Remove Security Remove Survey Remove Technical Review Remove Vendor Management
article thumbnail

Weighing risk and reward with gen AI vendor selection

CIO

According to an O’Reilly survey released late last month, 23% of companies are using one of OpenAI’s models. Putting aside the fact this is an astronomically high adoption rate for a brand new technology, it’s also an indicator of how risky this space is. Entire businesses have been built on top of OpenAI and its APIs.

article thumbnail

The biggest enterprise technology M&A deals of the year

CIO

Technology and telecommunications deals accounted for more than one-fifth of that, according to Shearman & Sterling. Keeping on top of activity in this area can help your company make the most of emerging opportunities and steer clear of issues that often arise when vendors combine. M&A volume climbed from $3.26

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

5 ways to maximize your cloud investment

CIO

Be strategic with reserve pricing Reserve pricing for cloud services can reduce resource usage costs by as much as 70%, says David McKee, who in his role as fractional CTO, tech founder, and digital twins thought leader at Counterpoint Technologies acts as a part-time CTO for nine companies in the US and Europe. That helps me plan.”

Cloud 278
article thumbnail

Cybersecurity Snapshot: CIS Guide Outlines How To Attain an Affordable Cyber Hygiene Foundation

Tenable

The Center for Internet Security unpacks how to establish foundational cyber hygiene at a reasonable cost. Plus, the Cyber Safety Review Board issues urgent security recommendations on its Lapsus$ report – and announces it’ll next delve into cloud security. Moreover, are humans or AI better at crafting phishing emails?

article thumbnail

Cybersecurity Mesh – Key Considerations before Adoption & Implementation

Trigent

Incidents of cyberattacks continue to jeopardize data security. Not surprisingly, then, enterprises are now focusing on strengthening cybersecurity. A Gartner survey reports: “ With the opening of new attack surfaces due to the shift to remote work, cybersecurity spending continues to increase.

article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

It was at around this time last year that the discovery of the zero-day Log4Shell vulnerability in the ubiquitous Log4j open source component sent shockwaves through the worlds of IT and cybersecurity. . 2 - OWASP’s top 10 CI/CD security risks. For more information: “ Implementing Phishing-resistent MFA ” (U.S.

article thumbnail

From Hype to Hope: Key Lessons on AI in Security, Innersource, and the Evolving Threat Landscape

Coveros

2023 was a year of relentless evolution in the cybersecurity landscape. As the attack surface expanded with emerging technologies and interconnected systems, so did the sophistication and frequency of cyber threats. No review of 2023 would be complete without mentioning the explosion of AI into the public eye, like ChatGPT and Copilot.