Remove Globalization Remove Loss Remove Security Remove Technology
article thumbnail

Is your print environment secure? Here’s why it should be your 2024 priority

CIO

For its 2023 Security Priorities report, Foundry surveyed 790 IT security workers to understand their projects and priorities. The adversaries, at least for now, have the upper hand on many global organisations,” the report concluded. It found a worrying gulf between CISOs’ and CIOs’ concerns about printing security.

Security 697
article thumbnail

Aligning security and business strategies

CIO

By Sean Duca, vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks Some economists predict that we could soon face a global recession. During the 2008–2009 Global Financial Crisis (GFC) and subsequent recession, researchers noted that cybercrime rates increased dramatically.

Security 661
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

More connected, less secure: Addressing IoT and OT threats to the enterprise

CIO

By 2027, the global number of connected IoT devices is projected to exceed 29 billion, a significant increase from the 16.7 It also introduces new security challenges that demand our attention, especially as IoT is integrated into operational technology (OT) environments. billion devices reported in 2023.

Security 813
article thumbnail

Operational technology systems require a robust Zero Trust strategy in 2024

CIO

Cyberattacks on operational technology (OT) systems are rapidly rising. The good news is that a Zero Trust approach can go a long way toward helping organizations take back control and develop a more robust security posture. million people – and finding people with both security and OT knowledge is even more difficult.

article thumbnail

What you need to know about Okta’s security breach

CIO

On October 20, 2023, Okta Security identified adversarial activity that used a stolen credential to gain access to the company’s support case management system. Unauthorized access to user accounts and sensitive information becomes a significant concern, leading to potential data breaches, financial loss, and unauthorized activity.

Security 898
article thumbnail

Driving Customer Loyalty with Secure and Modern Apps

CIO

It’s completely intuitive, allows me to perform most tasks in less than 3 clicks, has all the functions that I need to perform banking on-the-go, is constantly updated with new features, comes with great performance and stability and most of all is very secure. Today its offerings include deliveries, mobility, financial services among others.

Security 615
article thumbnail

Why IT leaders are putting more business spin on security spend

CIO

Gartner projects that spending on information security and risk management products and services will grow 11.3% To better focus security spend, some chief information security officers (CISOs) are shifting their risk assessments from IT systems to the data, applications, and processes that keep the business going.

Security 697