article thumbnail

Can you have too many security tools?

CIO

A member of your organization’s security team reads about a new kind of security tool and brings it to the CISO’s attention, who decides that it’s a good investment. The CISO sees a new kind of security threat that requires a different security tool. A colleague recommends a security tool she says is indispensable.

Security 468
article thumbnail

Unifying security and networking the AI-native way

CIO

In today’s enterprise environments, security and networking teams may be siloed for a variety of reasons. Yet there’s now widespread agreement that the drawbacks of siloed security and networking operations far outweigh any historical advantages. Plus, enhanced security outcomes lead to impressive reputational dividends.

Security 508
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Securing the digital future: How Huawei is tackling cybersecurity in the GCC

CIO

Securing these technologies is paramount in a region where digital infrastructure is critical to national development. As the GCC countries push ahead with digital transformation, ensuring the security of 5G, AI, and IoT ecosystems has become more complex. But security must evolve with it.”

Security 448
article thumbnail

The big, gaping hole in software supply chain security

CIO

If software supply chains consisted solely of open source code, securing them would be easy. Effective tools and methodologies exist for discovering and remediating software supply chain security risks that arise from open source components. Here’s why securing open source alone is not enough and how organizations can do better.

Security 444
article thumbnail

What Regulations Will Impact Sustainability Comms in 2024?

Securities and Exchange Commission (SEC) Climate disclosure rules The European Commission’s Green Claims Directive California’s passing of SB 253 and SB 261 The impact of Capricorn season signaling on sustainability and social impact communication is also unmistakable, particularly as it relates to public and private reporting.

article thumbnail

Security team management: Top 4 findings from discussions with CISOs

CIO

Most large businesses have a security team. But what, exactly, does that security team look like? And is it optimized in each of these respects to maximize the organization’s security posture? We learned, for example, that very few organizations have just a single security team. How is it structured? Most have several.

Security 459
article thumbnail

INE Security Alert: The Steep Cost of Neglecting Cybersecurity Training

CIO

Effective training is not merely a line item expense — it’s an indispensable investment in the operational integrity and financial security of organizations. Moreover, a knowledgeable IT team can ensure that systems are kept up-to-date and secure against emerging threats, decreasing the likelihood of costly incidents.

Security 459