article thumbnail

How to minimize remote access cyber security threats in 2024

CIO

Organizations have shifted to remote desktop work environments at an increasing speed since then – simultaneously expanding their attack surface and exposing themselves to greater cybersecurity threats. Given that threat actors exploit critical vulnerabilities within mere hours of publication, this poses a serious security risk for companies.

article thumbnail

How to Build Security and Resilience into Your Digital Transformation

CIO

Cyber risk is increasingly a top executive priority, due in large part to the rising number of unplanned outages, driven by the increasingly sophisticated cyberattacks and widening skills gap. In addition, Kyndryl is no longer “biased” toward any vendor, their technologies, or toolsets. Find more about it here. [1] Cloud Management

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The new CIO mandate: Selling AI to employees

CIO

But 45% also said they feared that AI will make their work less relevant to their employers, and 43% said they fear the loss of their jobs due to AI. Good CIOs will have a vision of the tech skills their organizations will need in the next three years or so, he adds. They need to have a culture of experimentation.”

article thumbnail

Thoma Bravo buys cybersecurity vendor Proofpoint for $12.3B in cash

TechCrunch

More M&A activity is underway in the red-hot field of cybersecurity. In the latest development, private equity giant Thoma Bravo is buying Proofpoint , the SaaS security vendor, for $12.3 Thoma Bravo has tapped into that trend, as a significant acquirer of security businesses over the years. billion in cash.

.Net 254
article thumbnail

What the Digital Operational Resilience Act means for you

CIO

Every business in some form or another is looking to adopt and integrate emerging technologies—whether that’s artificial intelligence, hybrid cloud architectures, or advanced data analytics—to help achieve a competitive edge and reach key operational goals. But what exactly does this policy mean for IT security? What is DORA?

article thumbnail

Atos contemplates fire sale as break-up plan falters

CIO

Negotiations over the sale of its legacy infrastructure services business are dragging on, and the company is contemplating the sale of more profitable activities such as its big data and security business to meet debt repayment obligations. billion loan, which it will have to repay by January 2025 at the latest. billion and €1.8

article thumbnail

Start your zero-trust journey with ZTNA over VPN

CIO

Zero trust is a cybersecurity framework that assumes that no user should be automatically trusted. By 2025, Gartner analysts predict that 60% of organizations 1 will be adopting zero-trust principles. ZTNA enables work-from-anywhere (WFA) employees to securely access applications.