article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

As the end of 2023 approaches, it becomes imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken. Thankfully, as new dangers arise, we also see the emergence of groundbreaking technologies that can help us combat them.

article thumbnail

Cybersecurity e NIS2: come si muovono i CIO per dormire sonni (un po’) più tranquilli

CIO

La cybersecurity toglie il sonno ai CIO? Sicuramente la grande maggioranza dei Chief Information Officer definisce “priorità numero uno” la sicurezza dei sistemi IT aziendali. La cybersecurity è il primo tema per tutte le aziende e, per noi che operiamo nella sanità, lo è ancora di più.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Lookout sells its consumer cybersecurity business to F-Secure for $223M and goes all-in on the enterprise

TechCrunch

Lookout’s long-running transition to becoming an enterprise security company is all but complete, revealing today that it’s selling its consumer mobile security business to Finland’s F-Secure in a deal valued at around $223 million. ” For F-Secure, the deal gives it a stronger foothold in the U.S.

article thumbnail

Spin Technology raises $16M to protect SaaS apps against attacks

TechCrunch

Spin Technology , a data protection software vendor catering to enterprise clientele, today announced that it raised $16 million in a Series A round led by Blueprint Equity with participation from Santa Barbara Venture Partners and Blu Venture Investors. Image Credits: Spin Technology. Cybersecurity VC funding surged to a record $11.5

article thumbnail

Top 5 Security Trends for CIOs

CIO

Explosive technology innovations. Generational shifts in technological expectations. Cybersecurity cannot stand still, or the waves of innovation will overrun the shores. Some of these components have professional teams that test and maintain them, releasing security patches as needed. The post-pandemic reality.

Trends 317
article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

Wireless 246
article thumbnail

Cybersecurity Snapshot: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto

Tenable

1 - Using AI securely: Global cyber agencies publish new guide Is your organization – like many others – aggressively adopting artificial intelligence to boost operational efficiency? If so, you might want to check out a new guide published this week about how businesses can use AI securely.