Remove Company Remove Mobile Remove Social
article thumbnail

Mobile Device Security Policy

Tech Republic Security

Mobile devices are commonly used to conduct company business, which can render them more susceptible to risk than desktop or even laptop computers. In addition, the same social engineering, phishing and application/operating system vulnerabilities which plague desktops.

Mobile 421
article thumbnail

Super-app: a mobile platform worthy of its name

CIO Business Intelligence

Super-apps are versatile mobile or web applications integrating multiple services and functionality into a unified platform experience. The demographic landscape continues to change, with younger generations favoring mobile solutions that offer immediacy and convenience.

Mobile 165
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

12 AI predictions for 2025

CIO Business Intelligence

Generative AI has seen faster and more widespread adoption than any other technology today, with many companies already seeing ROI and scaling up use cases into wide adoption. Small language models are also better for edge and mobile deployments, as with Apples recent mobile AI announcements.

CTO Hire 354
article thumbnail

Airtel connects India with 100Tbps submarine cable

Network World

Businesses are becoming increasingly global and digital-first, with industries such as financial services, data centers, and social media platforms relying heavily on real-time, uninterrupted data flow, Sinha added. The companys investment demonstrates a forward-thinking approach to telecommunications infrastructure.

article thumbnail

Are Your Firewalls and VPNs the Weakest Link in Your Security Stack?

Network World

We need a complete overhaul of our cybersecurity architecture and a shift towards a Zero Trust model built for the highly mobile user-base and modern cloud-first enterprise. Companies need to meticulously evaluate several factors to ensure they adopt the most suitable strategy.

Firewall 396
article thumbnail

When voice deepfakes come calling

CIO Business Intelligence

Social engineering attacks Deepfakes significantly enhance the effectiveness of social engineering by making it much harder to distinguish bad actors from legitimate customers. Once this is achieved, the threat actor calls using their own voice to social engineer the agent. All you need is a short recording of the persons voice.

article thumbnail

How NTT DATA CIO Barry Shurkey takes a people-first approach to IT success

CIO Business Intelligence

As CIO at NTT DATA North America, Barry Shurkey is responsible for digital transformation and optimizing the IT roadmap to support the company and its clients. Can you talk about what internal mobility does for the organization and share some of the things you do to foster career mobility? It was about being more social.

Data 321