article thumbnail

3 data security disciplines to drive AI innovation

CIO

Unsurprisingly, the more data that is stored, accessed, and processed across different cloud architectures that typically also span different geographic jurisdictions, the more security and privacy risks arise. Securing from AI : Just like most new technologies, artificial intelligence is a double-edged sword.

article thumbnail

5 tips for securing your remote workspace

CIO

Security professionals must adapt controls to a world where the perimeter is distributed, and users can log into corporate resources from any network and any device. There are a range of tools that security teams can use to protect users and devices. The overriding obligation remains with IT to ensure the security of users.

Security 662
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 business benefits of stronger security using Zero Trust principles

CIO

Historically, these weren’t designed with security in mind. OT assets are highly vulnerable to attack because they don’t have built-in security, traffic isn’t encrypted and there’s low visibility into their functioning. Security is paramount for the core infrastructure that supports manufacturing and industrial operations.

Security 793
article thumbnail

Bringing together DevOps and mainframe security

CIO

Mainframe developers face unique challenges when ensuring their IT environments are secure. Tools like open source have helped give a boost to software development, but it also means security needs to always be top of mind. Chief among those challenges? What’s the state of DevSecOps today?

Security 808
article thumbnail

What Regulations Will Impact Sustainability Comms in 2024?

Securities and Exchange Commission (SEC) Climate disclosure rules The European Commission’s Green Claims Directive California’s passing of SB 253 and SB 261 The impact of Capricorn season signaling on sustainability and social impact communication is also unmistakable, particularly as it relates to public and private reporting.

article thumbnail

Navigating Cloud Cost Complexity and Security

CIO

In the ever-evolving landscape of cloud computing, today’s leading enterprises are seeking ways to optimize their operations and enhance their security measures. Cloud costs and security are two critical aspects that every organization must carefully manage, and they are more closely intertwined than you might think.

Security 813
article thumbnail

Endpoint security and the rise of Managed Device Services

CIO

But as the security threat landscape becomes more complicated, and hybrid and remote working models take root at scale, IT leaders are questioning this traditional approach to device management. Security is a key driver. In this environment, endpoint security becomes increasingly important.

Security 616