Tag: Guest articles


  • Introducing HPE Helion Stackato 4.0: The enterprise-ready, multi-cloud, cloud native app platform

    Introducing HPE Helion Stackato 4.0: The enterprise-ready, multi-cloud, cloud native app platform

    Join Us Now Today we announced HPE Helion Stackato 4.0, the next integrated release of our cloud native application platform.   Enterprise cloud is an amalgamation of seven drivers, each representing one or more order-of-magnitude improvements over “legacy IT” in one of these two axes – agility and efficiency.  Businesses that seize these opportunities gain an insurmountable structural advantage over ones that don’t. Our design goal for this release has been…

    Continue Reading

  • Jim Swanson, EVP and Enterprise CIO, Johnson & Johnson: Fostering a Caring and Inclusive Culture and Working Toward Health Equity for All

    Jim Swanson, EVP and Enterprise CIO, Johnson & Johnson: Fostering a Caring and Inclusive Culture and Working Toward Health Equity for All

    Join Us Now The following article is an example of the peer-focused research that HMG Strategy will begin delivering under the HMG Research Stack service starting in August 2021. To learn more about the Research Stack and the full suite of offerings available to business technology executives, contact info@hmgstrategy.com. Ten million Americans live in areas that…

    Continue Reading

  • Meet Sathish Muthukrishnan: Guiding Digital Transformation to Provide World-Class Customer Experiences

    Meet Sathish Muthukrishnan: Guiding Digital Transformation to Provide World-Class Customer Experiences

    Join Us Now I had a fascinating conversation recently with Sathish Muthukrishnan, the Chief Information, Data and Digital Officer at Ally Financial Inc. (NYSE: ALLY). Ally is a leading digital financial services company and a top 20 U.S. financial holding company. The company has a distinctive brand, innovative approach and a strong commitment to “Doing…

    Continue Reading

  • David Politis, Founder and CEO, BetterCloud: Managing and Safeguarding SaaS Operations for All

    David Politis, Founder and CEO, BetterCloud: Managing and Safeguarding SaaS Operations for All

    Join Us Now Research reveals that 70 percent of all business applications in use today are SaaS-based. By 2025, 85% of business applications that companies use will be SaaS-based, according to BetterCloud’s 2020 State of SaaSOps report.  HMG Strategy recently caught up with David Politis, Founder and CEO of BetterCloud, regarding the charter behind his company and its…

    Continue Reading

  • Hacking Back at Russia is a Terrible Idea. Here are Ten Reasons Why.

    Hacking Back at Russia is a Terrible Idea. Here are Ten Reasons Why.

    Join Us Now President Biden continues to hint that our nation will embark shortly on a retaliatory effort involving a major cyber offensive action, presumably taken by US Cyber Command, against Russian targets. This is a terrible idea – and here are ten reasons why.   1 Response – If our military hacks Russian targets, then all…

    Continue Reading

  • Cyber Security vs. Cybersecurity

    Cyber Security vs. Cybersecurity

    Join Us Now TAG Cyber analysts Jennifer Bayuk and Katie Teitler debate the “proper” usage of “cyber security” (or is it “cybersecurity…”). The debate between “cybersecurity,” one word, versus “cyber security,” two words, remains one of the industry’s most controversial topics, to semi-quote one of TAG Cyber’s clients who recently questioned our two-word version. To reinforce…

    Continue Reading

  • Advice for CISOs on the SPAC Craze

    Advice for CISOs on the SPAC Craze

    Join Us Now My mother told me to never bite that hand that feeds you – and yet, I may be doing so here, if only just-a-tad. Full disclosure: At TAG Cyber, we’ve been directly involved in supporting SPAC initiatives across the cyber security industry, both as advisors to venture capital, and as independent experts serving rich investors.…

    Continue Reading

  • Managing Misconfigurations to Stop a Data Breach

    Managing Misconfigurations to Stop a Data Breach

    Join Us Now Vulnerability management is mainstay of most cyber security programs. It is seen as essential by enterprise teams, but rarely do defenders get excited about finding and applying a missing patch or tightening up access controls to critical systems. Sure, it feels good to know you’ve plugged a hole that needs plugging, but…

    Continue Reading

  • A Simple Virtual Exercise to Align Your Team on Cyber Risk

    A Simple Virtual Exercise to Align Your Team on Cyber Risk

    Join Us Now If you supervise a cyber security team, then this brief note is for you. It proposes a simple task that you can do with your team today – and our experience at TAG Cyber suggests that it might be the most valuable action you perform all year. Here’s what you must do: Get your…

    Continue Reading

  • Case Study: Transforming Access and Identity to Prevent Cyber Exploit

    Case Study: Transforming Access and Identity to Prevent Cyber Exploit

    Join Us Now In this business case study, Lightening Electric, a power supplier in Northeast Ohio, learns that a threat actor has gained remote access to a programmable logic controller (PLC). Upon investigation, the security team finds additional security threats lurking in their network. Learn how Lightening Electric handled the incident, then use the discussion…

    Continue Reading

Join Us
Register to join our Executive Leadership Network & Newsletter.








Powered by