Remove Article Remove Fractional CTO Remove Information Security Remove Network
article thumbnail

Cognitio’s Roger Hockenberry Cited in BizTechReports

CTOvision

In the aftermath of high-profile data breaches at Sony, Target and Home Depot, chief information officers (CIOs), chief information security officers (CISOs) and other IT security professionals both in government and the private sector are playing from behind. . Intelligence Community.

article thumbnail

Jeremiah Grossman: Focus on ransomware, SDLC, and endpoints

Network World

With so many elements in information security -- application, network infrastructure, the endpoint, perimeter defenses, and data-centric approaches -- it's easy to fall in the trap of touting one as more important than the other. To read this article in full or to leave a comment, please click here

SDLC 65
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Top 10 Quotes About Cloud Security

SecureWorld News

The idea of the traditional corporate network is changing. And we need to be out in front of that change to ensure our users are secure, and that we're giving them the best experience that we can." — Adam Leisring, CISO, Paycor, during his keynote at SecureWorld Cincinnati-Detroit-Toronto. #3. Due diligence is absolutely required.

Cloud 52
article thumbnail

Class of 2017 Yearbook: The Premier 100 Technology Leaders

ComputerWorld IT Management

Garcia Chief technology adviser Manila Water. Gint Grabauskas CTO Vixxo. Saravanan Gurumurthy CTO ForwardLine. Haskell CTO Planned Systems International. Paul Lough Vice president, technology strategy and planning, and CTO Navy Federal Credit Union. Nickolaisen Senior vice president and CTO O.C.

article thumbnail

Savvis Announces Availability of Rebuilt Cloud Data Center » Data.

Data Center Knowledge

and Cisco’s Unified Data Center technologies, it’s aimed at enterprise hybrid needs. Businesses are looking to migrate applications hosted on-premise into the cloud using a variety of hybrid solutions,” said Andrew Higginbotham, chief technology officer at Savvis. Networking. Featured Cloud Articles.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

You got into a network. CLEMENS: And really I was just starting that in the vein of old DEF CON and 2600 stuff where it was, we should share information. But I was given a Class A network, and I deployed as many snort sensors on it all over. It seems like it was just there to have a network of people to try to approach us.