Remove Cyberspace Remove Management Remove Technology
article thumbnail

Competition is stiff, but retailers know what it takes to compete

CIO

Retailers plan to focus on improving supply chain planning, warehouse/inventory management, and integration between supply chain planning and execution during the coming year to meet these challenges. of survey respondents); supplier selection and management (34%); inventory and order management (35.9%); and design and pre-production (35.7%).

Retail 243
article thumbnail

CIOs sharpen tech strategies to support hybrid work

CIO

In its Future of Work predictions for 2023 , IDC called hybrid work “a mainstay for our global future work landscape,” adding that “hybrid work will drive new technology solutions across functions and industries alike.” So now whenever we do something in IT, like release a capability, we have these principles in mind.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Progress in ICT industry policy and cybersecurity standards drive MENA and Central Asia toward an intelligent era

CIO

The stakeholders included senior officials from the China Academy of Information and Communications Technology and Huawei to discuss industry policies, successful practices, and valuable insights on key industry trends. We must ensure that we continue to embrace the culture of openness, transparency, and collaboration.

article thumbnail

3 Strategies Employed by the Leading Enterprise Cybersecurity Platforms

Smart Data Collective

To address newer challenges, security providers have developed new technologies and strategies to combat evolving threats. To get acquainted with the ways security firms are handling the new breed of threats in cyberspace, here’s a rundown of the notable strategies the leading cybersecurity platforms and security firms are offering.

article thumbnail

Proactive cybersecurity: sometimes offence is the best defense

CIO

It’s important to understand that launching an offensive cybersecurity strategy does not mean abandoning traditional defensive measures such as deploying firewalls, intrusion detection systems (IDS), anti-malware software, patch management, security information and event management (SIEM), and other such tools.

article thumbnail

What Are State-Sponsored Cyber Attacks and Do They Use AI?

Smart Data Collective

Although AI technology has been very important in creating safeguards to stop these attacks, it has also been used to make these attacks even more vicious. They will continue investing in AI technology to execute more vicious attacks. Artificial intelligence has played a very important role in modern cyber attacks.

article thumbnail

How Hospital Security Breaches Devastate Local Communities

Smart Data Collective

The same HIPAA regulations that have been protecting patient privacy since the 90s are now applied to digital healthcare technology to ensure that patients enjoy the same level of privacy even in cyberspace. Wizard Spider managed to keep them locked out for six weeks.

Hospitals 255