article thumbnail

Top 4 focus areas for securing your software supply chain

CIO

In today’s fast-paced software development landscape, managing and securing the software supply chain is crucial for delivering reliable and trusted software releases. For large companies especially, managing the secure use of 10+ technologies can be a nightmare without the right tools and processes in place.

Security 646
article thumbnail

Atos may sell national security activities to French government

CIO

billion) for the part of its business handling contracts vital to national security, but stops short of full nationalization of the company. billion for its entire big data and security division. Atos may have found a way to alleviate its ongoing debt problems: The French government has offered to pay up to €1 billion ($1.07

Security 611
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 data security disciplines to drive AI innovation

CIO

Unsurprisingly, the more data that is stored, accessed, and processed across different cloud architectures that typically also span different geographic jurisdictions, the more security and privacy risks arise. Securing from AI : Just like most new technologies, artificial intelligence is a double-edged sword.

Security 741
article thumbnail

Bringing together DevOps and mainframe security

CIO

Mainframe developers face unique challenges when ensuring their IT environments are secure. Tools like open source have helped give a boost to software development, but it also means security needs to always be top of mind. Chief among those challenges? What’s the state of DevSecOps today?

Security 804
article thumbnail

What Regulations Will Impact Sustainability Comms in 2024?

Securities and Exchange Commission (SEC) Climate disclosure rules The European Commission’s Green Claims Directive California’s passing of SB 253 and SB 261 The impact of Capricorn season signaling on sustainability and social impact communication is also unmistakable, particularly as it relates to public and private reporting.

article thumbnail

5 tips for securing your remote workspace

CIO

Security professionals must adapt controls to a world where the perimeter is distributed, and users can log into corporate resources from any network and any device. There are a range of tools that security teams can use to protect users and devices. The overriding obligation remains with IT to ensure the security of users.

Security 658
article thumbnail

Navigating Cloud Cost Complexity and Security

CIO

In the ever-evolving landscape of cloud computing, today’s leading enterprises are seeking ways to optimize their operations and enhance their security measures. Cloud costs and security are two critical aspects that every organization must carefully manage, and they are more closely intertwined than you might think.

Security 810