article thumbnail

Top 5 Security Trends for CIOs

CIO

Explosive technology innovations. Cybersecurity cannot stand still, or the waves of innovation will overrun the shores. Adversaries continue to innovate. Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins.

Trends 302
article thumbnail

More connected, less secure: Addressing IoT and OT threats to the enterprise

CIO

IoT gives businesses many advantages: enhanced efficiency, data-driven insights, reduced costs, and faster innovation. It also introduces new security challenges that demand our attention, especially as IoT is integrated into operational technology (OT) environments. Your network becomes a breeding ground for threats to go undetected.

IoT 321
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: CISA Says Midnight Blizzard Swiped U.S. Gov’t Emails During Microsoft Hack, Tells Fed Agencies To Take Immediate Action

Tenable

Plus, a new survey shows cybersecurity pros are guardedly optimistic about AI. And the NSA is sharing best practices for data security. Cybersecurity and Infrastructure Security Agency (CISA) in its Emergency Directive 24-02 , sent to federal civilian agencies last week and made public this week. And much more!

article thumbnail

Securing 5G for 2023 and beyond

CIO

By Anand Oswal, Senior Vice President and GM at cyber security leader Palo Alto Networks While mobile technology has been around for decades, the current generation, 5G, is increasingly being recognized for the exciting new benefits it brings to enterprises, SMBs, and public sector organizations. Security needs to keep up.

Security 284
article thumbnail

Short, Mid and Long-Term Impacts of AI in Cybersecurity

Palo Alto Networks

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more.

article thumbnail

Linux Malware Campaign Targets Misconfigured Cloud Servers

Ooda Loop

Cado Security has issued a warning about a cryptojacking campaign leveraging Linux malware, which targets misconfigured Apache Hadoop, Confluence, Docker, and Redis instances with innovative malicious payloads.

Malware 53
article thumbnail

Unlocking Kubernetes Innovation Through Simplified Cloud Security with Tenable

Tenable

Tenable Cloud Security simplifies Kubernetes security by providing any containerized environment with new features including easy custom policy enforcement, enhanced access control, Helm charts scanning and workload protection.