article thumbnail

7 tough IT security discussions every IT leader must have

CIO

Talk may be cheap, but when it comes to IT security, strategic conversations with colleagues, business partners, and other relevant parties can be priceless. Ongoing IT security strategy conversations should address the organization’s cyber risk and arrive at strategic objectives, Albrecht says. What would be the next steps?

Security 888
article thumbnail

Generative AI: Balancing security with innovation

CIO

Slowing the progression of AI may be impossible, but approaching AI in a thoughtful, intentional, and security-focused manner is imperative for fintech companies to nullify potential threats and maintain customer trust while still taking advantage of its power.

Security 485
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Improving visibility and security in hybrid cloud environments

CIO

When it comes to keeping our digital world secure, there’s a saying that really hits home: “ You can’t protect what you can’t see.” The risks and impact of inadequate visibility in multicloud environments In a multicloud environment, not having proper visibility can have serious consequences for protecting assets and ensuring security.

Security 612
article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO

Over 100,00 organizations are expected to be impacted by Network and Information Security Directive (NIS2) cybersecurity standards that European Union (EU) member states must implement by October 2024. [i] This concept of least-privilege access is fundamental to Zero Trust Security practices.

Security 522
article thumbnail

With greater personalisation comes greater security

CIO

This has reinforced concerns around data privacy and security. In the midst of message and content overload, consumers demand personal, in the moment, experiences that feel safe and secure. For retailers and brands, striking a balance between personalisation and security is the ultimate challenge. It is all encrypted.

Security 585
article thumbnail

The Top Cloud Security Threat Comes from Within

CIO

One of the biggest cloud security threats your company faces isn’t malicious. Accidental misconfigurations pose one of the leading security vulnerabilities IT organizations contend with in the cloud. This article explores some of the most common misconfiguration risks and how you can address them to tighten up cloud security.

Security 879
article thumbnail

4 tips to improve employee experiences while maintaining security and governance

CIO

As more individuals use browser-based apps to get their work done, IT leaders need to provide seamless access to corporate apps and tools while minimizing security risks. How can organizations improve employee experiences without compromising necessary governance and security controls?

Security 737