Remove Infrastructure Remove Malware Remove Technical Review
article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

These global events have also underscored the crucial significance of safeguarding our critical infrastructure against domestic or foreign attacks. It’s easy to envision the outcomes that could arise from a major assault on our vital infrastructure.

article thumbnail

IT downtime cuts enterprise profit by 9%, says study

CIO

They counted any service degradation or unavailability of critical business systems due to cyberattacks as well as technical and operational failures as downtime. Almost a quarter of the estimated cost of downtime — $49 million of the estimated $200 million average for Global 2000 companies — was due to lost revenue, the study found.

Study 292
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

IT downtime cuts enterprise profit by 9%, says study

CIO

They counted any service degradation or unavailability of critical business systems due to cyberattacks as well as technical and operational failures as downtime. Almost a quarter of the estimated cost of downtime — $49 million of the estimated $200 million average for Global 2000 companies — was due to lost revenue, the study found.

Study 246
article thumbnail

Top 5 Security Trends for CIOs

CIO

Explosive technology innovations. Generational shifts in technological expectations. Sometimes they simply don’t work, perhaps due to a change in contact lenses or a new tattoo. A second, more pernicious risk is the fact that ChatGPT can write malware. The malware itself is easy to buy on the Dark Web.

Trends 312
article thumbnail

How AI continues to reshape the cybersecurity arsenal

CIO

As civilization advances, so does our reliance on an expanding array of devices and technologies. From smartphones and wearables to IoT devices and cloud infrastructure, the breadth and complexity of our digital ecosystem continues to expand at an unprecedented rate.

Security 320
article thumbnail

Cybersecurity Snapshot: Russia-backed Hackers Aim at Critical Infrastructure Orgs, as Crypto Fraud Balloons

Tenable

Critical infrastructure operators must beware of Russian military hacking groups. 1 - Critical infrastructure orgs targeted by Russia-backed hackers Here’s an important warning for critical infrastructure organizations in the U.S. Cybersecurity and Infrastructure Security Agency (CISA).

article thumbnail

Why you must extend Zero Trust to public cloud workloads

CIO

A recent study shows that 98% of IT leaders 1 have adopted a public cloud infrastructure. However, it has also introduced new security challenges, specifically related to cloud infrastructure and connectivity between workloads as organizations have limited control over those connectivity and communications. 8 Complexity.

Cloud 337