article thumbnail

Capitalizing on technology budgets: A CIO’s story

CIO

While traditional approaches to bridging the profitability gap, like layoffs and budget cuts, can harm company culture, an innovative and practical alternative is capitalizing on technology budgets. Capitalizing on technology budgets presents a viable solution. Focus on value, not just price : The lowest bidder does not always win.

Capital 407
article thumbnail

LayerX Security Raises $24M for its Browser Security Platform, Enabling Employees to Work Securely from Any Browser, Anywhere

CIO

LayerX , pioneer of the LayerX Browser Security platform, today announced $24 million in Series A funding led by Glilot+, the early-growth fund of Glilot Capital Partners, with participation from Dell Technologies Capital and other investors. This round brings the company’s total investment to $32 million.

Security 371
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Atos calls for help after plan to raise new capital falters

CIO

French IT services company Atos has called on a third-party trustee to help it negotiate debt refinancing with its banks after plans to raise €720 million in new capital through a rights issue fell through. IT Operations, Managed IT Services Atos is still discussing the sale of Tech Foundations with EP Equity Investment.

Capital 617
article thumbnail

3 business benefits of stronger security using Zero Trust principles

CIO

Historically, these weren’t designed with security in mind. OT assets are highly vulnerable to attack because they don’t have built-in security, traffic isn’t encrypted and there’s low visibility into their functioning. Security is paramount for the core infrastructure that supports manufacturing and industrial operations.

Security 795
article thumbnail

Top 5 Security Trends for CIOs

CIO

Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins. Securing the software supply chain The Log4j vulnerability that reared its ugly head in late 2021 showed a bright light on the problem of software supply chain security.

Security 794
article thumbnail

Whether your technology is new or old, lifecycle management is key

CIO

Business needs first, then the lifecycle management program Your infrastructure lifecycle management program should be aligned with your organization’s growth roadmap. This will involve comprehensive and proactive infrastructure management. Security patches stop at least six months before an asset reaches its end of life.

article thumbnail

DIY cloud cost management: The strategic case for building your own tools

CIO

Cloud cost management remains a critical CIO priority. For CIOs who may need to customize their cloud cost information streams or manage a complex cloud estate, do-it-yourself cloud cost management may be the way to go. And that’s all before considering the need to fuel new AI initiatives , which can push cloud costs up further.