article thumbnail

A Practical History of the Firewall – Part 3: Performance Takes Center Stage

Firemon

As internet speeds increased and firewall adoption inside the enterprise increased, performance drove purchasing decisions. Enter Netscreen, the firewall appliance, and the Application-Specific Integrated Circuit (ASIC). Netscreenintroduced the purpose-built firewall “appliance.” Cisco was selling the PIX in the 90s.

article thumbnail

Modern Network Security: How Technology and Smart Practices are Reducing Risk

CIO

With the shift to hybrid work, data, applications, intellectual property, and personal information is no longer stashed safely behind a corporate firewall. In this webcast, we’ll explore: The current trending threats facing networks, like authentication vulnerabilities, malware, phishing, and denial of service attacks.

Network 245
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to minimize remote access cyber security threats in 2024

CIO

These companies heavily rely on remote access services, which can be a significant attack vector due to insecure servers, inadequate security protocols, cloud misconfigurations, exposure of security infrastructure (such as routers and firewalls), and more. Change your vulnerability mindset to identify legacy vulnerability management systems.

article thumbnail

Four questions for a casino InfoSec director

CIO

With the CSO50 Conference + Awards coming to the We-Ko-Pa Casino Resort in Fort McDowell, Arizona, October 2-4, we asked Bill Tsoukatos, Information Technology Director at Fort McDowell Enterprises, which owns the resort, to tell us what it’s like to manage IT security at a casino property.

article thumbnail

A CISO POV: Securing AI in your company

CIO

Firewall capability for AI security: Enhance security measures by providing firewall capabilities to safeguard against potential AI-related vulnerabilities. I’ve heard of companies creating a separate set of policies for every transformative technology. That means your control framework is lacking. Embrace AI—it’s here!

article thumbnail

PHI and Online Tracking Technologies

Perficient

Recently, the Health and Human Services Department (HHS) came out with guidance regarding the use of online analytics technologies. Many think that Patient data is behind firewalls and logins and not available on a simple.com site. Let’s break down the advice around tracking and HIPAA This is applicable to online tracking technologies.

article thumbnail

Governance and Fighting the Curse of Complexity

CIO

Authentication. New systems, new technologies, new approaches will continue to increase IT complexity. Moreover, new sources of ever expanding data produced by generative AI and the unfettered growth of unstructured data introduce even more challenges. There’s the complexity of security in the organization. Password strategies.