article thumbnail

The future of European cybersecurity is autonomous

CIO

In a stark warning, Tanium’s Cybersecurity in Europe report spells out the current threat level in no uncertain terms. “[Across Europe] we are seeing breaches in all industries, from airlines to retail, from banking to manufacturing. Only Canada, the Middle East, and the United States are higher than Germany’s cost.

Security 316
article thumbnail

2 Innovations That Can Tip the Balance in Cybersecurity

CIO

Army Major General and Vice President and Federal Chief Security Officer for Palo Alto Networks What critical innovations can change the balance in cybersecurity, providing those of us responsible for defending our organizations with more capabilities against those who would do us harm? This is not just a theoretical exercise.

Security 360
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mastercard preps for the post-quantum cybersecurity threat

CIO

Such a cryptographically relevant quantum computer (CRQC) could deliver a devastating impact to global cybersecurity protocols. To prepare for this worst-case scenario, Mastercard launched its Quantum Security and Communications project, which earned the company a 2023 US CIO 100 Award for IT innovation and leadership.

Security 347
article thumbnail

Generative AI & data: Potential in cybersecurity if the risks can be curtailed

CIO

This time they’re making a $13 billion bet by partnering with OpenAI and bringing to market new products like Security Copilot to make sense of the threat landscape using the recently launched text-generating GPT-4 (more on that below). Now, Microsoft is putting a stake in the ground with its generative AI Security Copilot tool.

Security 342
article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

As the end of 2023 approaches, it becomes imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken. Our interconnected online world is no longer separate from our lives, businesses, or our global economy.

article thumbnail

CIO-Application security: the 3 pillars of securing your engineering ecosystem

CIO

To speed up development and deployment, many organizations have turned to continuous integration and continuous delivery (CI/CD) solutions for more automated and agile software testing, building, and deploying processes. Speed is great, but not when it comes at the expense of security.

article thumbnail

Exploring the pros and cons of cloud-based large language models

CIO

As a result of ongoing cloud adoption, developers face increased pressures to rapidly create and deploy applications in support of their organization’s cloud transformation goals. Cloud applications, in essence, have become organizations’ crown jewels and developers are measured on how quickly they can build and deploy them.