article thumbnail

Aligning security and business strategies

CIO

By Sean Duca, vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks Some economists predict that we could soon face a global recession. During the 2008–2009 Global Financial Crisis (GFC) and subsequent recession, researchers noted that cybercrime rates increased dramatically.

Security 265
article thumbnail

Addressing the insecurity of verified identities

CIO

Cybersecurity has been identity-centric since the first username and password appeared. At that time, workplace technology was physically confined to an office and the business network (if one existed). Today, we can’t rely on deadbolts to do the heavy lifting for enterprise security. Do more of the same?

Policies 358
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Driving 15 years of IT transformation in 5

CIO

These include network management, help desk, establishing and enforcing policies related to information security and risk management, and several other IT functions. Besides, our businesses shouldn’t have to worry that outdated network equipment is putting their operation at risk.”

Security 280
article thumbnail

VMware by Broadcom: The First 100 Days

CIO

It’s fully software-defined compute, networking, storage and management – all in one product with automated and simplified operations. With VCF, our customers will achieve a highly efficient cloud operating model that combines public cloud scale and agility with private cloud security and resiliency.

article thumbnail

Cybersecurity Snapshot: Curb Your Enthusiasm Over ChatGPT-type Tools at Work, Says U.K.’s NCSC 

Tenable

1 – NCSC: Be careful when deploying AI chatbots at work When adopting AI chatbots powered by large language models (LLMs), like ChatGPT, organizations should go slow and make sure they understand these tools’ cybersecurity risks. National Cyber Security Centre. That’s the advice dispensed this week in a pair of blogs by the U.K.

ChatGPT 62
article thumbnail

Learning From the Past — Ten 2022 Cybersecurity Events to Know

Palo Alto Networks

While it might seem counterintuitive to revisit last week’s newspaper for valuable information, “Those who cannot remember the past are condemned to repeat it.” Stepping back to recollect the security events from the recent past is particularly important, as the risk of repeating past mistakes is particularly high. Beginning on Jan.

Malware 70
article thumbnail

What Is cloud security?

Lacework

At this time, establishing server securing meant focusing on physical measures and preventing unauthorized individuals from accessing the hardware. Amazon released Amazon Web Services (AWS) in 2002, Google launched Google App Engine’s beta version in 2008, Microsoft’s Azure made its debut in 2010, and Google Compute Engine premiered in 2012.

Cloud 98