article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

Wireless 226
article thumbnail

Meet the 50 CISOs to Watch in 2024

Lacework

Lacework is proud to present our second annual group of 50 CISOs to Watch, a compilation of the most visionary and effective cybersecurity leaders in the industry. In a field driven by constant change, what sets a cybersecurity leader apart? With new cybersecurity regulations like the U.S.

Security 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

NSA leader to hackers: Cybersecurity’s a team sport

The Parallax

LAS VEGAS—It wasn’t so long ago that DefCon attendees enthusiastically engaged in the conference pastime “ Spot the Fed ”—clearly separating themselves from employees of federal organizations like the National Security Agency, if not demonizing them. Comic book illustrates ex-NSA analyst’s outlook on online security (Q&A).

Sport 187
article thumbnail

AI in Security — Ready for Prime Time

Palo Alto Networks

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a regular blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with roles in AI research, product management, consulting, engineering and more.

article thumbnail

Why you can’t ignore cloud security

CIO

Over the past few years, enterprises across Australia have moved more and more of their systems and applications to the cloud, with the trend only gathering pace with people increasingly working outside the traditional network perimeter, often at home and other locations.

Cloud 226
article thumbnail

Israel’s cybersecurity industry is a unicorn. Here’s why

The Parallax

Fewer attendees, perhaps, expected him to reference the Hollywood action movies of Jean-Claude van Damme, who happened to be sitting in the front row for the highest-profile speech of Israel’s largest cybersecurity conference. Cybersecurity is a true blood sport,” Netanyahu quipped.

Industry 189
article thumbnail

We’ve Got Next: Building the “Next” in CyberSecurity

Palo Alto Networks

Over the next few weeks, you may come across our new We’ve Got Next anthem film on broadcast TV, social media or the Palo Alto Networks website. The term “We’ve Got Next” responds to a critical need in cybersecurity in this moment: being ready for the next challenge, the next threat and the next opportunity.

WAN 98