article thumbnail

Skilled IT pay defined by volatility, security, and AI

CIO

This volatility can make it hard for IT workers to decide where to focus their career development efforts, but there are at least some areas of stability in the market: despite all other changes in pay premiums, workers with AI skills and security certifications continued to reap rich rewards.

Security 846
article thumbnail

Where do IT leaders stand on securing the mainframe?

CIO

This means the security of the mainframe is absolutely essential. And as new methodologies like DevOps, the increasing adoption of open source, and the shift to hybrid cloud solutions continue to trend, mainframe security vulnerabilities become a serious threat. Read on to learn their perspective on mainframe security.

Security 778
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is your print environment secure? Here’s why it should be your 2024 priority

CIO

For its 2023 Security Priorities report, Foundry surveyed 790 IT security workers to understand their projects and priorities. Printers are often not subject to the rigorous security measures routinely applied to computing devices; for example, complex passwords and rigorous patching and software update regimes.

Security 697
article thumbnail

Why IT leaders are putting more business spin on security spend

CIO

Gartner projects that spending on information security and risk management products and services will grow 11.3% To better focus security spend, some chief information security officers (CISOs) are shifting their risk assessments from IT systems to the data, applications, and processes that keep the business going.

Security 697
article thumbnail

What Regulations Will Impact Sustainability Comms in 2024?

Securities and Exchange Commission (SEC) Climate disclosure rules The European Commission’s Green Claims Directive California’s passing of SB 253 and SB 261 The impact of Capricorn season signaling on sustainability and social impact communication is also unmistakable, particularly as it relates to public and private reporting.

article thumbnail

5 tips for securing your remote workspace

CIO

Security professionals must adapt controls to a world where the perimeter is distributed, and users can log into corporate resources from any network and any device. There are a range of tools that security teams can use to protect users and devices. However, for IT teams changing working models represent a challenge.

Security 662
article thumbnail

3 business benefits of stronger security using Zero Trust principles

CIO

Historically, these weren’t designed with security in mind. OT assets are highly vulnerable to attack because they don’t have built-in security, traffic isn’t encrypted and there’s low visibility into their functioning. Security is paramount for the core infrastructure that supports manufacturing and industrial operations.

Security 793