Remove Security Remove Survey Remove Systems Review
article thumbnail

Case in point: taking stock of the CrowdStrike outages

CIO

In response to the outage, 84% of companies are either considering diversifying their software and service providers, or are already doing so, according to a survey by Adaptavist released in late January. Akamai was not itself a CrowdStrike customer, but does use similar services from outside vendors to help protect its systems.

article thumbnail

7 signs it’s time to modernize your IT systems

CIO

The bad news, however, is that IT system modernization requires significant financial and time investments. On the other hand, there are also many cases of enterprises hanging onto obsolete systems that have long-since exceeded their original ROI. Kar advises taking a measured approach to system modernization.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dulling the impact of AI-fueled cyber threats with AI

CIO

But when it comes to cybersecurity, AI has become a double-edged sword. While poised to fortify the security posture of organizations, it has also changed the nature of cyberattacks. While LLMs are trained on large amounts of information, they have expanded the attack surface for businesses.

article thumbnail

Securing Remote OT Operations:

Palo Alto Networks

However, these advancements come with heightened security risks. This expanded attack surface has made OT systems a prime target for cyber threats, underscoring the need for a robust security framework tailored to remote OT environments. This approach minimizes exposure, limiting each users access to essential systems only.

Security 111
article thumbnail

Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates

Tenable

Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards. Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips.

article thumbnail

Cybersecurity Snapshot: AI Security Roundup: Best Practices, Research and Insights

Tenable

In this special edition, we’ve selected the most-read Cybersecurity Snapshot items about AI security this year. ICYMI the first time around, check out this roundup of data points, tips and trends about secure AI deployment; shadow AI; AI threat detection; AI risks; AI governance; AI cybersecurity uses — and more.

article thumbnail

AI market evolution: Data and infrastructure transformation through AI

CIO

research firm Vanson Bourne to survey 650 global IT, DevOps, and Platform Engineering decision-makers on their enterprise AI strategy. However, many face challenges finding the right IT environment and AI applications for their business due to a lack of established frameworks. Nutanix commissioned U.K.