De proveedor de TI a CIO: salto profesional y desafíos

De proveedor de TI a CIO: salto profesional y desafíos

En el caso de Jimeno, a lo largo de su trayectoria ha ido alternando entre empresas proveedoras, como Telefónica, Sermicro o Altadis, y la responsabilidad en el departamento de TI, que desempeñó antes de ACS en, por ejemplo, Logivend. Defiende que la experiencia le aporta “en ambos casos, tanto cuando soy digamos comprador como cuando soy vendedor”. González-Peralta también ha ido cambiando de cliente a proveedor. Recuerda la primera vez que pasó de un extremo…

Read More

Three-Quarters of IT Leaders Fear Nation-State AI Cyber Threats

Three-Quarters of IT Leaders Fear Nation-State AI Cyber Threats

AI is at the top of most IT leaders’ minds when asked about the cyber threats their organizations could face, according to a recent Armis survey. Almost three-quarters (74%) of respondents said that AI-powered attacks significantly threaten their organization’s security. A similar share (73%) added that they specifically feared that nation-state hackers’ AI capabilities could enable future sophisticated cyber-attacks. The findings come from the 2025 Armis Cyberwarfare Report in which the firm surveyed more than…

Read More

Downer’s digital journey to deliver consistency to customers

Downer’s digital journey to deliver consistency to customers

On AI use cases: We’re an asset management business, so we’re often looking at the existing condition of assets and then working out how we need to maintain them for the public. One of our innovations has been a solution called Fault IQ, which uses an off the shelf detection product. So in Downer Digital, we don’t always need to build everything ourselves. We’ll use something off the shelf if we can, and then configure…

Read More

Microsoft Fixes Over 130 CVEs in April Patch Tuesday

Microsoft Fixes Over 130 CVEs in April Patch Tuesday

System administrators have double the workload this month versus March’s Patch Tuesday announcement, after Microsoft published fixes for over 130 CVEs. However, there was only one zero-day bug announced this month, compared to seven in March. CVE-2025-29824 is an actively exploited elevation of privilege (EoP) vulnerability in the Windows Common Log File System (CLFS), that stems from a use-after-free condition. An attacker doesn’t need admin privileges to exploit the vulnerability – only local access. “The vulnerability…

Read More

NCSC Warns of Spyware Targeting Chinese and Taiwanese Diaspora

NCSC Warns of Spyware Targeting Chinese and Taiwanese Diaspora

Security agencies in the UK and allied countries today warned members of Uyghur, Tibetan and Taiwanese communities that they may be a target for newly discovered spyware variants. The UK’s National Cyber Security Centre (NCSC) joined its counterparts in the US, Australia, Canada, Germany and New Zealand to raise the alarm over the Trojanized malware, which it said is hidden in legitimate-looking mobile apps such as “TibetOne.” The two variants, dubbed “Moonshine” and “Badbazaar,” are designed…

Read More

Breaking Down Barriers, Welcoming New Talent: Celebrate International Girls in ICT Day with Cisco

Breaking Down Barriers, Welcoming New Talent: Celebrate International Girls in ICT Day with Cisco

International Girls in ICT Day is the ideal time to shine a spotlight on the technology industry and encourage and inspire girls and women of all ages to explore a wide range of career opportunities—those they may not have previously considered—in Information and Communication Technology (ICT). This global initiative, led by the International Telecommunication Union (ITU), will be held on April 24, 2025. It’s something I’m personally incredibly passionate about—let me tell you why! Girls…

Read More

AI 성능 평가, 벤치마크만으론 부족하다··· 메타 라마4 논란이 보여준 실사용 검증의 필요성

AI 성능 평가, 벤치마크만으론 부족하다··· 메타 라마4 논란이 보여준 실사용 검증의 필요성

컨설팅 기업 애멀감 인사이트(Amalgam Insights)의 CEO이자 수석 애널리스트인 현 박은 “모든 벤더는 벤치마크 결과를 자사 기술의 우수성을 드러내는 수단으로 활용하려 한다”라며 “특히 불투명한 방식으로 벤치마크를 조작하려는 경우 의심을 살 수밖에 없다”라고 언급했다. 다만 박은 주요 생성형AI 벤더가 경쟁사 수준에 부합하거나 추월할 가능성을 보이는 한, 이런 이슈가 장기적으로 큰 반향을 일으킬 가능성은 낮다고 분석했다. 그는 “기초 모델 시장은 매우 빠르게 변화하고 있으며, 성능이나 생산성 면에서의 비약적인 발전이 매달 혹은 그보다 더 짧은 주기로 발생하고 있다”라며 “솔직히…

Read More

Cyber Fraud: The Primary Culprit in UK Payment Fraud

Cyber Fraud: The Primary Culprit in UK Payment Fraud

Cyber fraud has skyrocketed from a growing concern to the leading driver of payment fraud in the UK, infiltrating most businesses in the country and exposing them to previously unimagined financial and operational risks.   This was one of the findings of Trustpair’s 2025 Fraud Report, Fraud in the Cyber Era: 2025 UK Fraud Trends & Insights, which revealed that an eye-watering more than nine out of ten businesses suffered attempted fraud in the past year, and…

Read More

The Cost of Ransomware: Shutdowns & Extortion

The Cost of Ransomware: Shutdowns & Extortion

Ransomware is no longer in its heyday. Evolving, AI-driven cybersecurity tools and global law enforcement efforts have seen to that. But that doesn’t mean ransomware is no longer a threat. In fact, in some ways, the danger is greater than ever. While ransomware attacks are less common than they used to be, the consequences of those that succeed are more severe.  Earlier this year, the Ponemon Institute published a study revealing massive changes in the ransomware…

Read More

‘기본부터 점검하라’··· 효과적인 리스크 관리에 필요한 규칙 7가지

‘기본부터 점검하라’··· 효과적인 리스크 관리에 필요한 규칙 7가지

규칙 1. 수용 가능한 리스크 범위 파악에서 시작 기업 자문 회사 리절턴트(Resultant)의 수석 컨설턴트인 파올라 사이베네는 “CIO가 조직의 리스크 수용 범위를 이해해야 전략, 혁신, 기술 선택 등 모든 것이 원활하게 조율될 수 있다”라고 설명했다. 그러나 특정 상황에서는 수용 가능한 리스크 범위를 설정하기 어려울 수 있다. 사이베네는 많은 조직이 리스크를 직관적으로 이해하고 있지만 구조화된 방식으로 명시적으로 정의하거나 전달하지 않는다고 지적했다. 그는 “실제로 CIO는 종종 리스크 관리를 규제 준수나 사이버 보안과 혼동하지만, 리스크는 훨씬 더 광범위하다”라며, 좋은…

Read More
1 44 45 46 47 48 3,972