution.

    By Bob Ackerman, Founder & MD, Allegis Capital

    Revolutionizing Manufacturing Arena with IoT and the Industrial Internet

    Revolutionizing Manufacturing Arena with IoT and the Industrial Internet

    By Brian Courtney, GM, AC Power System Product Line, GE Critical Power

    From Product to Experience: The Emergence of High-Tech Manufacturing

    From Product to Experience: The Emergence of High-Tech Manufacturing

    By Sedar LaBarre, VP, Booz Allen Hamilton

    How to Prepare for the Next Wave of High-Tech Manufacturing

    How to Prepare for the Next Wave of High-Tech Manufacturing

    By Chris Richard, Partner, A.T. Kearney & Clarence Chen, Partner, High Tech, A.T. Kearney

    Where Will the Cloud Go Next? Four Dynamics that will Shape your Strategies for Technology's Next Act

    Where Will the Cloud Go Next? Four Dynamics that will Shape your Strategies for Technology's Next Act

    By Ben Pring, VP, Co-Director, Cognizant Technology Solutions

    Using Cisco to choose High Performance Partner References

    Using Cisco to choose High Performance Partner References

    By Jeff Marshall, Director, North American Cisco Practice, Servion Global Solutions

    How to Evaluate the Partners and Solutions in the Cisco Ecosystem

    How to Evaluate the Partners and Solutions in the Cisco Ecosystem

    By Steve Blacklock, Sr. Director,Global Strategic Alliances, Citrix

    Stop Taking Turns and Start Taking Action: True Collaboration Occurs Within a Shared Workspace

    Stop Taking Turns and Start Taking Action: True Collaboration Occurs Within a Shared Workspace

    By David Kung, VP Product Strategy, Oblong Industries

    Cisco Stakes Its Claim on the Data Center - Even Your Toaster Will Go Sci-Fi

    Cisco Stakes Its Claim on the Data Center - Even Your Toaster Will Go Sci-Fi

    By Michael Watkins,Senior Product Director, Global Knowledge

    The Move to the Cloud: Making Economic Sense of the Hype

    The Move to the Cloud: Making Economic Sense of the Hype

    By Bernd Schlotter, President of Services, Unify

    The IoT is Reality in Industrial Applications

    The IoT is Reality in Industrial Applications

    By Bob Karschnia, VP Wireless, Emerson Process Management

    Financial Planning Allowing for Calculated Risks

    Financial Planning Allowing for Calculated Risks

    By David J. Rodgers, SVP & CFO, Briggs & Stratton Corp

    Set Financial Goals that Drive Shareholder Value

    Set Financial Goals that Drive Shareholder Value

    By Henk P. Derksen, SVP, Finance & CFO, Belden

    CFOs: No Longer Mere Corporate Scorekeepers

    CFOs: No Longer Mere Corporate Scorekeepers

    By L.R. “Skip” Sorenson, CFO, Imagine Communications

    Enabling Business Transformation

    Enabling Business Transformation

    By Thomas W. Sweet, SVP & CFO, Dell

    Keys to Effective Financial Leadership to Drive Revenue Growth

    Keys to Effective Financial Leadership to Drive Revenue Growth

    By Ken Judd, CFO, KesteCFO, Keste

    Identifying Industry Transitions to Accelerate the Business

    Identifying Industry Transitions to Accelerate the Business

    By Bob Swan, SVP, Finance & CFO, eBay

    Risk and Reward: How BYOD Has Evolved

    Risk and Reward: How BYOD Has Evolved

    By Todd J. Carey, SVP Mobility Global, UST Global

    A CIO's Guide to Investing in a Data Strategy

    A CIO's Guide to Investing in a Data Strategy

    By Srikant Gokulnatha, Co-Founder & VP of product development, Numerify

    2015: The Year of Reckoning for BYOD

    2015: The Year of Reckoning for BYOD

    By Ojas Rege, VP Strategy, MobileIronVP Strategy, MobileIron

    BYOD Policies: Securing Corporate Data in Today's Mobile World

    BYOD Policies: Securing Corporate Data in Today's Mobile World

    By Brian Reed, CMO, Good Technology

    Mobile Delights- and Dangers

    Mobile Delights- and Dangers

    By Graham Welch, Director-Cisco Security, Cisco

    Data:The Unexploited Scale Effect

    Data:The Unexploited Scale Effect

    By Rob Thomas, VP-Product Development, Big Data and Analytics, IBM

    Maximizing efficiency and reducing spend in IT services

    Maximizing efficiency and reducing spend in IT services

    By Anindo Ganguly, AVP and Head, IT Infrastructure Practice, Sasken Communication Technologies

    Visualize the Correlation of Variety of Big Data

    Visualize the Correlation of Variety of Big Data

    By Suresh Acharya, VP Product Development, JDA Software

    When the Internet of Things met Analytics

    When the Internet of Things met Analytics

    By Salil Godika, Chief Strategy & Marketing Officer, Happiest Minds Technologies

    « 72 73 74 75 76 77 »

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    CIO Speaks

    Previous Next
    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    Secure Text Messaging in an Academic Medical Center - Experience and Lessons

    Kari Cassel, SVP & CIO, UF Health

    It

    Gilad Raz, CIO, Varonis

    Top 3 Challenges Growing Businesses Face and How the Cloud Can Help

    Ken Shulman, CIO & CTO, Broadview Networks

    Cloud Security Grows Up

    Kevin Winter, VP & CIO, Booz Allen Hamilton

    Corporate Considerations: Dispelling the Myths of Cyber Security

    Neil Jarvis, CIO, Fujitsu America, Inc

    Moving towards an Intelligent, networked and boundary less world

    Rajeev Batra, CIO, MTS India

    The Right Technology And Reliable Partners; The Business Next Frontier

    Luke O'Brien, CIO, ISS Facility Services Australia & New Zealand

    Service Organisations Make Great Places To Work, And Deliver Better Value

    Matthew Perry, CIO, Orora Limited [ASX: ORA]

    How Have Recent Advancements in Big Data Been Impacting Businesses?

    Marc Solomon, CIO, Bvn Architecture

    BI & Analytics in Aquaculture

    Matthew Leary, CIO, Tassal Operations

    BI and Analytics

    Gary Peel, CIO, SYNERGY (ASX:IS3)

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://cyber-security.apacciooutlook.com/cxoinsights/76