article thumbnail

10 cloud strategy questions every IT leader must answer

CIO

IT leaders at the 60-year-old fleet management firm determined that cloud could support its rapid growth without the challenges of maintaining data centers. If the answer is no,” Upchurch says, “you may just be renting someone else’s data center.” How will we balance security, agility, and usability?

Strategy 362
article thumbnail

3 things CIOs can do to make gen AI synch with sustainability

CIO

“If you’re only buying inference services, ask them how they can account for all the upstream impact,” says Tate Cantrell, CTO of Verne, a UK-headquartered company that provides data center solutions for enterprises and hyperscalers. Inference output takes a split second.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cooperation and Collaborative Partnerships are Key to Protect Businesses

Palo Alto Networks

I t takes a collaborative approach across cybersecurity vendors, managed security service providers (MSSP) and organizations to take up the global cyber threat challenge. Another example of cooperation in cybersecurity is Unit 42 , the Palo Alto Networks threat intelligence team. Cyber Threats Are a Global Challenge .

Malware 98
article thumbnail

CIOs step up to fill plus-size leadership roles

CIO

Jonnala stepped in as CIO at network infrastructure provider CommScope two years ago after more than a dozen years spent at the company in various roles leading business and technology transformation. With that added role under his belt, Strickland was soon tapped for other plus-roles along with a direct report structure to the CEO.

article thumbnail

Utilities, Strategic Investments, and the CIO

The Agile Manager

The proto-CIO is a strong technologist with vendor management and negotiating skills, with a steady-as-she-goes disposition. Also, the needs and priorities will change over time: to the CIO, the minutia of cyber-security are more important and the details of the data center less important today than they were a decade ago.

article thumbnail

Attack Surface: Definition, Management and Reduction Best Practices

Kaseya

As previously mentioned, an attack surface represents all the touchpoints on your network through which a perpetrator can attempt to gain unauthorized access to your software, hardware, network and cloud components. Ways to protect your network from cyberattacks and breaches. Why is attack surface management important?

article thumbnail

Why the Age of the Cloud Native Security Platform Is Here to Stay

Palo Alto Networks

By John Morello , vice president of product, Prisma, Palo Alto Networks. A CNSP thus must be able to provide monitoring, visibility and remediation of these provider layer components while also correlating data and applying policy across the compute components of cloud native, composite apps. Compliance management. IAM Security.

Cloud 64