article thumbnail

An Edge Vision for the Metaverse

CIO

After all, you wouldn’t want your haptic glove to misbehave in the metaverse or your autonomous vehicle sensors to be hijacked by malware. The edge infrastructure also needs to be elastic, reliable and fault tolerant. Kubernetes is a sensible technology that scales well and is self-healing. Operating Systems for the edge.

CTO 240
article thumbnail

Register now: GenAI, risk & the future of security

CIO

Along with the promise is the peril of AI being used to cause harm by launching more efficient malware, creating sophisticated deepfakes, or by unintentionally disclosing code or trade secrets. The promise of generative AI means we are on the cusp of a rethinking of how businesses handle cybersecurity. Check out the full summit agenda here.

Malware 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Ketch raises another $20M as demand grows for its privacy data control platform

TechCrunch

Returning with Acrew for the second round are CRV, super{set} ( the startup studio founded by Ketch’s co-founders CEO Tom Chavez and CTO Vivek Vaidya ), Ridge Ventures and Silicon Valley Bank. Once the infrastructure is in place for data control it needs to be at the level of individual cells and rows, he said. “If

Data 239
article thumbnail

Build Endpoint Security into Your Zero Trust Strategy

Palo Alto Networks

Let’s start with a quick overview of Zero Trust: As described by Palo Alto Networks CTO Nir Zuk , “Zero Trust is an end-to-end cybersecurity strategy that spans the infrastructure. Integrated visibility across your infrastructure. This post is part of a series covering “ Zero Trust Throughout Your Infrastructure.”.

article thumbnail

A Practical History of the Firewall – Part 4: The Next Generation

Firemon

Customers had significant investment in existing infrastructure, and migration from one firewall vendor to another was (and still is) extremely challenging. Threat response, malware detection and blocking, network-based user verification with multi-factor authentication, dynamic blacklists and more. A very impressive track record.

article thumbnail

The Vital Zero Trust for Private Cloud Event

Palo Alto Networks

This event has been designed for you to make the most of the expertise of security visionaries and industry experts, including Founder and CTO Nir Zuk. How and why Palo Alto Networks Founder and CTO Nir Zuk envisions the need for applying a Zero Trust architecture for your private cloud’s digital transformation journey. Consider this.

Cloud 83
article thumbnail

RedOwl Analytics Named “Most Innovative Company at RSA Conference”

CTOvision

Gerhard Eschelbeck, Chief Technology Officer and Senior Vice President, Sophos. Cylance PROTECT takes a mathematical approach to malware identification, utilizing patent-pending machine learning techniques instead of signatures and sandboxes. CTO Cyber Security DoD and IC George Hoyem RSA RSA Conference'