article thumbnail

CSO30 Awards: Introducing the top 30 security leaders in the UAE

CIO Business Intelligence

Attended by key stakeholders from government, business, and academia, the event provided a platform for networking, knowledge sharing, and collaboration among cybersecurity professionals. Ali Alkaf Alhashmi VP, Cyber Security & Technology, Mubadala Investments 4. Ayoub Fathi, Vice President of Information Security, CISO noon 7.

Security 104
article thumbnail

DoD Announces Third 'Hack the Pentagon' Bug Bounty Program

SecureWorld News

The program, first launched in 2016, aims to leverage the expertise of the private sector and commercial crowdsourcing best practices to enhance the information security of the DoD. The program is being managed by Defense Digital Services (DDS), which is responsible for managing technical risks and vulnerabilities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Patient Portal Puts a Spotlight on Secure Messaging

CTOvision

Secure Messaging Requires Authentication and Secure Networks. Messaging solutions are applications within portals; as such, they are as secure as the portals, networks, policies and protocols that support them. Network Security.

Security 267
article thumbnail

Tech Moves: Adriane Brown joins KKR board; AI2 adds HR exec; Ossia and LevelTen hire CFOs; more

GeekWire

Brown previously served as president and COO of Intellectual Ventures, and president of Honeywell Transportation Systems. F5 Networks Photo). — F5 Networks named Equinix Chief Information Security Officer and Microsoft alum Michael Montoya to its board of directors. Read the story. Michael Montoya. (F5

Energy 120
article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO Business Intelligence

Over 100,00 organizations are expected to be impacted by Network and Information Security Directive (NIS2) cybersecurity standards that European Union (EU) member states must implement by October 2024. [i] Zero Trust network security offers cybersecurity benefits vs. traditional perimeter-based network security models.

article thumbnail

The 4 pillars of the Zscaler Zero Trust Exchange: Customers share their successes

CIO Business Intelligence

The attack surface now extends to home offices, cloud applications, and public clouds, and there is an ever-increasing risk of lateral threat movement within highly interconnected hub-and-spoke networks protected by castle-and-moat security models. Since the deployment, NOV has experienced 35 times fewer security events. “We

article thumbnail

Securing 5G for 2023 and beyond

CIO Business Intelligence

By Anand Oswal, Senior Vice President and GM at cyber security leader Palo Alto Networks While mobile technology has been around for decades, the current generation, 5G, is increasingly being recognized for the exciting new benefits it brings to enterprises, SMBs, and public sector organizations. 5G is designed to go places.

Security 122