article thumbnail

Resilient data backup and recovery is critical to enterprise success

CIO

As businesses digitally transform and leverage technology such as artificial intelligence, the volume of data they rely on is increasing at an unprecedented pace. Irrespective of where data lives – public cloud, at the edge, or on-premises – secure backup and recovery is essential to any enterprise security strategy.

Backup 266
article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

As the end of 2023 approaches, it becomes imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken. Our interconnected online world is no longer separate from our lives, businesses, or our global economy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: GenAI Drives Broader Use of Artificial Intelligence Tech for Cyber

Tenable

Check out how organizations’ enthusiasm over generative AI is fueling artificial intelligence adoption for cybersecurity. In addition, learn about a new set of best practices for protecting cloud backups. Also, why boards of directors feel more comfortable with cybersecurity. Plus, how CISA plans to revamp the U.S.

article thumbnail

Cybersecurity Snapshot: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto

Tenable

Cyber agencies from multiple countries published a joint guide on using artificial intelligence safely. 1 - Using AI securely: Global cyber agencies publish new guide Is your organization – like many others – aggressively adopting artificial intelligence to boost operational efficiency? And much more!

article thumbnail

Cybersecurity Snapshot: NSA Picks Top Cloud Security Practices, while CNCF Looks at How Cloud Native Can Facilitate AI Adoption

Tenable

Check out the NSA’s 10 key best practices for securing cloud environments. 1 - Ten best practices for beefing up cloud security Looking for advice on boosting the security of your cloud environment? 1 - Ten best practices for beefing up cloud security Looking for advice on boosting the security of your cloud environment?

article thumbnail

When least privilege is the most important thing

CIO

In the ever-evolving realm of information security, the principle of Least Privilege stands out as the cornerstone of safeguarding sensitive data. However, this fundamental concept, emphasizing limited access to resources and information, has been progressively overlooked, placing our digital ecosystems at greater risk.

article thumbnail

Spin Technology raises $16M to protect SaaS apps against attacks

TechCrunch

Dontov says that the platform can detect ransomware across platforms including Google Workspace, Microsoft Office 365 and Salesforce, performing automatic risk assessments and backups and allowing users to create policies that dictate access management. Cybersecurity VC funding surged to a record $11.5 billion in 2021. ” .