article thumbnail

The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

Cloud Musings

Kevin: This time, however, I'd like to really talk to you about this security perimeter thing. Cloud mobility and the internet things have really obliterated what I've always referred to as the wall and moat security paradigm, where working inside the enterprise was safe but working outside of the company's walls wasn't.

article thumbnail

CIOs are worried about the informal rise of generative AI in the enterprise

CIO Business Intelligence

As an example, the consultancy refers to how generative AI technology could potentially add $200 – $400 billion in added annual value to the banking industry if full implementation moves ahead on various use cases. Not all companies have security systems that can detect, block, or remediate this type of behavior.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CIOs Know That The Biggest Threats Come From Inside

The Accidental Successful CIO

As the person with the CIO job, one of the things that takes up a lot of your time is trying to keep the company’s valuable data and knowledge safe because you understand the importance of information technology. However, in the end, it just might turn out that your greatest threat doesn’t come from the outside.

Financial 130
article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

This forces IT and information security specialists to constantly enhance protection to effectively counter information security incidents related to malware distribution through rogue websites, links, and email attachments. At the same time, attackers constantly devise new methods and variants of online threats.

article thumbnail

What Executives Should Know About Shift-Left Security

CIO Business Intelligence

By Zachary Malone, SE Academy Manager at Palo Alto Networks The term “shift left” is a reference to the Software Development Lifecycle (SDLC) that describes the phases of the process developers follow to create an application. Data and Information Security, IT Leadership

article thumbnail

Averting turbulence in the air

CIO Business Intelligence

Understanding the PCI DSS Standard PCI DSS is an information security standard designed to ensure companies that process card payments maintain a secure IT environment for their customers. In a perfect world, all TPSPs that are involved in the IBEs are located within the perimeter of the airline’s secure environment.

article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

For example, India, South Africa, and China have localization rules where the processing and storing of credit card information has to be done in the country (on soil). Claire LaVelle is a principal consultant QSA for Verizon Cyber Security Consulting group. Data and Information Security

Financial 105