article thumbnail

3 business benefits of stronger security using Zero Trust principles

CIO

Historically, these weren’t designed with security in mind. OT assets are highly vulnerable to attack because they don’t have built-in security, traffic isn’t encrypted and there’s low visibility into their functioning. Security is paramount for the core infrastructure that supports manufacturing and industrial operations.

Security 793
article thumbnail

Is your print environment secure? Here’s why it should be your 2024 priority

CIO

For its 2023 Security Priorities report, Foundry surveyed 790 IT security workers to understand their projects and priorities. Printers are often not subject to the rigorous security measures routinely applied to computing devices; for example, complex passwords and rigorous patching and software update regimes.

Security 697
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

PCI DSS version 4.0: Is your payment card data security program ready?

CIO

The numerous new attack vectors being used by threat actors to obtain payment card data underscores the increasing necessity of compliance with the Payment Card Industry Data Security Standard (PCI DSS). and remain compliant long-term, while continually strengthening their overall security stance. It is also a high-value target.

Security 798
article thumbnail

Generative AI: 5 enterprise predictions for AI and security — for 2023, 2024, and beyond

CIO

Zscaler Enterprises will work to secure AI/ML applications to stay ahead of risk Our research also found that as enterprises adopt AI/ML tools, subsequent transactions undergo significant scrutiny. The data privacy and security risks of AI applications themselves Not all AI applications are created equal.

Security 835
article thumbnail

Implications of generative AI for enterprise security

CIO

The use of AI presents significant issues around sensitive data loss, and compliance. As it stands today, most Generative AI tools do not have concrete data security policies for user-provided data. Large learning models (LLMs) that back these AI tools require storage of that data to intelligently respond to subsequent prompts.

Security 779
article thumbnail

What you need to know about Okta’s security breach

CIO

On October 20, 2023, Okta Security identified adversarial activity that used a stolen credential to gain access to the company’s support case management system. Unauthorized access to user accounts and sensitive information becomes a significant concern, leading to potential data breaches, financial loss, and unauthorized activity.

Security 898
article thumbnail

More connected, less secure: Addressing IoT and OT threats to the enterprise

CIO

It also introduces new security challenges that demand our attention, especially as IoT is integrated into operational technology (OT) environments. 6 IoT vulnerabilities to watch out for Security risks are a significant concern for businesses using LoT and OT technology.

Security 813