Gutsy redefines cybersecurity with process mining, a strategic tool that integrates people, processes, and technology to offer data-driven insights.
Cybersecurity
AI Index Ep 28: Super Bowl commercials highlight generative AI; Perplexity raised $73.6M; and Pecan AI develops predictive-model offerings.
Has Microsoft surpassed AWS as the leader in the enterprise cloud? Financial figures show Microsoft’s cloud revenue consistently outpacing AWS.
Analyzing the role of AI in manufacturing, this CIO guide explores efficiency gains, quality control improvements, and predictive maintenance benefits, while addressing cybersecurity, data privacy, and technology dependency risks.
In order to prepare companies for the future of technology-driven business, it’s incumbent upon CIOs to identify and actively address the most critical tech skills gaps.
AI Index Report Ep 26: ASU embraces OpenAI’s ChatGPT Enterprise; Blueshift gains $40 million in growth investment; and Vicarius builds cybersecurity copilot.
The top 5 cybersecurity products to watch in 2024 feature a healthy dose of generative AI and turnkey platforms, as well as supply chain and cloud protections.
Discover the hidden risks embedded in AI code, including false security assumptions and a pattern of bypassing policies.
There is significant strategic value in looking at how cybersecurity threats are evolving and how that relates to strategic business plans.
Frank Domizio explores how IT leaders can ensure their organizations are protected from security threats in a way that also enables business growth.
A discussion centered on the multifaceted role of modern CIOs, covering strategic communication and the adoption of AI and multi-cloud.
Wiz’s AI Security Posture Management (AI-SPM) addresses security and privacy concerns wrought by AI with comprehensive oversight, inventory management, and misconfiguration checks.
In this guidebook, practitioner analysts and CISOs define how to craft a secure foundation for businesses to thrive in today’s ever-changing digital economy.
Organizations must consider the security and privacy implications around using generative AI apps and large language models.
NetRise introduces Trace, an AI-powered feature revolutionizing software supply chain security, employing natural language processing to proactively identify and validate compromised assets and map relationships across the software supply chain.
Is AI genuinely a crucial component of a cybersecurity offering? CIO Kenny Mullican explores what existing practices look like with and without the technology.
Establishing a strong working relationship between the CISO and the CIO is crucial for the overall success and security of a company, writes Kenny Mullican.
HYCU reaches SaaS data protection milestone with 50th integration, continues to ramp up protection for AWS environment.
The chief data officer (CDO) and chief information security officer (CISO) should agree on encryption, role-based access, zero trust security, and data retention for effective business decisions and risk mitigation.
This guidebook offers insights into
the challenges of hybrid work in the cloud era, the strengths and weaknesses of traditional
cybersecurity mechanisms aimed at addressing those challenges, and why organizations need a CASB with DLP to control access and protect data at a granular level.