Remove Authentication Remove Information Security Remove Survey
article thumbnail

Case in point: taking stock of the CrowdStrike outages

CIO Business Intelligence

In response to the outage, 84% of companies are either considering diversifying their software and service providers, or are already doing so, according to a survey by Adaptavist released in late January. In an Anchore survey released in November, 78% of organizations plan to increase their use of SBOMs in the next 18 months.

CTO Hire 292
article thumbnail

10 projects top of mind for IT leaders today

CIO Business Intelligence

Artificial intelligence and machine learning Unsurprisingly, AI and machine learning top the list of initiatives CIOs expect their involvement to increase in the coming year, with 80% of respondents to the State of the CIO survey saying so. Other surveys offer similar findings. 1 priority among its respondents as well. For Rev.io

Survey 355
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Solving the tech debt problem while staying competitive and secure

CIO Business Intelligence

Looking ahead to the next 12-18 months, two top priorities emerge for IT leaders: developing a strong business case for AI infrastructure spending (cited by 35% of respondents to IDC’s Future Enterprise Resiliency and Spending Survey, Wave 3 , March 2024) and increasing cyber resilience and security (34%).

Security 246
article thumbnail

United Airlines CISO Deneen DeFiore on elevating cyber’s value to the business

CIO Business Intelligence

Deneen DeFiore is a Hall of Fame technology executive who currently serves as vice president and chief information security officer at United Airlines, where she leads the cybersecurity and digital risk organization to ensure the company is prepared to prevent, detect, and respond to evolving cyber threats. What are we doing about it?

Airlines 278
article thumbnail

Workplace of the future: Three must-haves of a modern printer

CIO Business Intelligence

Ironclad security: Protecting your data in a world of evolving threats In an era of increasingly sophisticated cyberattacks, print vulnerabilities are often overlooked. A networked printer, if not properly secured, can be an entry point for hackers seeking to access sensitive data or disrupt operations.

Energy 162
article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

One of the federal government’s key procurement arms, the General Services Administration (GSA), has released a survey to the tech community in the form of a request for information asking a few simple questions regarding the experience of their vendor base. In a computing context, the term security implies cybersecurity.

article thumbnail

5G-enabled manufacturing: Realizing Industry 4.0

TM Forum

Vodafone ensured the 5G mobile private network was secure by design and embedded across the architecture from the beginning. Securing the MPN was a key feature of this. Private networks are not plug and play, they require site surveys, radio planning and installation, a secure SIM provisioning process, etc.,"

Industry 130