article thumbnail

The Future of Machine Learning in Cybersecurity

CIO

And while ML has frequently been used to make sense of big data—to improve business performance and processes and help make predictions—it has also proven priceless in other applications, including cybersecurity. Why Machine Learning Has Become Vital for Cybersecurity. What Makes Machine Learning Different in Cybersecurity.

article thumbnail

Aligning security and business strategies

CIO

By Sean Duca, vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks Some economists predict that we could soon face a global recession. In times of economic downturn, for example, cybercrime may increase as people turn to illegal activities to make money.

Security 231
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cengage Group CTO Jim Chilton on the P&L difference

CIO

Jim Chilton is an award-winning CIO who serves as the chief technology officer of Cengage Group, an innovative disruptor in the edtech space. As a business and technology executive, Chilton leverages his unique experiences to drive innovation and optimize technology throughout the company.

article thumbnail

What’s Missing in Most CISO’s Security Risk Management Strategies

CIO

By Dr. May Wang, CTO of IoT Security at Palo Alto Networks and the Co-founder, Chief Technology Officer (CTO), and board member of Zingbox. At the foundation of cybersecurity is the need to understand your risks and how to minimize them. Challenges of Security Risk Management.

CTO 184
article thumbnail

7 tough IT security discussions every IT leader must have

CIO

Talk may be cheap, but when it comes to IT security, strategic conversations with colleagues, business partners, and other relevant parties can be priceless. Such discussions ensure the integration of cybersecurity initiatives and resource requirements in the enterprise’s business goals and objectives,” he adds.

article thumbnail

CIO-Application security: the 3 pillars of securing your engineering ecosystem

CIO

Speed is great, but not when it comes at the expense of security. In another recent example, cybercriminals successfully infiltrated and disrupted CircleCI, a leading CI/CD platform storing highly confidential client secrets and tokens.

article thumbnail

10 projects top of mind for IT leaders today

CIO

Cybersecurity The February ransomware attack on UnitedHealth Group’s Change Healthcare unit reinforced cybersecurity as a pressing concern for executives across the country, and the continuing fallout that includes a federal investigation keeping the issue in the spotlight. Foundry / CIO.com 3. Risk management came in at No.