article thumbnail

Increase customer protection with edge security

CIO

Traditional IT security methods are increasingly flawed and the volume and sophistication of threats continue to increase. New security methods delivered at the edge of the network, closer to the customer, are emerging as a more effective method for combating the increase in security threats.

Firewall 261
article thumbnail

Window Snyder’s new startup Thistle Technologies raises $2.5M seed to secure IoT devices

TechCrunch

The Internet of Things has a security problem. The past decade has seen wave after wave of new internet-connected devices, from sensors through to webcams and smart home tech, often manufactured in bulk but with little — if any — consideration to security. Security veteran Window Snyder thinks there is a better way.

IoT 207
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The network is your office intelligence center

CIO

You can’t manage what you can’t measure, and y our network is more than a data conduit—it’s your office intelligence center. As an IT decision maker, it’s up to you to transform your network for the future so it can anticipate worker needs, reduce energy usage, reinforce security, and deliver real-time data for a faster path to innovation.

Network 195
article thumbnail

Endpoint security and the rise of Managed Device Services

CIO

But as the security threat landscape becomes more complicated, and hybrid and remote working models take root at scale, IT leaders are questioning this traditional approach to device management. Security is a key driver. In this environment, endpoint security becomes increasingly important.

Windows 246
article thumbnail

What you need to know about Okta’s security breach

CIO

On October 20, 2023, Okta Security identified adversarial activity that used a stolen credential to gain access to the company’s support case management system. The exposure of personal or sensitive information can lead to identity theft, phishing attacks, and other forms of cybercrime. There is no silver bullet in cybersecurity.

article thumbnail

Securing the Cloud Native Transition for Windows Applications on AKS

Aqua Security

As a critical next step in securing Microsoft Windows containers running on Azure Kubernetes Service (AKS), Aqua Security has worked with Microsoft to make it easy for customers to deploy, upgrade, and auto scale deployment of cloud runtime security, assurance enforcement, networking segmentation and monitoring for AKS Windows nodes running on containerd. (..)

Windows 111
article thumbnail

IoT Adoption in Healthcare Brings Security Opportunities

CIO

By Anand Oswal, Senior Vice President and GM at cyber security leader Palo Alto Networks Connected medical devices, also known as the Internet of Medical Things or IoMT, are revolutionizing healthcare, not only from an operational standpoint but related to patient care. But ransomware isn’t the only risk.

IoT 252