article thumbnail

Can you have too many security tools?

CIO

A member of your organization’s security team reads about a new kind of security tool and brings it to the CISO’s attention, who decides that it’s a good investment. The CISO sees a new kind of security threat that requires a different security tool. A colleague recommends a security tool she says is indispensable.

Security 468
article thumbnail

Securing the digital future: How Huawei is tackling cybersecurity in the GCC

CIO

As the GCC countries continue to evolve into global digital hubs, the adoption of technologies such as 5G, AI, and IoT is accelerating rapidly. New technologies like AI and IoT are coming into play,” he said, underscoring how these innovations are driving transformation across sectors. But security must evolve with it.”

Security 448
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Unifying security and networking the AI-native way

CIO

In today’s enterprise environments, security and networking teams may be siloed for a variety of reasons. The root cause might be technological, with teams using tools and platforms specifically tailored for their separate domains. Unifying security and networking teams is clearly the solution, but what’s the best way to get there?

Security 508
article thumbnail

The big, gaping hole in software supply chain security

CIO

If software supply chains consisted solely of open source code, securing them would be easy. Effective tools and methodologies exist for discovering and remediating software supply chain security risks that arise from open source components. Here’s why securing open source alone is not enough and how organizations can do better.

Security 444
article thumbnail

As mainframe application development grows, so does the security risk

CIO

Despite the importance of the mainframe, it has been neglected over the years with organizations focusing on perimeter security. According to Gartner , IT security software is the top purchase category (28%) for those buying IT-related software. But only eight percent of those buyers are purchasing IT management software.

Security 468
article thumbnail

Security team management: Top 4 findings from discussions with CISOs

CIO

Most large businesses have a security team. But what, exactly, does that security team look like? And is it optimized in each of these respects to maximize the organization’s security posture? We learned, for example, that very few organizations have just a single security team. How is it structured? Most have several.

Security 459
article thumbnail

Differentiating people, process, and technology problems: A guide for CISOs

CIO

When it comes to security, knowing you have a problem is only half the battle – if that. Is it a people issue, such as lack of enough security personnel? Is it inefficient processes that hamper communication within security teams? Is it inefficient processes that hamper communication within security teams?