article thumbnail

Koch CTO teams up to get cloud networking right

CIO

Integrating a new network after an acquisition can be a sizable headache for any CIO. Traditionally, to integrate its acquisitions, Koch would flatten the acquired company’s core network, says Matt Hoag, CTO of business solutions at Koch. It’s more complicated than standard networking, Hoag says. Laying the foundation.

Network 189
article thumbnail

How to minimize remote access cyber security threats in 2024

CIO

The key types of exposures, in order of prevalence, include web framework takeover, remote access services, IT and networking infrastructure, file sharing, and database exposures and vulnerabilities. Web framework takeover and remote access service exposures accounted for over 40% of exposure types. To learn more, visit us here.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Phishers target oil and gas industry amid Covid-19 downturn

The Parallax

In some cases, that’s already happening, says Tom Murphy, chief technology officer at network security provider Nuspire. Attacks are becoming more complex because so many people are working from home and are outside of their employers’ firewalls,” he says. But they’re getting better at that.

Industry 200
article thumbnail

Palo Alto Networks: Proactively Averting Cyber Attacks

CTOvision

Products from Palo Alto Networks can give you that platform approach. Palo Alto Networks promises to safely enable applications to prevent both known and unknown threats for all users on any device, and any network, physical or virtual, in a highly automated way, while sharing threat intelligence with their customers.

Network 111
article thumbnail

10 highest-paying IT jobs

CIO

Those working in IT management, including the roles of CIO, CTO, VP, and IT Director, hold high-level positions that oversee an entire company’s technology infrastructure. Meanwhile, the CTO focuses on technology research and development efforts, often working closely with the CIO to develop a strong IT strategy.

article thumbnail

Leveraging Cybersecurity to Supercharge Retail’s Frontline

CIO

By Ravi Balwada, CTO of Guitar Center In retail, we don’t have the luxury of thinking about security as an afterthought. We are replatforming our firewalls and leveraging new technology around identifying threat patterns—isolating problems when necessary, isolating our environments so they are more effective. IT Leadership

CTO 130
article thumbnail

Palo Alto Networks Uses Neural Networks to Attack Insider Threat

CTOvision

Interestingly enough, Palo Alto Networks is working on ways to help its customers leverage the high fidelity data coming out of its Enterprise Security Platform. A SOM is a type of artificial neural network that uses unsupervised learning to produce a discretized representation of its input.

Network 101