article thumbnail

8 data strategy mistakes to avoid

CIO

They also need to establish clear privacy, regulatory compliance, and data governance policies. With nearly 800 locations, RaceTrac handles a substantial volume of data, encompassing 260 million transactions annually, alongside data feeds from store cameras and internet of things (IoT) devices embedded in fuel pumps.

Strategy 340
article thumbnail

Prioritizing AI? Don’t shortchange IT fundamentals

CIO

In fact, for security, compliance, and efficiency reasons, CIOs will want to carefully manage which data generative AI has access to. Either way, poorly managed data can raise compliance and confidentiality issues, like an external partner having access to a gen AI tool that exposes information that should only be available internally.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What is enterprise architecture? A framework for transformation

CIO

Enterprise architecture definition Enterprise architecture (EA) is the practice of analyzing, designing, planning, and implementing enterprise analysis to successfully execute on business strategies.

article thumbnail

Cybersecurity Snapshot: Cyber Engineers and Architects Saw Salaries Spike in 2022

Tenable

Also check out the long-awaited security algorithms for IoT devices. National Institute of Standards and Technology (NIST) recently announced its selection of lightweight cryptography algorithms designed to protect the data that IoT devices and other small electronics generate and transmit. And much more!

article thumbnail

The 8 Best Practices for Reducing Your Organization’s Attack Surface

Ivanti

From this definition, you can see how segmenting can reduce your attack surface by blocking attackers from certain parts of your network. And while zero trust isn't a product but a strategy, there are products that can help you implement a zero trust strategy. 5: Strengthen software and asset configurations. . #5:

article thumbnail

Cybersecurity e NIS2: come si muovono i CIO per dormire sonni (un po’) più tranquilli

CIO

Ma la connettività pervasiva, il cloud, l’Internet of Things (IoT) e l’Internet of Things industriale (IIoT) portano in rete i dispositivi OT e li rendono un potenziale bersaglio degli hacker, ha scritto in una recente nota la società Analysys Mason.

article thumbnail

Unlocking the Potential of Less Than Truckload (LTL) Freight Shipping: Strategies for Efficiency and Cost Management

Strategy Driven

Furthermore, emerging technologies like RFID tagging and Internet of Things (IoT) sensors bring unprecedented visibility to the movement of goods, enabling shippers to optimize their shipping schedules, reduce instances of lost shipments, and enhance overall service quality. Such efficiencies translate to lower greenhouse gas emissions.