article thumbnail

Why CIOs back API governance to avoid tech sprawl

CIO

But APIs do more than support next-generation technologies — they already serve a foundational purpose within most enterprises. As enablers for the integration of data and business services across platforms, APIs are very aligned with current tech trends,” says Antonio Vázquez, CIO of software company Bizagi.

article thumbnail

RxAll grabs $3.15M to scale its drug checking and counterfeiting tech across Africa

TechCrunch

Some technologies have helped deal with this menace; for instance, radio frequency identification, which works by assigning serial numbers to containers of each product. More modern approaches are being adopted these days, which is the case of RxAll , a startup using deep technology to provide quality medication to patients.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to minimize remote access cyber security threats in 2024

CIO

Cloud is the dominant attack surface through which these critical exposures are accessed, due to its operational efficiency and pervasiveness across industries. Interestingly enough, high-tech companies were also among the top organizations targeted by threat actors. Address cloud misconfigurations head-on.

article thumbnail

Governance and Fighting the Curse of Complexity

CIO

Authentication. Throw in all the technical debt – and the cultural tendency (and often necessity) of building connections for backward compatibility. New systems, new technologies, new approaches will continue to increase IT complexity. The most powerful solution isn’t downloaded from a tech company’s site. Encryption.

article thumbnail

The cyber pandemic: AI deepfakes and the future of security and identity verification

CIO

In fact, Gartner estimates that by 2026, nearly one-third of enterprises will consider identity verification and authentication solutions unreliable due to AI-generated deepfakes. Then, you can develop a strategy that integrates advanced technologies to help you prevent (not just detect) them.

article thumbnail

Don’t gamble with your identity verification practices

CIO

Earlier this year, I wrote about the importance of organizations reviewing their password management strategies. According to a Reuters report, these ransomware bandits also breached the systems of several other companies operating in manufacturing, retail, and technology. Déjà vu can suck sometimes.

article thumbnail

What you need to know about Okta’s security breach

CIO

A DLP-like technology can be effective in preventing users from uploading files with sensitive data unknowingly. By diligently implementing the following measures and best practices, organizations can greatly fortify the safeguarding of identities and bolster the efficacy of their MFA deployment.