article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

This analysis isn’t just a statistical exercise but a crucial necessity in our interconnected world, where the security of our digital infrastructure is intertwined with our physical safety and economic stability. Here are some practical steps that organizations can take to significantly enhance their security posture.

Security 721
article thumbnail

When your AI chatbots mess up

CIO

Last spring, a judge sanctioned a law firm for citing judicial opinions with fake quotes and citations in a legal brief that a chatbot had drafted. Chatbots are almost like a living organism in that they are continually iterating, and as they ingest new data,” says Steven Smith, chief security architect at Freshworks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Start your zero-trust journey with ZTNA over VPN

CIO

ZTNA improves security by performing user identity and device posture checks before granting the user or device explicit access to any application. ZTNA enables work-from-anywhere (WFA) employees to securely access applications. This makes it much more difficult for a cyberattacker to obtain and maintain access to an application.

Briefing 538
article thumbnail

Siemens Mobility scales RPA by empowering employees

CIO

Bock’s team has created a community where everyone is required to document their processes with a brief description about who was involved and what the results were for the business. “Under our guidance they’re pretty much self-responsible for the RPA processes,” he says.

Briefing 666
article thumbnail

An expanded attack surface: The cybersecurity challenges of managing a hybrid workforce

CIO

At a recent CIO New Zealand roundtable event in Auckland, supported by Palo Alto Networks and Vodafone New Zealand, senior technology executives from organisations across Aotearoa discussed the challenge of keeping security front of mind when the workforce is dispersed. The other key aspect is implementing zero trust networking.

article thumbnail

6 legal ‘gotchas’ that could sink your CIO career

CIO

CIOs have been sued for allegedly accepting kickbacks from companies that their home companies had contracted with, and for failing to secure data that resulted in a major data breach. Make corporate security your personal business When CIOs are sued or fired, it’s often because of a significant cybersecurity breach.

article thumbnail

How Data Privacy and Sovereignty Impact Business

CIO

More countries are adopting laws designed to protect the privacy of citizens and local entities by defining how data can be securely collected, stored, and used. Alongside protecting the way in which personal data is secured and used, many data sovereignty laws also restrict where data can go.

Business 540