article thumbnail

How Norma Group standardizes its global IT

CIO Business Intelligence

You may be unfamiliar with the name, but Norma Group products are used wherever pipes are connected and liquids are conveyed, from water supply and irrigation systems in vehicles, trains and aircraft, to agricultural machinery and buildings. And finally, Security First that revolves around an automation concept and dedicated SOC.

Groups 222
article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO Business Intelligence

Researchers at the firm also identified seven new Chinese-origin cyber espionage groups in 2024, many of which exhibited specialized targeting and toolsets. The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example.

Industry 330
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber trailblazers breaking barriers: Insights from women cybersecurity leaders at Gitex 2024

CIO Business Intelligence

Dr. Abeer Khedr, Group Head of Cybersecurity at the National Bank of Egypt, echoed this sentiment: “Cyber leadership at the client side means reaching CISO levels or beyond. Several targeted initiatives were highlighted, such as leadership development programs tailored for women and underrepresented groups.

article thumbnail

Cisco pumps up data center networking with AI, large workloads in mind

Network World

Both PFC and ECN are core tenants of the technology that industry group Ultra Ethernet Consortium is developing to enrich the venerable networking technology for AI infrastructure duties. This new platform is powered by the Cisco Silicon One G200—a 5 nm 51.2T

article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO Business Intelligence

Researchers at the firm also identified seven new Chinese-origin cyber espionage groups in 2024, many of which exhibited specialized targeting and toolsets. The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example.

Industry 246
article thumbnail

Seattle startup group launches new program for founders that rethinks traditional accelerator format

GeekWire

Now he’s applying those lessons to a new Founder-in-Residence program at Foundations , the Seattle-based startup community that launched last year. The program puts a new spin on the traditional startup accelerator model namely, not requiring founders to give up equity, and accepting companies at varying levels of traction.

article thumbnail

Six steps to creating a successful IT strategy: A guide for CIOs

CIO Business Intelligence

The road map should include programs, projects, and actions needed to achieve the IT strategy’s goals. IDC is a wholly owned subsidiary of International Data Group (IDG Inc.), Daniel Saroff is group vice president of consulting and research at IDC, where he is a senior practitioner in the end-user consulting practice.

Strategy 334