article thumbnail

Prioritizing AI? Don’t shortchange IT fundamentals

CIO

Fundamentals like security, cost control, identity management, container sprawl, data management, and hardware refreshes remain key strategic areas for CIOs to deal with. Data due diligence Generative AI especially has particular implications for data security, Mann says. But it was.

article thumbnail

Cybersecurity Snapshot: If Recession Hits, Infosec Teams Expected to Suffer the Fewest Job Losses

Tenable

Find out why a study says cybersecurity pros will weather staff reductions better than all other employees. That’s according to the (ISC) 2 cybersecurity industry non-profit organization, which this week published the results of a survey of 1,000 C-level business executives from Germany, Japan, Singapore, the U.S. And much more!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The UK’s National Cyber Strategy 2022 – An Evolution

Palo Alto Networks

The UK Government has once again shifted the cyber discourse with the recent publication of the National Cyber Strategy 2022 , marking a significant change in how the government views cybersecurity and solidifying its position as a global cyber power. Building Resilience and Securing the Digital Ecosystem. A Whole of Society Approach.

article thumbnail

Digital pragmatism at Volvo means more control and less agile

CIO

As a result, many new car companies are created and competition increases, says Tobias Altehed, who leads Volvo Cars’ digital organization and sits on the company’s extended management team. We need to take greater responsibility for the development of our digital products and not act as an internal supplier to our business.”

Agile 314
article thumbnail

Modernizing Critical Infrastructure Requires Security Transformation

Palo Alto Networks

Furthermore, CI organizations are also anticipating a tighter regulatory landscape as evidenced by the Transportation Security Administration's cybersecurity mandate for owners and operators of pipelines. Securing today's CI and operational technology (OT) is paramount. Critical Infrastructure Are Highly Attractive Targets.

article thumbnail

From Solar Sunrise to Solar Winds: The Questionable Value of Two Decades of Cybersecurity Advice

Haft of the Spear

While the Ware Report of 1970 codified the foundations of the computer security discipline, it was the President’s Commission on Critical Infrastructure Protection report of 1997 that expanded those requirements into recommendations for both discrete entities as well as the nascent communities that were growing in and around the Internet.

Security 102
article thumbnail

Nigerian e-health pharmaceutical distribution startup DrugStoc secures $4.4 million Series A funding, embarks on expansion drive

TechCrunch

Chibuzo Opara and Adham Yehia, being all too familiar with the problems of poor pharmaceutical supply chains, are planning to widen the reach of DrugStoc, a e-health drug procurement platform that eliminates these challenges by linking drug companies with institutions such as hospitals and pharmacies, in Nigeria.