Remove Agile Remove Firewall Remove Internet Remove Security
article thumbnail

Cathay Pacific to take cloud journey to new heights

CIO

Cloud optimization is the new initiative in 2024,” says Rajeev Nair, general manager of IT infrastructure and security at Cathay, a major airliner and cargo carrier in the Asia-Pacific region, with headquarters in Hong Kong. It will replace the standard MPLS network, he adds. It will replace the standard MPLS network, he adds.

Airlines 298
article thumbnail

What Executives Should Know About Shift-Left Security

CIO

Shift-left security” is the concept that security measures, focus areas, and implications should occur further to the left—or earlier—in the lifecycle than the typical phases that used to be entry points for security testing and protections. How did the term shift-left security originate?

Security 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Power of One

CIO

When we look ahead at the key trends shaping the next 12 months, decentralised, secure, cloud-based solutions are enabling businesses of all sizes to adopt technologies that have been deployed successfully by larger enterprises. The risks can be mitigated however, with a managed firewall, endpoint security, good policies, and user training.

article thumbnail

How Executive Culture Can Compromise Your Security

Palo Alto Networks

I bought [insert flavor-of-the-year security solution]. Your manifold millions of dollars of security solutions and personnel were subverted in a savvy feat of technomancy by threat actors and, instead of some new zero day, they exploited a CVE from 2019. Does the organization create a culture of security as a core philosophy?

Culture 98
article thumbnail

Myth #1: Network Security Compliance Is Not All About Rules and Access Control

Firemon

This is part 1 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Yet some businesses still think that if they can tick every box in a compliance checklist, they are secure. Learn the Truth about the 4 Myths of Security Policy Compliance.

article thumbnail

Top Kubernetes Security Best Practices You Should Know

Altexsoft

Kubernetes Security Concerns in the Field. A large part of this challenge is ensuring secure deployments. According to recent research , 94 percent of those surveyed had experienced a container security incident in the last year. Kubernetes Security: Key Considerations. Balancing security and agility.

article thumbnail

Technology Consulting and Solutions: Types and Why It Matters

Openxcell

With a wide range of services, the companies now also offer Cloud Migration, Artificial Intelligence, Cybersecurity, Data Science, and SaaS solutions. The security of data is enhanced The importance of data security cannot be overstated in today’s globally connected world.