article thumbnail

CIOs eager to scale AI despite difficulty demonstrating ROI, survey finds

CIO

CIOs rank AI as a top priority alongside cybersecurity for IT departments. However, barriers such as adoption speed and security concerns hinder rapid AI integration, according to a new survey. There is a sense of urgency to leverage AI effectively, but adoption speed and security challenges are hindering efforts.

Survey 275
article thumbnail

Operational technology systems require a robust Zero Trust strategy in 2024

CIO

Cyberattacks on operational technology (OT) systems are rapidly rising. Attacks against OT systems can have a significant impact, including physical consequences such as shutdowns, outages, leakages, or worse. How we got here With the rise of digital transformation, we’ve seen the increased convergence of IT and OT systems.

System 259
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto

Tenable

And a global survey shows cyber pros weighing pros and cons of AI. 1 - Using AI securely: Global cyber agencies publish new guide Is your organization – like many others – aggressively adopting artificial intelligence to boost operational efficiency? Plus, CERT’s director says AI is the top skill for CISOs to have in 2024.

article thumbnail

To better manage cybersecurity risk, extend zero-trust principles to third parties

TechCrunch

Saket Modi is the co-founder and CEO of Safe Security, a cybersecurity and digital business risk quantification platform company. Today’s cybersecurity landscape requires an agile and data-driven risk management strategy to deal with the ever-expanding third-party attack surface. Saket Modi. Contributor. Share on Twitter.

Survey 279
article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

Cybersecurity firm Fortanix secures capital to provide confidential computing services

TechCrunch

Companies (and VCs ) spend billions of dollars on cybersecurity, but primarily focus on protecting infrastructure or endpoints. That’s not always the right approach in a world where — thanks to the pandemic — data is increasingly distributed across clouds, software-as-a-service apps, and storage systems.

Hardware 169
article thumbnail

Cybersecurity Snapshot: CISA Says Midnight Blizzard Swiped U.S. Gov’t Emails During Microsoft Hack, Tells Fed Agencies To Take Immediate Action

Tenable

Plus, a new survey shows cybersecurity pros are guardedly optimistic about AI. And the NSA is sharing best practices for data security. Cybersecurity and Infrastructure Security Agency (CISA) in its Emergency Directive 24-02 , sent to federal civilian agencies last week and made public this week. And much more!