article thumbnail

7 tough IT security discussions every IT leader must have

CIO

Talk may be cheap, but when it comes to IT security, strategic conversations with colleagues, business partners, and other relevant parties can be priceless. Such discussions ensure the integration of cybersecurity initiatives and resource requirements in the enterprise’s business goals and objectives,” he adds.

article thumbnail

Transforming IT culture for business success

CIO

Back in the day, IT culture was all about the perks. The evolving role of IT, coupled with new pandemic-era work models, has sifted the culture conversation away from in-office trappings. The evolving role of IT, coupled with new pandemic-era work models, has sifted the culture conversation away from in-office trappings.

Culture 313
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

8 tips for cultivating a winning IT culture

CIO

Long-term success is generally the result of leaders who make a committed effort to connect directly with their teams, rather than simply issuing memos, edicts, and other top-down commands. Are you looking to build a winning IT culture? Projects that really excite our teams.” Winning IT organizations aren’t built in a day.

Culture 358
article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

As the end of 2023 approaches, it becomes imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken. Our interconnected online world is no longer separate from our lives, businesses, or our global economy.

article thumbnail

The cyber security challenges in fintech and neobanking’s rise

CIO

Unquestionably, there are many positives to this trend, but there will also be an increase in cybersecurity challenges to accompany it. But this often comes at the expense of cyber security, which tends to be left as an afterthought and included too late, says Galbiati.

Fintech 232
article thumbnail

10 things to watch out for with open source gen AI

CIO

According to Synopsys’ open source security and risk analysis released in February, 96% of all commercial code bases contained open source components. So do open source LLMs release all that information? With an open source project, there might not be anyone on the team whose job it is to look for signs of jailbreaking.

article thumbnail

Creating a Security Program with Less Complexity and More Visibility

Palo Alto Networks

Developing a strong security program is like tending a garden. Organized cybercriminals build teams that specialize in different phases of attack, from intelligence gathering to exfiltration. These shortcomings get in the way of prioritizing the most important work, and they keep SOC teams underwater.