article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

As the end of 2023 approaches, it becomes imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken. Our interconnected online world is no longer separate from our lives, businesses, or our global economy.

article thumbnail

Time to digitize all landlines, once and for all (of us)

CIO

Despite the inconvenience of change, this should be welcome news, especially for CIOs as well as building owners and local authorities who are responsible for the validity of cash registers and critical systems supporting elevators, fire, and burglar alarms as well as even FAX lines, in some industries like healthcare.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What COVID-19 Response Strategies Tell Us About the Business-Cybersecurity Disconnect

Tenable

As organizations around the world raced to develop strategies to respond to the COVID-19 pandemic, an independent business risk study shows cybersecurity leaders were largely left out. Yet, many cybersecurity leaders are still struggling to get a seat at the table. . COVID-related scams were the No.

article thumbnail

8 data strategy mistakes to avoid

CIO

How enterprises gather, store, cleanse, access, and secure their data can be a major factor in their ability to meet corporate goals. Organizations often get services and applications up and running without having put stewardship in place,” says Marc Johnson, CISO and senior advisor at Impact Advisors, a healthcare management consulting firm.

Strategy 340
article thumbnail

WIIT: Enabling Enterprises to Realize the Full Potential of the Cloud While Bypassing its Complexity

CIO

Serving leaders in the energy, fashion, financial services, food, healthcare, manufacturing, media, pharmaceutical, professional services, retail, and telecommunications industries, WIIT works with organizations that have stringent business continuity needs, mission-critical applications, and crucial data security and sovereignty requirements.

Cloud 246
article thumbnail

Architect defense-in-depth security for generative AI applications using the OWASP Top 10 for LLMs

AWS Machine Learning - AI

Many customers are looking for guidance on how to manage security, privacy, and compliance as they develop generative AI applications. We first delve into the vulnerabilities, threats, and risks that arise from the implementation, deployment, and use of LLM solutions, and provide guidance on how to start innovating with security in mind.

article thumbnail

How strategic partnerships are the key to AI-driven innovation

CIO

Likely, they will need to exploit all the latest tools provided by cloud and data partner ecosystems to manage, govern, scale, analyze, and secure their data before they can deliver these types of solutions. This can be particularly challenging in heavily regulated industries such as healthcare, insurance, and finance.