article thumbnail

Aligning security and business strategies

CIO Business Intelligence

By Sean Duca, vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks Some economists predict that we could soon face a global recession. During the 2008–2009 Global Financial Crisis (GFC) and subsequent recession, researchers noted that cybercrime rates increased dramatically.

article thumbnail

Coding for the Future of U.S. National Defense

CIO Business Intelligence

A combined Broadcom-VMware will empower customers to modernize and architect their IT infrastructure with large-scale, secure, and reliable yet flexible solutions. The move to multi-cloud is changing the way modern software applications are designed and built. Just last month, the U.S. soldiers and service personnel.

Vmware 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Good Read: Web 2.0 Security Dangers - Social, Agile, and.

Social, Agile and Transformation

I cover topics for Technologists from CIOs to Developers - agile development, agile portfolio management, leadership, business intelligence, big data, startups, social networking, SaaS, content management, media, enterprise 2.0 Tuesday, July 15, 2008. Security Dangers. Labels: security , web 2.0. software qa. (8).

Agile 100
article thumbnail

Federal Big Data Community Convenes 6 Feb at Apache Hadoop Forum

CTOvision

Prior to Cloudera, his most recent role was as vice president and general manager of enterprise security at HP. Previous to HP, Tom served as CEO of enterprise security company ArcSight , which HP acquired in 2010. Tom led ArcSight through a successful initial public offering and subsequent sale to HP. To register see: ctolink.us/1l2h9AN

Big Data 283
article thumbnail

Top Ten Attributes of Agile Platforms

Social, Agile and Transformation

Diagnostics and troubleshooting should be easy - If the development or operations team need to call the platforms Technical Support, then thats a big red flag. Well defined security model - Security capabilities often need to be evaluated prior to any prototyping, so the model and capabilities need to be well defined and easy to leverage.

Agile 172
article thumbnail

NJVC® Introduces Cloudcuity? AppDeployer to Create and Sell

Cloud Musings

18, 2012 — NJVC ® , an information technology (IT) solutions provider headquartered in Northern Virginia, introduces Cloudcuity™ AppDeployer , a new and innovative platform a s a service that allows developers to quickly create and publish software-as-a-service applications for sale in the cloud. Vienna, Va. ,

Cloud 99
article thumbnail

Attend the 6 Feb @Cloudera Federal Forum: For the Analyst, Data Scientist, #BigData Technologist in DC

CTOvision

Prior to Cloudera, his most recent role was as vice president and general manager of enterprise security at HP. Previous to HP, Tom served as CEO of enterprise security company ArcSight , which HP acquired in 2010. Tom led ArcSight through a successful initial public offering and subsequent sale to HP.

CTO 294