Remove Industry Remove Security Remove Software Review
article thumbnail

Case in point: taking stock of the CrowdStrike outages

CIO

Last summer, a faulty CrowdStrike software update took down millions of computers, caused billions in damages, and underscored that companies are still not able to manage third-party risks, or respond quickly and efficiently to disruptions. It was an interesting case study of global cyber impact, says Charles Clancy, CTO at Mitre.

article thumbnail

Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates

Tenable

Want to boost your software updates’ safety? Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards. Looking for help with shadow AI? To help prevent such episodes, U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cost, security, and flexibility: the business case for open source gen AI

CIO

The main commercial model, from OpenAI, was quicker and easier to deploy and more accurate right out of the box, but the open source alternatives offered security, flexibility, lower costs, and, with additional training, even better accuracy. Its possible to opt-out, but there are caveats. So we augment with open source, he says.

article thumbnail

Human firewalls: The first line of defense against cyber threats in 2025

CIO

Now that all the industry thought leaders have weighed in and published their predictions for what the cybersecurity landscape will look like in 2025, it seems that theres a clear consensus emerging: Both attacks and defense of devices and networks will increasingly be AI-driven as time goes by. What is a human firewall?

Firewall 148
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. All of these stats beg the question, “Do you know what’s in your software?”

article thumbnail

What is an IT consultant? Roles, types, salaries, and how to become one

CIO

This can involve assessing a companys IT infrastructure, including its computer systems, cybersecurity profile, software performance, and data and analytics operations, to help determine ways a business might better benefit from the technology it uses. Indeed lists various salaries for IT consultants.

article thumbnail

Have we reached the end of ‘too expensive’ for enterprise software?

CIO

Generative artificial intelligence ( genAI ) and in particular large language models ( LLMs ) are changing the way companies develop and deliver software. While useful, these tools offer diminishing value due to a lack of innovation or differentiation. This will fundamentally change both UI design and the way software is used.