article thumbnail

Four questions for a casino InfoSec director

CIO

With the CSO50 Conference + Awards coming to the We-Ko-Pa Casino Resort in Fort McDowell, Arizona, October 2-4, we asked Bill Tsoukatos, Information Technology Director at Fort McDowell Enterprises, which owns the resort, to tell us what it’s like to manage IT security at a casino property.

article thumbnail

MWC 2024 Replay: Huawei unlocks resilient, ‘non-stop’ banking with four-pronged solutions strategy

CIO

Speaking at Mobile World Congress 2024 in Barcelona, Jason Cao, Huawei’s CEO of Digital Finance BU, acknowledged that digital financial services are “booming” and that the rise of open architecture as well as emerging technologies like generative AI will have an impact on key fields in the industry such as financial engagement and credit loans.

Banking 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity e NIS2: come si muovono i CIO per dormire sonni (un po’) più tranquilli

CIO

Anch’io mi ritrovo a lavorare quotidianamente su spam, tentativi di truffa, aggressioni al firewall, e così via”. Il collegamento sicuro tra OT e IT Un altro tassello essenziale della sicurezza per EAV è il collegamento tra l’OT (Operational Technology) e l’IT. “Il

article thumbnail

IT Vortex: The Effort to Achieve Net Zero Carbon Emissions is Far More Than a Business Goal

CIO

But that depends on our ability and commitment to take care of it properly.” — Lou Corriero, Vice President of Cloud Technologies at IT Vortex. Lou Corriero, Vice President of Cloud Technologies at IT Vortex, notes that the organization frees its customers to focus on their businesses, not the IT required to run them.

.Net 204
article thumbnail

Endpoint Security Basics: What It Does, How It Works, Controls, Technologies and More

Kaseya

In this blog, we’ll discuss topics such as the significance of endpoint security, endpoint security controls and technologies, what sets endpoint security apart from network security and more. Network security involves using tools and technologies to protect data, devices, files and information stored or shared over a network.

article thumbnail

How Cloud Computing Can Help Businesses? A Comprehensive Guide

OTS Solutions

Cloud service providers provide ways to secure your data and information by providing firewalls to detect any unusual activity by intruders. What are their security measures and disaster recovery options? Redundant or legacy technologies can impact your business growth negatively. Mobility: Cloud services are mobile.

Cloud 130
article thumbnail

This Valentine’s Day, Find Time for the Other Things You Love

Kaseya

Your IT Valentine allows you to log in to remote machines almost instantaneously, even over high-latency networks or behind firewalls. Reliable Backup and Disaster Recovery. In 2020, ransomware attacks multiplied sevenfold with cybercriminals using evolved tactics and technologies to breach IT systems.