article thumbnail

The future of European cybersecurity is autonomous

CIO

In a stark warning, Tanium’s Cybersecurity in Europe report spells out the current threat level in no uncertain terms. “[Across Europe] we are seeing breaches in all industries, from airlines to retail, from banking to manufacturing. Only Canada, the Middle East, and the United States are higher than Germany’s cost.

Security 274
article thumbnail

2 Innovations That Can Tip the Balance in Cybersecurity

CIO

Army Major General and Vice President and Federal Chief Security Officer for Palo Alto Networks What critical innovations can change the balance in cybersecurity, providing those of us responsible for defending our organizations with more capabilities against those who would do us harm? This is not just a theoretical exercise.

Security 316
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

7 tough IT security discussions every IT leader must have

CIO

Talk may be cheap, but when it comes to IT security, strategic conversations with colleagues, business partners, and other relevant parties can be priceless. Such discussions ensure the integration of cybersecurity initiatives and resource requirements in the enterprise’s business goals and objectives,” he adds.

article thumbnail

Cybersecurity Snapshot: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto

Tenable

1 - Using AI securely: Global cyber agencies publish new guide Is your organization – like many others – aggressively adopting artificial intelligence to boost operational efficiency? If so, you might want to check out a new guide published this week about how businesses can use AI securely.

article thumbnail

Exploring the pros and cons of cloud-based large language models

CIO

As a result of ongoing cloud adoption, developers face increased pressures to rapidly create and deploy applications in support of their organization’s cloud transformation goals. Cloud applications, in essence, have become organizations’ crown jewels and developers are measured on how quickly they can build and deploy them.

article thumbnail

What you need to know about Okta’s security breach

CIO

On October 20, 2023, Okta Security identified adversarial activity that used a stolen credential to gain access to the company’s support case management system. The exposure of personal or sensitive information can lead to identity theft, phishing attacks, and other forms of cybercrime. There is no silver bullet in cybersecurity.

article thumbnail

Creating a Security Program with Less Complexity and More Visibility

Palo Alto Networks

Developing a strong security program is like tending a garden. Organized cybercriminals build teams that specialize in different phases of attack, from intelligence gathering to exfiltration. These shortcomings get in the way of prioritizing the most important work, and they keep SOC teams underwater.