article thumbnail

Endpoint security and the rise of Managed Device Services

CIO

Despite growing interest in “as a service” consumption models for everything from infrastructure to storage, most enterprises have continued to procure, maintain, and manage endpoint devices in-house. In its place, managed solutions are gaining traction. Security is a key driver.

Security 563
article thumbnail

Secure cloud fabric: Enhancing data management and AI development for the federal government

CIO

In recent years, government agencies have increasingly turned to cloud computing to manage vast amounts of data and streamline operations. While cloud technology has many benefits, it also poses security risks, especially when it comes to protecting sensitive information.

Security 600
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Boomi burnishes API management capabilities

CIO

Middleware vendor Boomi has bolstered its API management capabilities with new products and acquisitions. The second product, Boomi DataDetective, offers a mechanism to classify data fields, track where data is being moved, and protect personal information. The launch version of the framework comes with four agents.

article thumbnail

LayerX Security Raises $24M for its Browser Security Platform, Enabling Employees to Work Securely from Any Browser, Anywhere

CIO

LayerX , pioneer of the LayerX Browser Security platform, today announced $24 million in Series A funding led by Glilot+, the early-growth fund of Glilot Capital Partners, with participation from Dell Technologies Capital and other investors.

Security 369
article thumbnail

CIOs are worried about the informal rise of generative AI in the enterprise

CIO

Organizations are seeing a dramatic rise in informal adoption of gen AI – tools and platforms used without official sanctioning. He also identified technologies to secure the AI engines and workflows used by the company (or its 3 rd party partners) that support creative content development. Here’s what I learned. Privacy leaks?

article thumbnail

10 essential tips for bolstering cloud security in your business

CIO

This makes it more critical than ever to adopt strong security measures to protect sensitive information and infrastructure. However, while cloud computing offers benefits like improved efficiency, scalability, and accessibility, it poses new security challenges.

Security 795
article thumbnail

What you need to know about Okta’s security breach

CIO

On October 20, 2023, Okta Security identified adversarial activity that used a stolen credential to gain access to the company’s support case management system. The recent compromise of a leading IdP provider isn’t the first time adversaries gained access to critical customer information, and it won’t be the last.

Security 847