article thumbnail

Elevate Your Protection Strategy at CSO’s Future of Cybersecurity Summit

CIO

Here’s the secret to creating a board presentation on cybersecurity, according to Victor Shadare, head of cybersecurity at the international publishing giant Condé Nast : “The board doesn’t have time to look at detail as such. They want something that’s going to punch them in the face,” he said.

Strategy 312
article thumbnail

Artificial Intelligence in Cybersecurity: Good or Evil?

CIO

At the recent Six Five Summit , I had the pleasure of talking with Pat Moorhead about the impact of Generative AI on enterprise cybersecurity. Protecting the Enterprise So, what can security professionals do to properly safeguard the use of Generative AI tools by their employees?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

As the end of 2023 approaches, it becomes imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken. Our interconnected online world is no longer separate from our lives, businesses, or our global economy.

article thumbnail

10 ways to improve IT performance (without killing morale)

CIO

To establish a high-performing IT culture, IT leaders must be able to push their teams to the limit without crippling morale. Improving IT team performance is a constant, ongoing effort, says Dena Campbell, CIO at Vaco Holdings, a global professional services firm.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. Overlooking Security Considerations. The topics covered include: Using Cassandra as if it were a Relational Database.

article thumbnail

How security fears are driving network modernization

CIO

Research findings show that 93% of organization see the convergence of security and networking as a key focus of how future network characteristics will be changing. The good news is that decision-makers are universally aware of the security risks that proliferate in the absence of these solutions.

Network 321
article thumbnail

Witnessing a Revolution in Cybersecurity with AI

Palo Alto Networks

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more. Read our interview with Faraz Ahsan.

article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

Your Team's Pragmatic Guide to Security

Speaker: Naresh Soni, CTO, Tsunami XR

The pandemic has led to new data vulnerabilities, and therefore new cyber security threats. As technology leaders, it's time to rethink some of your product security strategy. Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered.

article thumbnail

Achieving Elite and High Performance DevOps Using DORA Metrics

Speaker: Nico Krüger, Senior Director of Solutions Engineering at Rollbar

Do you have strategies to both identify problems and improve performance? DevOps Research and Assessment (DORA) has identified four key metrics to help organizations understand where their DevOps stands and how it can reach an elite level of performance. Build in security from the start. Improve the stability of your software.

article thumbnail

The Unexpected Cost of Data Copies

An organization’s data is copied for many reasons, namely ingesting datasets into data warehouses, creating performance-optimized copies, and building BI extracts for analysis. How Dremio delivers clear business advantages in productivity, security, and performance. What to consider when implementing a "no-copy" data strategy.

article thumbnail

Build Trustworthy AI With MLOps

Our eBook covers the importance of secure MLOps in the four critical areas of model deployment, monitoring, lifecycle management, and governance. We also look closely at other areas related to trust, including: AI performance, including accuracy, speed, and stability. AI operations, including compliance, security, and governance.

article thumbnail

Zeroing in on Cloud Technical Risk for Targeted Customer Impact

In this eBook, the AWS experts at CloudGeometry explain how to divide and conquer known risks in building and running cloud workloads: Zero in on fixing, avoiding and preventing cloud risks – to security, cost effectiveness, reliability, performance optimization, and more Use common terminology from the Well-Architected Framework to streamline collaborative (..)

article thumbnail

Building Like Amazon

Speaker: Leo Zhadanovsky, Principal Solutions Architect, Amazon Web Services

The result was enabling developers to rapidly release and iterate software while maintaining industry-leading standards on security, reliability, and performance. To get there, Amazon focused on decomposing for agility, making critical cultural and operational changes, and creating tools for software delivery.