article thumbnail

Geopolitical risks could present new opportunities for CIOs: Gartner

CIO

Some of the key focus areas for CIOs, according to Gartner, are digital sovereignty, helping build a local technology industry, running a risk center and provide understanding of cyberspace in different nations. These policies can lead to CIOs being mandated to buy from certain vendors.

article thumbnail

Competition is stiff, but retailers know what it takes to compete

CIO

Challenge: Maintaining security is a moving target The highly distributed nature of retail and complex supply chains, along with increasingly sophisticated ransomware and fraud tactics and the growth of organized retail crime schemes, are driving up the risk of retail cyber events. IDC, June 2024).

Retail 405
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Progress in ICT industry policy and cybersecurity standards drive MENA and Central Asia toward an intelligent era

CIO

Robust cybersecurity frameworks built on globally recognized standards are critical to safeguard the very foundation of our digital economy, ensuring that innovation can thrive in a secure and trusted environment. Attendees also reviewed industry policies and best practices, with examples from China’s successful use cases.

article thumbnail

2 Innovations That Can Tip the Balance in Cybersecurity

CIO

Army Major General and Vice President and Federal Chief Security Officer for Palo Alto Networks What critical innovations can change the balance in cybersecurity, providing those of us responsible for defending our organizations with more capabilities against those who would do us harm? By John Davis, Retired U.S. government.

article thumbnail

How Hospital Security Breaches Devastate Local Communities

Smart Data Collective

This is all to say that hospital cyber-security breaches can have a devastating impact on the people impacted. The same HIPAA regulations that have been protecting patient privacy since the 90s are now applied to digital healthcare technology to ensure that patients enjoy the same level of privacy even in cyberspace. More closed.

Hospitals 182
article thumbnail

Proactive cybersecurity: sometimes offence is the best defense

CIO

It’s important to understand that launching an offensive cybersecurity strategy does not mean abandoning traditional defensive measures such as deploying firewalls, intrusion detection systems (IDS), anti-malware software, patch management, security information and event management (SIEM), and other such tools.

article thumbnail

Empowering cyber resilience in education: Three strategies for the future

CIO

Another advantage of adopting a shared responsibility model is to leverage the security capabilities of your cloud service providers. Companies like AWS, Microsoft, and Google invest heavily in securing their cloud products. Incorporating those tools into your environment means you benefit from their security.

Education 405