Remove Authentication Remove Research Remove Technical Advisors
article thumbnail

Marsh McLennan IT reorg lays foundation for gen AI

CIO

One of the world’s largest risk advisors and insurance brokers launched a digital transformation five years ago to better enable its clients to navigate the political, social, and economic waves rising in the digital information age. But the CIO had several key objectives to meet before launching the transformation.

article thumbnail

Marsh McLellan IT reorg lays foundation for gen AI

CIO

One of the world’s largest risk advisors and insurance brokers launched a digital transformation five years ago to better enable its clients to navigate the political, social, and economic waves rising in the digital information age. But the CIO had several key objectives to meet before launching the transformation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Solving the tech debt problem while staying competitive and secure

CIO

Interestingly, despite the significance of technical debt as a cost concern and an inhibitor to improving security and implementing innovation (like AI), it ranks much lower on the list of immediate priorities for many organizations (20%). For CIOs, balancing technical debt with other strategic priorities is a constant challenge.

Security 148
article thumbnail

Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates

Tenable

We found that in many organisations, the CISO (or equivalent role) thought that the Board was accountable, whilst the Board thought it was the CISO,” reads a blog about the research titled “ How to talk to board members about cyber. ” Aim to provide a holistic view, and avoid using technical jargon. s cyber agency has found.

article thumbnail

These Services Shall Not Pass: Abusing Service Tags to Bypass Azure Firewall Rules (Customer Action Required)

Tenable

Azure customers whose firewall rules rely on Azure Service Tags, pay attention: You could be at risk due to a vulnerability detected by Tenable Research. Tenable Research has discovered a vulnerability in Azure that allows an attacker to bypass firewall rules based on Azure Service Tags by forging requests from trusted services.

Firewall 144
article thumbnail

15 ways to grow as an IT leader in 2024

CIO

As workers at all levels put together their development plans for 2024, IT leaders, recruiters, researchers, and advisors share here what actions CIOs can take to advance their careers if they want to embrace a growth mindset. It’s not just talk or a label. It really has to relate to what you do,” she adds.

article thumbnail

CIOs listen up: either plan to manage fast-changing certificates, or fade away

CIO

It’s tempting to view certificates and machine identities as the nuts and bolts of your organization’s tech stack: critical but purely technical functions safely left to IT practitioners. Coleman Parkes research for automation vendor Venafi predicted that organizations with more than 10,000 employees will have as many as 1.3