Remove Information Security Remove Internet Remove Social Remove Transportation
article thumbnail

New CIO appointments in India, 2022

CIO Business Intelligence

Prior to joining Fractal, Tiwari was senior vice-president and global CISO at Airtel, where he set up the managed security services initiative Airtel Secure for Business. Before that, he was the chief information security advisor at Microsoft India. . Daimler India Commercial Vehicles transforms CIO role.

article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

Machine learning algorithms are already being used in transportation to ease road congestion, in healthcare to spot medical errors and improve patient care and in retail to improve the customer shopping experience. But how exactly will artificial intelligence help bridge the information security skills gap? That same L.A.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

Machine learning algorithms are already being used in transportation to ease road congestion, in healthcare to spot medical errors and improve patient care and in retail to improve the customer shopping experience. But how exactly will artificial intelligence help bridge the information security skills gap? That same L.A.

article thumbnail

SECURITY LEDGER PODCAST: SECURITY AUTOMATION IS (AND ISN'T) THE FUTURE OF INFOSEC

ForAllSecure

Machine learning algorithms are already being used in transportation to ease road congestion, in healthcare to spot medical errors and improve patient care and in retail to improve the customer shopping experience. But how exactly will artificial intelligence help bridge the information security skills gap? That same L.A.

article thumbnail

A new era of Enterprise Content Management (ECM)

CTOvision

Enterprises have rushed to embrace the cloud, driven by mobile and the Internet of Things (IoT), as a way of keeping the invasion of devices connected – spelling the end of ECM as we know it. In addition, 75% of enterprises see ECM/RM playing a major role in their information security strategy. ECM Hurdles.

article thumbnail

- Cyber City Armageddon?

Chief Seattle Greek Blog

and Loose Laptops Sink Cyber (Security). Constituents depend upon the Internet, web, e-mail , cell phones to communicate with their government for information and services. But, gee, how secure and reliable are these systems, these networks and these communication? Test every doggone Internet-facing application.