Remove Information Remove IT Remove Loss Remove Management
article thumbnail

CIOs are worried about the informal rise of generative AI in the enterprise

CIO

Organizations are seeing a dramatic rise in informal adoption of gen AI – tools and platforms used without official sanctioning. A CISO at a major marketing software firm worried about this explicitly, stating, “The real risk is that you have unintentional data leakage of confidential information. Privacy leaks?

article thumbnail

Prioritizing AI? Don’t shortchange IT fundamentals

CIO

Fundamentals like security, cost control, identity management, container sprawl, data management, and hardware refreshes remain key strategic areas for CIOs to deal with. How do you achieve data loss prevention when you’re telling your AI to go suck up all this data and reuse it?”

IT 895
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is your print environment secure? Here’s why it should be your 2024 priority

CIO

Quocirca acknowledged many instances of data loss through unsecured printing were simply the result of printed output falling into the wrong hands. For its 2023 Security Priorities report, Foundry surveyed 790 IT security workers to understand their projects and priorities. Its conclusions were less than optimal.

Security 697
article thumbnail

Customer centricity: How Mashreq Bank is placing its customers at the forefront of its operations.

CIO

Mohamed Salah Abdel Hamid Abdel Razek, Senior Executive Vice President and Group Head of Tech, Transformation & Information, Mashreq explains how the bank is integrating advanced technologies and expanding its digital footprint. The unified solution simplifies IT infrastructure management, enhancing overall efficiency.

Banking 747
article thumbnail

5 strategies for boosting endpoint management

CIO

Business email compromise attacks Another prevalent form of attack is business email compromise (BEC), where criminals send an email impersonating a trusted business contact, such as a company CEO, an HR director, or a purchasing manager. Lacking that decisive boundary, the work of security teams has changed. Those days are over.

article thumbnail

4 perils of being an IT pioneer

CIO

Proponents of early technology adoption further argue that it enables companies to build informal relationships with leading technology providers, develop deeper understanding of the latest technologies, and lure better talent. The speed at which enterprises adopt emerging technology is widely acknowledged as a key driver of success.

IT 656
article thumbnail

Major wins and losses in GOVCON – FedSavvy edition April 2024

FedSavvy

This blog summarizes some of the significant contract wins and losses that have shaped the current federal contracting landscape today. Keep reading for some highlighted wins and losses in the GOVCON space. Air Force’s Command and Control Incident Management Emergency Response Application (C2IMERA) at Kessel Run.

Loss 130