article thumbnail

Geopolitical risks could present new opportunities for CIOs: Gartner

CIO

Some of the key focus areas for CIOs, according to Gartner, are digital sovereignty, helping build a local technology industry, running a risk center and provide understanding of cyberspace in different nations. These policies can lead to CIOs being mandated to buy from certain vendors.

article thumbnail

2 Innovations That Can Tip the Balance in Cybersecurity

CIO

Army Major General and Vice President and Federal Chief Security Officer for Palo Alto Networks What critical innovations can change the balance in cybersecurity, providing those of us responsible for defending our organizations with more capabilities against those who would do us harm? By John Davis, Retired U.S. government.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware And The Defense Industrial Base

Smart Data Collective

According to the Symantec Internet Security Threat Report of 2016, governments’ growing dependence on information technology makes them vulnerable to ransomware attacks. How to Secure the DIB Against Ransomware Attacks. DIB networks host critical operational assets and data that is crucial to national security.

article thumbnail

Progress in ICT industry policy and cybersecurity standards drive MENA and Central Asia toward an intelligent era

CIO

Robust cybersecurity frameworks built on globally recognized standards are critical to safeguard the very foundation of our digital economy, ensuring that innovation can thrive in a secure and trusted environment. Attendees also reviewed industry policies and best practices, with examples from China’s successful use cases.

article thumbnail

3 Strategies Employed by the Leading Enterprise Cybersecurity Platforms

Smart Data Collective

To address newer challenges, security providers have developed new technologies and strategies to combat evolving threats. To get acquainted with the ways security firms are handling the new breed of threats in cyberspace, here’s a rundown of the notable strategies the leading cybersecurity platforms and security firms are offering.

article thumbnail

Proactive cybersecurity: sometimes offence is the best defense

CIO

It’s important to understand that launching an offensive cybersecurity strategy does not mean abandoning traditional defensive measures such as deploying firewalls, intrusion detection systems (IDS), anti-malware software, patch management, security information and event management (SIEM), and other such tools.

article thumbnail

How Hospital Security Breaches Devastate Local Communities

Smart Data Collective

This is all to say that hospital cyber-security breaches can have a devastating impact on the people impacted. The same HIPAA regulations that have been protecting patient privacy since the 90s are now applied to digital healthcare technology to ensure that patients enjoy the same level of privacy even in cyberspace. More closed.

Hospitals 200