article thumbnail

Cathay Pacific to take cloud journey to new heights

CIO

Cloud optimization is the new initiative in 2024,” says Rajeev Nair, general manager of IT infrastructure and security at Cathay, a major airliner and cargo carrier in the Asia-Pacific region, with headquarters in Hong Kong. It will replace the standard MPLS network, he adds. It will replace the standard MPLS network, he adds.

Airlines 298
article thumbnail

SGNL.ai secures $12M to expand its enterprise authorization platform

TechCrunch

Kriz and SGNL’s second co-founder, Erik Gustavson, spent roughly a decade developing identity solutions at Bitium, which they co-launched in 2011, before conceiving of SGNL. The modern workforce is no longer operating from inside a corporate firewall using only on-premise applications,” Kriz added.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

ISO 27001 update gives a cloud callout to help you build your security practice

Lacework

For many years, the ISO 27001 certification has been an industry benchmark to show compliance with standard security practices. As a security executive, I’ve used the ISO framework as a way to measure how serious my 3rd party suppliers were about security. In the last 10 years, the security world has changed dramatically.

article thumbnail

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

By Bob Gourley We often highlight the importance of applying security controls to your enterprise. As a review, they are: 20 Critical Security Controls – Version 4.1. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. Application Software Security.

article thumbnail

Machines won’t replace threat hunters until they master this one skill

Lacework

Even those in the world of cybersecurity are wondering where those boundaries lie. That’s in large part because with the world’s growing focus on cybersecurity, we’re seeing increasingly more threat detection tools with advanced capabilities. What do threat hunters do that cybersecurity tools can’t?

article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

By Bob Gourley 2014 Guidance Software Federal Summit: Cybersecurity | E-Discovery | Enterprise Forensics. Recognized as a pioneer in the field of classified information protection, Mr. Bigman developed technical measures and procedures to manage the nation’s most sensitive secrets. Government. Register Now! Space is Limited.

article thumbnail

Myth #2: Compliance Is Only Urgent When There’s an Audit

Firemon

This is part 2 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Regulations continued to change, but firewall policies may or may not have been updated. Why are Network Security Audits So Hard? Read part #1 here. . And the fire drill begins.