Remove Firewall Remove Security Remove Strategy Remove Technology
article thumbnail

Why are cybersecurity asset management startups so hot right now?

TechCrunch

In the world of cybersecurity, you can’t secure something if you don’t know it’s there. Enter cybersecurity asset management, an admittedly unsexy fragment of the booming industry that investors have shown an ever-increasing appetite for over the past 18 months. Assets, assets everywhere. Shawn Cherian. ” . ”

Security 239
article thumbnail

How security fears are driving network modernization

CIO

The shift to hybrid working requires more openings in firewalls, which in turn places a premium on frequent upgrades to firewall protections. Research findings show that 93% of organization see the convergence of security and networking as a key focus of how future network characteristics will be changing.

Network 321
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

10 cloud strategy questions every IT leader must answer

CIO

Although some continue to leap without looking into cloud deals, the value of developing a comprehensive cloud strategy has become evident. Without a clear cloud strategy and broad leadership support, even value-adding cloud investments may be at risk. And it’s never too late for CIOs to reassess their cloud strategies.

Strategy 363
article thumbnail

Why IT leaders are putting more business spin on security spend

CIO

Gartner projects that spending on information security and risk management products and services will grow 11.3% To better focus security spend, some chief information security officers (CISOs) are shifting their risk assessments from IT systems to the data, applications, and processes that keep the business going.

Security 279
article thumbnail

Modern Network Security: How Technology and Smart Practices are Reducing Risk

CIO

For networking security leaders, too many blind spots in their network security operations means too many vulnerabilities. With the shift to hybrid work, data, applications, intellectual property, and personal information is no longer stashed safely behind a corporate firewall. Network Security

Network 245
article thumbnail

A CISO POV: Securing AI in your company

CIO

In my recent column, I delved into the challenges enterprises face in integrating AI into the workplace and outlined strategies for CISOs to monitor or control the use of AI effectively. Firewall capability for AI security: Enhance security measures by providing firewall capabilities to safeguard against potential AI-related vulnerabilities.

article thumbnail

Cathay Pacific to take cloud journey to new heights

CIO

Cloud optimization is the new initiative in 2024,” says Rajeev Nair, general manager of IT infrastructure and security at Cathay, a major airliner and cargo carrier in the Asia-Pacific region, with headquarters in Hong Kong. Enhanced automation and self-service will also be emphasized as part of the cloud optimization strategy, Nair says.

Airlines 298