Remove Healthcare Remove Security Remove Weak Development Team
article thumbnail

Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates

Tenable

Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards. Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips.

article thumbnail

For startups, trustworthy security means going above and beyond compliance standards

TechCrunch

Oren Yunger is an investor at GGV Capital , where he leads the cybersecurity vertical and drives investments in enterprise IT, data infrastructure, and developer tools. He was previously chief information security officer at a SaaS company and a public financial institution. More posts by this contributor.

Security 345
article thumbnail

The ‘Great IT Rebrand’: Restructuring IT for business success

CIO

Simultaneously, the monolithic IT organization was deconstructed into subgroups providing PC, cloud, infrastructure, security, and data services to the larger enterprise with associated solution leaders closely aligned to core business functions.

Security 202
article thumbnail

CIO hiring on the rise: How to land a top tech exec role in 2025

CIO

Overall, successful CIOs in 2025 will need to balance technical expertise with business acumen, leadership, and a focus on data, AI, cybersecurity, and M&A integration. AI adoption, IT outsourcing, and cybersecurity risks are fundamentally reshaping expectations. Cybersecurity is also a huge focus for many organizations.

article thumbnail

Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources

Tenable

Plus, OWASP is offering guidance about deepfakes and AI security. Those are three security measures cyber teams should proactively take in response to an ongoing and “large scale” email spear-phishing campaign targeting victims with malicious RDP files , according to the U.S. Block transmission of RDP files via email.

article thumbnail

3 promises every CIO should keep in 2025

CIO

According to Leon Roberge, CIO for Toshiba America Business Solutions and Toshiba Global Commerce Solutions, technology leaders should become more visible to the business and lead by example to their teams. Fernandes says his team has made it a point to only invest where the business also invests to avoid a black hole of IT spending.

article thumbnail

As mainframe application development grows, so does the security risk

CIO

Mainframe systems process a vast amount of vital transactions daily—that includes everything from the swipe of a credit card at the grocery store to purchasing an airline ticket online or accessing sensitive healthcare information. Once hackers find their way into the mainframe, it’s easy for it to go unnoticed.