Remove Architecture Remove Disaster Recovery Remove Government Remove Information Security
article thumbnail

Strong Business Continuity Management Brings Resilience

CIO Business Intelligence

Asking the right questions to understand the business’ strategy and implementing architecture that supports the technology of the future is fundamental. Cloud solutions can be more secure and provide better failover capabilities than businesses can accommodate with their own on-premise environments. Proactivity also is a must.

article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

One of the federal government’s key procurement arms, the General Services Administration (GSA), has released a survey to the tech community in the form of a request for information asking a few simple questions regarding the experience of their vendor base. In a computing context, the term security implies cybersecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Culture: How Princeton University's Security Team Created It

SecureWorld News

When David Sherry became Chief Information Security Officer at Princeton University, he says cybersecurity was done well. "I I don't want you to think security at Princeton was some sort of vast wasteland. If you are in security, you are in risk management. I don't take that for granted, and I know it's a rare occurrence.

article thumbnail

New CIO appointments in India, 2022

CIO Business Intelligence

Vakrangee, a Mumbai-based provider of banking and e-governance services, has appointed Prashanth Thakur as senior vice president and head of technology and digital. Prior to joining Fractal, Tiwari was senior vice-president and global CISO at Airtel, where he set up the managed security services initiative Airtel Secure for Business.

article thumbnail

5 (more) big challenges facing CIOs and IT leaders in 2018

mrc's Cup of Joe Blog

Application architecture becomes even more important in this cloud-driven world. Improving Internal Security. photo credit: stevepb via pixabay cc Like a chain, your data security is only as strong as its weakest link. You may have the strongest security protocols in place. You may have the best disaster recovery plan.

Budget 63