article thumbnail

Selling the C-suite on preemptive IT investments

CIO

It’s common knowledge among CIOs that disaster recovery investments are always de-prioritized by company boards — until disaster strikes. But disaster recovery is just one example of projects that are of an important and preemptive nature that CIOs want to fund but find de-prioritized when it comes to budget approval.

article thumbnail

Four questions for a casino InfoSec director

CIO

Recent cyberattacks at MGM Resorts and Caesars Entertainment have put the spotlight on cybersecurity practices at casinos – and the importance of educating employees on social engineering tactics. How has the job of a casino security leader changed as games have become digitalized? Read on for his thoughts on AI, zero trust, and more.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

General Dynamics IT takes multicloud strategy to the next level

CIO

And there are overarching digital technologies that traverse General Dynamics’ business portfolio, such as security, toward which all units are working to implement zero trust across the board. We were able to get better metrics and reporting. And it increased or strengthened our DR [disaster recovery] posture overall.”

Strategy 232
article thumbnail

Elevate your digital transformation with impactful sustainability

CIO

Equinix and Dell Technologies have a longstanding partnership built around solving the real challenges modern companies face—from infrastructure performance to costs, security, and speed of deployment. And we’re committed to helping customers meet their energy-efficiency targets too.

article thumbnail

Enterprise Application Security: What It Is and How To Prevent It?

Openxcell

Enterprise application security is one of the most important aspects of protecting organizations from external attacks. Over the years, cybersecurity vulnerability reports have recorded an increase in the number of security holes in enterprise applications. What is Enterprise Application Security?

article thumbnail

What COVID-19 Response Strategies Tell Us About the Business-Cybersecurity Disconnect

Tenable

As organizations around the world raced to develop strategies to respond to the COVID-19 pandemic, an independent business risk study shows cybersecurity leaders were largely left out. Yet, many cybersecurity leaders are still struggling to get a seat at the table. . COVID-related scams were the No.

article thumbnail

Software Deployment Best Practices

Apiumhub

Most technology leaders depend on deployment frequency as a metric for assessing DevOps success. This frequency is a pivotal value stream metric and a fundamental benchmark within the core DORA metrics, providing insights into your software delivery efficiency. Use configuration management tools (e.g.,