Remove Conference Remove CTO Remove Firewall Remove Security
article thumbnail

Koch CTO teams up to get cloud networking right

CIO

Traditionally, to integrate its acquisitions, Koch would flatten the acquired company’s core network, says Matt Hoag, CTO of business solutions at Koch. Matt Hoag, CTO of business solutions, Koch Industries Koch Industries. Koch’s partnership with Alkira has also enabled the CTO to build up his team’s cloud networking skills.

Network 243
article thumbnail

Phishers target oil and gas industry amid Covid-19 downturn

The Parallax

In some cases, that’s already happening, says Tom Murphy, chief technology officer at network security provider Nuspire. Attacks are becoming more complex because so many people are working from home and are outside of their employers’ firewalls,” he says. But they’re getting better at that.

Industry 200
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Ignite '22 – That's a Wrap

Palo Alto Networks

Last week we welcomed 2500 of our customers to Ignite 22, our first in-person customer conference since 2019. This partnership will provide hybrid users secure and seamless access to all applications from any device. Wendi Whitmore, Senior Vice President of Unit 42, is a consistent hit with cybersecurity audiences.

article thumbnail

Security 2020: Why We See Big Opportunity for Founders Building Developer-Centric Security Startups

Battery Ventures

Cybersecurity remains a huge pain point for many organizations: Last year, a study by incumbent security provider Palo Alto Networks found security teams at large enterprises use more than 130 separate security solutions, on average. How did we get here?

article thumbnail

How Executive Culture Can Compromise Your Security

Palo Alto Networks

I bought [insert flavor-of-the-year security solution]. I attended the conferences and went to the classes. Your manifold millions of dollars of security solutions and personnel were subverted in a savvy feat of technomancy by threat actors and, instead of some new zero day, they exploited a CVE from 2019. “How is this possible?”

Culture 98
article thumbnail

The Journey to Extended Detection and Response - XDR

Palo Alto Networks

By looking at how cybersecurity has evolved, we can better predict where it's headed. It's easy to see the rapid changes that have already occurred because cybersecurity evolves quickly. Check out the interactive Journey from Siloed Security to XDR. Endpoint Security in Flux.

article thumbnail

Your Enterprise has too many Cyber-ish People

CTOvision

Sitting through a number of presentations at various cyber conferences recently I’m struck that many enterprises cyber security planning comes down to having ‘the best people’ doing really pretty boring jobs. We need to use technology and change processes to manage the problems that technology can create.