Remove Authentication Remove Security Remove Technical Advisors
article thumbnail

Solving the tech debt problem while staying competitive and secure

CIO

Looking ahead to the next 12-18 months, two top priorities emerge for IT leaders: developing a strong business case for AI infrastructure spending (cited by 35% of respondents to IDC’s Future Enterprise Resiliency and Spending Survey, Wave 3 , March 2024) and increasing cyber resilience and security (34%).

Security 148
article thumbnail

Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates

Tenable

Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards. Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto

Tenable

1 - Using AI securely: Global cyber agencies publish new guide Is your organization – like many others – aggressively adopting artificial intelligence to boost operational efficiency? If so, you might want to check out a new guide published this week about how businesses can use AI securely.

article thumbnail

8 ways IT can help supercharge your sales team

CIO

Form a strong partnership Forming an effective IT-sales partnership requires embracing a startup mentality, even at large, long-established organizations, advises Amit Vashisht, assistant vice president at retirement services firm Jackson Enterprise Technology. Yet he also advises proceeding with caution.

article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

By Bob Gourley 2014 Guidance Software Federal Summit: Cybersecurity | E-Discovery | Enterprise Forensics. Recognized as a pioneer in the field of classified information protection, Mr. Bigman developed technical measures and procedures to manage the nation’s most sensitive secrets. Government. Register Now! Space is Limited.

article thumbnail

Scaling a medical device company: A CIO’s digital transformation journey

CIO

When I started at Novanta about five years ago, my first mission was to bring scalability to our Enterprise solutions, as well as developing a digital roadmap to modernize the technology footprint, reduce technical debt, and explore strategies to ensure that we’re growing at scale. They’re there to advise and help, which is huge.

Company 183
article thumbnail

CIOs listen up: either plan to manage fast-changing certificates, or fade away

CIO

It’s tempting to view certificates and machine identities as the nuts and bolts of your organization’s tech stack: critical but purely technical functions safely left to IT practitioners. One you start to bring compliance in, the CIO starts to take a little bit more notice as well.”