Mekhala Roy Mekhala Roy is a former news and features writer for TechTarget. Mekhala Roy’s Most Recent Content SearchCIO business process 27 Apr 2022 SearchSecurity risk map (risk heat map) 12 Oct 2021 SearchCIO Why digital transformations fail: Top 6 reasons 22 Mar 2021 SearchCIO 4 examples of digital transformation success in business 09 Mar 2021 SearchSecurity 5 tips for building a cybersecurity culture at your company 06 Jan 2021 SearchCIO strategic management 07 Apr 2020 SearchCIO Why a CISO-CIO reporting structure undermines security 04 Nov 2019 SearchSecurity AI-enabled malware is coming, Malwarebytes warns 28 Jun 2019 SearchSecurity Gartner: Application security programs coming up short 20 Jun 2019 SearchSecurity Gartner: Cybersecurity skills shortage requires a new approach 18 Jun 2019 SearchSecurity CrowdStrike IPO success puts spotlight on endpoint security 13 Jun 2019 SearchSecurity Election security threats increasing pressure on state governments 12 Jun 2019 SearchSecurity Why larger GDPR fines could be on the horizon 06 Jun 2019 SearchSecurity Ransomware attacks on local and state governments increasing 31 May 2019 SearchSecurity Recorded Future acquired by private equity firm for $780 million 30 May 2019 SearchSecurity Microsoft bets on ElectionGuard SDK to fortify election security 23 May 2019 SearchSecurity ZombieLoad: More side channel attacks put Intel chips at risk 16 May 2019 SearchSecurity Effects of cybersecurity skills shortage worsening, new study says 10 May 2019 SearchSecurity Enterprise security threats rising, consumer attacks falling 06 May 2019 SearchSecurity CrowdStrike tackles BIOS attacks with new Falcon features 02 May 2019 SearchSecurity FBI report says BEC attacks are increasing, evolving 26 Apr 2019 SearchSecurity Flashpoint responds to evolving dark web threats 24 Apr 2019 SearchSecurity Forcepoint pushes 'human-centric cybersecurity' approach 19 Apr 2019 SearchSecurity Blue Hexagon bets on deep learning AI in cybersecurity 15 Apr 2019 SearchSecurity New Baldr information stealer could target businesses 11 Apr 2019 SearchSecurity Radware: DDoS amplification attacks increasing, evolving 05 Apr 2019 SearchSecurity 'Triple threat' malware campaign combines Emotet, TrickBot and Ryuk 03 Apr 2019 SearchSecurity Study: Cybersecurity professionals taking on more data privacy duties 29 Mar 2019 SearchSecurity CrowdStrike: Cybercrime groups joining forces to pack more punch 26 Mar 2019 SearchSecurity Study reveals sale of SSL/TLS certificates on dark web 22 Mar 2019 SearchSecurity New Mirai malware variant targets enterprise devices 20 Mar 2019 SearchSecurity SANS Institute: DNS attacks gaining steam in 2019 13 Mar 2019 SearchSecurity Zscaler charts sharp increase in SSL threats like phishing, botnets 11 Mar 2019 SearchSecurity FBI director calls for public-private cybersecurity partnerships 06 Mar 2019 SearchSecurity Research sparks debate over password manager vulnerabilities 01 Mar 2019 SearchSecurity Eclypsium: Bare-metal cloud servers vulnerable to firmware attacks 26 Feb 2019 SearchSecurity CrowdStrike report says breakout time for threat actors is increasing 21 Feb 2019 SearchSecurity Palo Alto Networks to acquire SOAR vendor Demisto 19 Feb 2019 SearchSecurity Astaroth Trojan returns, abuses antivirus software 15 Feb 2019 SearchSecurity Ponemon study: Poor password practices remain rampant 15 Feb 2019 SearchSecurity 'SpeakUp' backdoor Trojan could spell further trouble for Linux servers 08 Feb 2019 SearchSecurity Gartner: Expanding SOC capabilities a priority for enterprises 07 Feb 2019 SearchSecurity Dell unveils endpoint security portfolio with CrowdStrike, Secureworks 31 Jan 2019 SearchSecurity New DDoS attack technique puts CSPs at risk 30 Jan 2019 SearchSecurity SafeRide tackles connected vehicle security with machine learning 25 Jan 2019 SearchSecurity Top security initiatives for 2019 include MFA, end-user training 23 Jan 2019 SearchSecurity Experts: A breach response plan is a must in 2019 18 Jan 2019 SearchSecurity Enterprises betting on SOAR tools to fill security gaps 16 Jan 2019 SearchSecurity Marriott data breach exposed 5 million unencrypted passport numbers 08 Jan 2019 SearchCIO 5 cloud computing predictions, trends for 2019 21 Dec 2018 SearchCIO What role does machine learning play in the threat hunting process? 21 Dec 2018 SearchCIO Top 10 SearchCIO videos: IT industry leaders share DX advice 21 Dec 2018 SearchCIO What are the benefits of serverless computing? 14 Dec 2018 SearchCIO Lumentum CIO talks building an enterprise cloud computing strategy 26 Nov 2018 SearchCIO organizational goals 26 Nov 2018 SearchCIO What should CIOs look for when choosing public cloud platforms? 19 Nov 2018 SearchCIO How automating feature engineering can help data scientists 13 Nov 2018 SearchCIO How can enterprises benefit from automation in security? 09 Nov 2018 SearchCIO IBM-Red Hat deal: Minimal influence on CIOs' cloud decisions, for now 02 Nov 2018 SearchCIO Gartner Symposium 2018: 6 emerging trends in security 31 Oct 2018 SearchCIO Will acquiring a cybersecurity company fix Facebook's security woes? 31 Oct 2018 SearchCIO Gartner Symposium 2018: Enterprise cloud strategy mistakes to avoid 26 Oct 2018 SearchCIO Technology risks: What CIOs should know and steps they can take 19 Oct 2018 SearchCIO Gartner Symposium 2018: Digital business models shift IT priorities 16 Oct 2018 SearchCIO Enterprise digital transformation: How CIOs can drive business growth 12 Oct 2018 SearchCIO What tactics can organizations adopt to drive cloud security practices? 09 Oct 2018 SearchCIO Lessons learned from the Facebook security breach 04 Oct 2018 SearchCIO ITSM vs DevOps: Are DevOps, Agile overshadowing ITSM frameworks? 27 Sep 2018 SearchCIO 4 factors to consider when making the shift to the cloud 24 Sep 2018 SearchCIO Multi-cloud management best practices and pain points 19 Sep 2018 SearchCIO Cloud migration best practices: 4 potential problems to avoid 14 Sep 2018 SearchCIO Top disadvantages of cloud computing: What CIOs can do 14 Sep 2018 SearchCIO Multi-cloud strategy: Determine the right cloud for your workloads 07 Sep 2018 SearchCIO Transforming IT infrastructure and operations to drive digital business 30 Aug 2018 SearchCIO Gartner Catalyst 2018: A future without data centers? 21 Aug 2018 SearchCIO Implementing machine learning to keep Facebook user data safe 21 Aug 2018 SearchCIO Facebook cybersecurity: How the company is building a diverse team 17 Aug 2018 SearchCIO How to scale security: An inside look at how Facebook does it 16 Aug 2018 SearchCIO Improving CISO-board communication: Partnership, metrics essential 10 Aug 2018 SearchCIO Machine learning, AI in security: Advancing the cybersecurity landscape 07 Aug 2018 SearchCIO What's driving the adoption of the CIO-CDO dual role? 31 Jul 2018 SearchCIO SAP chief security officer talks cloud, security trends 30 Jul 2018 SearchCIO ITSM in the era of cloud-based services 26 Jul 2018 SearchCIO The cloud-enabled workforce: Prepping IT staff for success 19 Jul 2018 SearchCIO How is cloud influencing the CDO role? 13 Jul 2018 SearchCIO Embracing digital transformation: Airtel CIO discusses focus, benefits 29 Jun 2018 SearchCIO Enterprise digital strategy: Design use cases that create business value 29 Jun 2018 SearchCIO IT career skills: Does being a specialist make a difference? 20 Jun 2018 SearchCIO How can companies protect against ransomware in the cloud? 08 Jun 2018 SearchCIO Enterprise cybersecurity strategy: What a CIO needs to know 31 May 2018 SearchCIO Enterprise data encryption: Preparing for a post-quantum future 29 May 2018 SearchCIO CISO careers: Several factors propel high turnover 21 May 2018 SearchCIO Digital transformation program: How to drive business success 14 May 2018 SearchCIO Force multipliers in cybersecurity: Augmenting your security workforce 11 May 2018 SearchCIO Best practices for cloud security: Be cognizant of what's in the cloud 04 May 2018 SearchCIO Top 2018 cybersecurity trends to watch out for 30 Apr 2018 SearchCIO Vulnerability management programs need an upgrade for the cloud era 27 Apr 2018 SearchCIO The CIO voice in the boardroom: Skills needed to get there 24 Apr 2018 SearchCIO Juniper CEO Rahim stresses cybersecurity training, automation at RSA 2018 20 Apr 2018 SearchCIO Tackling security debt: The role of risk register, patch management 17 Apr 2018 1 2