article thumbnail

A Practical History of the Firewall – Part 3: Performance Takes Center Stage

Firemon

As internet speeds increased and firewall adoption inside the enterprise increased, performance drove purchasing decisions. Enter Netscreen, the firewall appliance, and the Application-Specific Integrated Circuit (ASIC). Netscreenintroduced the purpose-built firewall “appliance.” Cisco was selling the PIX in the 90s.

article thumbnail

How to minimize remote access cyber security threats in 2024

CIO

Organizations have shifted to remote desktop work environments at an increasing speed since then – simultaneously expanding their attack surface and exposing themselves to greater cybersecurity threats. Interestingly enough, high-tech companies were also among the top organizations targeted by threat actors.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Safeguarding your digital ecosystem: effective strategies to detect and mitigate API abuse

CIO

This article explores effective strategies that empower organizations to safeguard their systems and valuable data. Strategy 1: Implement strong authentication and authorization mechanisms Enforcing robust authentication and authorization mechanisms is a fundamental step in preventing API abuse.

Strategy 228
article thumbnail

Why you must extend Zero Trust to public cloud workloads

CIO

Today, many organizations are embracing the power of the public cloud by shifting their workloads to them. Additionally, 58% of these organizations use between two and three public clouds, indicating a growing trend toward multi-cloud environments. It’s not as simple as just extending traditional firewall capabilities to the cloud.

Cloud 328
article thumbnail

A CISO POV: Securing AI in your company

CIO

The focus was on ensuring safe generative AI practices within organizations. Firewall capability for AI security: Enhance security measures by providing firewall capabilities to safeguard against potential AI-related vulnerabilities. How has AI penetrated the typical enterprise? And how much is ‘bootleg’ usage?

article thumbnail

Governance and Fighting the Curse of Complexity

CIO

There’s the complexity of security in the organization. Authentication. Complexity robs the organization of its focus. And organizations should employ governance rules to define the sources of truth in terms of what data should be used and when and where that data resides. Password strategies. Incident response plans.

article thumbnail

Optimizing PCI compliance in financial institutions

CIO

CCA prerequisites Large organizations usually govern their IT portfolio via global architectural patterns, which can be thought of as building blocks, and include IT security patterns. As a result, the greater the number of redundant patterns (available solutions that provide the same result) used by an organization, the larger the CCA.