article thumbnail

Just Released and Ready for Download — Software Firewalls for Dummies

Palo Alto Networks

If you want to protect applications and workloads throughout today’s complex and interrelated environments, you need software firewalls. You can better understand the extensive need and numerous use cases for virtual firewalls, container firewalls and managed cloud firewalls with our essential guide, “ Software Firewalls for Dummies.”

article thumbnail

4 ways CISOs can manage AI use in the enterprise

CIO

Over the summer, I wrote a column about how CIOs are worried about the informal rise of generative AI in the enterprise. Since then, many CIOs I’ve spoken with have grappled with enterprise data security and privacy issues around AI usage in their companies. That column may have been the understatement of the year.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Architect defense-in-depth security for generative AI applications using the OWASP Top 10 for LLMs

AWS Machine Learning - AI

Many customers are looking for guidance on how to manage security, privacy, and compliance as they develop generative AI applications. We first delve into the vulnerabilities, threats, and risks that arise from the implementation, deployment, and use of LLM solutions, and provide guidance on how to start innovating with security in mind.

article thumbnail

Cathay Pacific to take cloud journey to new heights

CIO

Cloud optimization is the new initiative in 2024,” says Rajeev Nair, general manager of IT infrastructure and security at Cathay, a major airliner and cargo carrier in the Asia-Pacific region, with headquarters in Hong Kong. Cathay launched its cloud journey four years ago, and its migration has accelerated over the past three years.

Airlines 298
article thumbnail

Radically simplify and expand Zero Trust to cloud workload

CIO

However, securing the cloud traffic from these workloads is a complex task, as cloud adoption increases, and the number of mission-critical workloads spread across multiple cloud providers. One of the most significant areas that organizations are revisiting is secure cloud and workload connectivity.

Cloud 246
article thumbnail

AWS CloudTrail Best Practices, SIEM, and Lacework

Lacework

Security and the move to the Cloud A cornerstone of comprehensive cybersecurity programs is the ability to operationalize log data, such as alerting, reporting, or automation.

AWS 98
article thumbnail

Why you must extend Zero Trust to public cloud workloads

CIO

However, it has also introduced new security challenges, specifically related to cloud infrastructure and connectivity between workloads as organizations have limited control over those connectivity and communications. 3 We have seen an increase of 15% in cloud security breaches as compared to last year. 8 Complexity.

Cloud 338