article thumbnail

AI, cybersecurity investments and identity take center stage at RSA 2024

CIO Business Intelligence

There was a definite buzz about cybersecurity investments and M&A picking up steam, AI-based defense and AI-delivered industry models, and overall product innovation. This is a primary concern, and there’s a wide range of companies, both established and startups creating a firewall or defenses around AI models.

Security 127
article thumbnail

Why IT leaders are putting more business spin on security spend

CIO Business Intelligence

A new definition of value Aligning security with the business goes beyond traditional methods of justifying security spend, such as warning of consequences from hacks or trying to prove ROI. For example, he says, web application firewalls don’t only protect applications but cut networking costs by reducing spurious and malicious traffic.

Security 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A CISO POV: Securing AI in your company

CIO Business Intelligence

Firewall capability for AI security: Enhance security measures by providing firewall capabilities to safeguard against potential AI-related vulnerabilities. Remember, AI has been around for a long time, and the definition makes a difference. Embrace AI—it’s here! What areas or functions are using AI today?

Company 70
article thumbnail

Cybersecurity e NIS2: come si muovono i CIO per dormire sonni (un po’) più tranquilli

CIO Business Intelligence

Anch’io mi ritrovo a lavorare quotidianamente su spam, tentativi di truffa, aggressioni al firewall, e così via”. Oggi per EAV un terzo del budget IT è dedicato alla cybersicurezza ed è una spesa insostenibile. Nel 2028 prevedo di dover moltiplicare per 7 il budget IT e la spesa per la sicurezza aumenterà di conseguenza.

Dell 102
article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Management will study the need of information security policies and assign a budget to implement security policies. Definitions – A brief introduction of the technical jargon used inside the policy. Firewall Policy. How firewalls are named, configured etc. Purpose – Why the policy is created. Implement policies.

Policies 268
article thumbnail

What Are The Hot Issues That Today's CIOs Need To Worry About? (The CIO job is to use the CIO position to communicate the importance of information technology)

The Accidental Successful CIO

You think about hackers, viruses, Trojans, social engineering, and all of the other threats that we find in the modern definition of information technology. You buy firewalls and virus scanners and anything else that is sold to the IT sector to protect you.

Mobile 170
article thumbnail

Hygiene does not only protect you against physical viruses

Dataconomy

Common features include real-time scanning, web protection, email scanning, firewall capabilities, and ransomware protection. Regular updates are vital to keep the antivirus software equipped with the latest threat definitions and security patches. Compatibility is another crucial aspect to consider.

Malware 68