article thumbnail

Banking on customer experience and security via technology-based innovation

CIO

Since then, automation has filled the gap in improving customer experience and security. Customer experience and security But as in most industries, customer expectations and security challenges continue to grow along with technological advances. Security and privacy.

Banking 617
article thumbnail

3 business benefits of stronger security using Zero Trust principles

CIO

Operational technology (OT) organizations face increasing challenges when it comes to cybersecurity. continues to roll out, the internet of things (IoT) is expanding, and manufacturing organizations are using the latest technologies to scale. Historically, these weren’t designed with security in mind. As Industry 4.0

Security 793
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How technology is enabling Melbourne Airport’s growth

CIO

Technology has a key element in that broader corporate strategy in that last year was the first time we embedded technology as part of our corporate scorecard. The team and I pulled together a technology strategy focused on enabling the corporate strategy.” All of that operational technology is supported by my team.”

article thumbnail

3 data security disciplines to drive AI innovation

CIO

Unsurprisingly, the more data that is stored, accessed, and processed across different cloud architectures that typically also span different geographic jurisdictions, the more security and privacy risks arise. Securing from AI : Just like most new technologies, artificial intelligence is a double-edged sword.

Security 747
article thumbnail

Bringing together DevOps and mainframe security

CIO

Mainframe developers face unique challenges when ensuring their IT environments are secure. Tools like open source have helped give a boost to software development, but it also means security needs to always be top of mind. Chief among those challenges? What’s the state of DevSecOps today?

Security 808
article thumbnail

5 tips for securing your remote workspace

CIO

Security professionals must adapt controls to a world where the perimeter is distributed, and users can log into corporate resources from any network and any device. There are a range of tools that security teams can use to protect users and devices. The overriding obligation remains with IT to ensure the security of users.

Security 662
article thumbnail

Top overlooked GenAI security risks for businesses

CIO

Many are under pressure to show that they are adopting these new technologies and not falling behind the competition. But adding these new capabilities to your tech stack comes with a host of security risks. Each generation of tools presents its own set of security challenges. This has significant implications for businesses.

Security 788