article thumbnail

Artificial Intelligence in Cybersecurity: Good or Evil?

CIO

As I reflect on the biggest technology innovations during my career―the Internet, smartphones, social media―a new breakthrough deserves a spot on that list. At the recent Six Five Summit , I had the pleasure of talking with Pat Moorhead about the impact of Generative AI on enterprise cybersecurity.

article thumbnail

IOWN and the Next Internet

CIO

We need a new generation of the Internet to address these obstacles – an Internet that is personal, functional, smart, inspires trust, and can be widely adopted by all. And it will do all of this while also significantly lowering Internet power consumption.

Internet 243
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why are cybersecurity asset management startups so hot right now?

TechCrunch

In the world of cybersecurity, you can’t secure something if you don’t know it’s there. Enter cybersecurity asset management, an admittedly unsexy fragment of the booming industry that investors have shown an ever-increasing appetite for over the past 18 months. Shawn Cherian. ”

Security 239
article thumbnail

3 business benefits of stronger security using Zero Trust principles

CIO

Operational technology (OT) organizations face increasing challenges when it comes to cybersecurity. continues to roll out, the internet of things (IoT) is expanding, and manufacturing organizations are using the latest technologies to scale. And stronger cybersecurity isn’t just a necessity; it also makes economic sense.

IoT 317
article thumbnail

Recovering from a Cyber Attack

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

If your organization stores data and is connected to the Internet, it is not a matter of “if” a cyber-security incident will happen, but “when.” It takes an organizational mindset which realizes that data privacy and security is a continuous, evolving process, as opposed to a “fire-and-forget” set of steps.

article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

Wireless 246
article thumbnail

How to minimize remote access cyber security threats in 2024

CIO

Organizations have shifted to remote desktop work environments at an increasing speed since then – simultaneously expanding their attack surface and exposing themselves to greater cybersecurity threats. McKinsey & Company estimates that the annual increase of costs related to cybercrime will reach $10.5