Page 173 - Cyber Defense eMagazine January 2024
P. 173

technologies  (PPT) could be an AI alternative, as it promises to act like most models while maintaining
            privacy, ethics, and regulatory requirements.



            Optimizing your security tech.

            There are multiple ways to optimize existing security tools to perform at their best, which can help relieve
            tight budgets.  Existing  software  contracts  should  be reviewed  to make  sure that they  still work for the
            company.  This  may  be  done  by  validating  any  new  terms  and  conditions,  renegotiating  pricing,  and
            ensuring that only those employees who need it have a license. It may also be time to have a look at your
            prior  investments  and  make  sure  they  are  still  relevant  to  the  company.  Cut  out  legacy  contracts  or
            underutilized tech that no longer aligns with your business, and consolidate to fewer tools if possible, as
            some may have integrated a solution that previously required a separate tool.

            With  economic  recession  looming  over  the  US  economy  once  again,  the  majority  of  companies  still
            recognize how important it is that customers, employees, and stakeholders feel like their needs are being
            met. That’s why it is so important to invest in technology  that protects businesses from cyber threats as
            a company necessity, not a luxury.





            About the Author

            Luke Wallace, VP of Engineering at Bottle Rocket, unpacks why companies
            are expected  to increase their budgets  in tech, including  privacy tools  and
            cloud security, despite a looming recession.
            https://www.bottlerocketstudios.com/
































            Cyber Defense eMagazine – January 2024 Edition                                                                                                                                                                                                          173
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   168   169   170   171   172   173   174   175   176   177   178