Remove Authentication Remove Systems Review Remove Technical Review
article thumbnail

IT leaders: check out how 2D barcodes and RFID are reinventing retail

CIO

The retail landscape has undergone massive shifts in recent years to adopt self-checkout systems. Some industry experts believe the pull-back is only temporary, and the future for self-checkout is bright — as soon as new technologies begin to be deployed on a large scale. But is this the beginning of the end for self-checkouts?

Retail 328
article thumbnail

How MemorialCare confronts evolving risks along its modernization journey

CIO

For Kevin Torres, trying to modernize patient care while balancing considerable cybersecurity risks at MemorialCare, the integrated nonprofit health system based in Southern California, is a major challenge. When we looked at this technology, we quickly realized we didn’t have a clear line of sight to all the connected devices,” he says. “We

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What you need to know about Okta’s security breach

CIO

On October 20, 2023, Okta Security identified adversarial activity that used a stolen credential to gain access to the company’s support case management system. Once inside the system, the hacker gained access to files uploaded by Okta customers using valid session tokens from recent support cases.

article thumbnail

Vyrill, winner of the TC Early Stage Pitch-Off, helps brands discover and leverage user-generated video reviews

TechCrunch

Vyrill helps brands discover and leverage video reviews created by authentic customers and users. The judges were impressed with Vyrill’s novel approach and innovative technology around discovering and filtering relevant videos. This is a struggle for companies of every size.

Video 248
article thumbnail

How to minimize remote access cyber security threats in 2024

CIO

Cloud is the dominant attack surface through which these critical exposures are accessed, due to its operational efficiency and pervasiveness across industries. Interestingly enough, high-tech companies were also among the top organizations targeted by threat actors. Attack premeditation is another vital way to secure your systems.

article thumbnail

Deepfakes are a real threat to India’s FSI sector, say tech leaders

CIO

While Artificial Intelligence has evolved in hyper speed –from a simple algorithm to a sophisticated system, deepfakes have emerged as one its more chaotic offerings. Playing by the rules Public faith in technologies cannot be established without valid foundation. There was a time we lived by the adage – seeing is believing.

article thumbnail

Don’t gamble with your identity verification practices

CIO

Earlier this year, I wrote about the importance of organizations reviewing their password management strategies. According to a Reuters report, these ransomware bandits also breached the systems of several other companies operating in manufacturing, retail, and technology. Déjà vu can suck sometimes.