article thumbnail

Endpoint security and the rise of Managed Device Services

CIO

Despite growing interest in “as a service” consumption models for everything from infrastructure to storage, most enterprises have continued to procure, maintain, and manage endpoint devices in-house. In its place, managed solutions are gaining traction. Security is a key driver.

Security 551
article thumbnail

Secure cloud fabric: Enhancing data management and AI development for the federal government

CIO

In recent years, government agencies have increasingly turned to cloud computing to manage vast amounts of data and streamline operations. While cloud technology has many benefits, it also poses security risks, especially when it comes to protecting sensitive information.

Security 575
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CIOs are worried about the informal rise of generative AI in the enterprise

CIO

Organizations are seeing a dramatic rise in informal adoption of gen AI – tools and platforms used without official sanctioning. He also identified technologies to secure the AI engines and workflows used by the company (or its 3 rd party partners) that support creative content development. Here’s what I learned. Privacy leaks?

article thumbnail

10 essential tips for bolstering cloud security in your business

CIO

This makes it more critical than ever to adopt strong security measures to protect sensitive information and infrastructure. However, while cloud computing offers benefits like improved efficiency, scalability, and accessibility, it poses new security challenges.

Security 780
article thumbnail

What you need to know about Okta’s security breach

CIO

On October 20, 2023, Okta Security identified adversarial activity that used a stolen credential to gain access to the company’s support case management system. The recent compromise of a leading IdP provider isn’t the first time adversaries gained access to critical customer information, and it won’t be the last.

Security 836
article thumbnail

3 business benefits of stronger security using Zero Trust principles

CIO

This connectivity maximizes efficiency, keeps critical infrastructure running, and gives the business new information and insights. Historically, these weren’t designed with security in mind. Security is paramount for the core infrastructure that supports manufacturing and industrial operations.

Security 747
article thumbnail

Skilled IT pay defined by volatility, security, and AI

CIO

This volatility can make it hard for IT workers to decide where to focus their career development efforts, but there are at least some areas of stability in the market: despite all other changes in pay premiums, workers with AI skills and security certifications continued to reap rich rewards.

Security 789