article thumbnail

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

One of the many topics coved at the event was software defined perimeter and cloud security alliance. Coca-Cola was used as a case study. CTO Cyber Security News Video Bob Flores Chief information officer Chief information security officer CISO Coca-Cola Computer security Internet of Things Sierra Ventures'

article thumbnail

‘The key is the cloud’: How to keep up with the speed of innovation

CIO Business Intelligence

At DISH Network , cloud-adoption strategies vary by when the parts of its business started – from those born in the cloud to legacy sectors deploying cloud on an opportunistic basis. But one thing is clear to Atilla Tinic, the company’s EVP and CIO: “I do think the key is the cloud.” And hear how the U.S.

Cloud 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloud Musings by Kevin L. Jackson: Bahrain International.

Cloud Musings

Cloud Musings by Kevin L. Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. Cloud Musings on Forbes. NJVC Cloud Computing. Get "Cloud Musings" by RSS. Cloudcuity Secure, Unified Cloud Management and Control Services.

Cloud 119
article thumbnail

3 certification tips for IT leaders looking to get ahead

CIO Business Intelligence

Typically, CIOs consider certifications as a means for training up IT staff on vital skills around key initiatives such as cybersecurity, data analytics, AI, or the cloud. Mehta earned a Certified Information Security Auditor certification in 2002 when, he says, “there were only 1,600 such certified professionals globally.”

Insurance 122
article thumbnail

You’re not alone in the cyber battlefield

Dataconomy

They should also have a strong track record of delivering successful security solutions to clients. Technology capabilities A robust technology infrastructure is essential for an MSSP to provide effective security services. ISO 27001 is an internationally recognized standard for information security management.

article thumbnail

Best IT and Tech Blogs – Must Read Information Technology Resources 2019

Galido

These areas of IT include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Below are 50+ of our favorite Information Technology Blogs – great suggested reads and follows to help stay ahead of the curve.

Resources 113
article thumbnail

Tech Blogs – Best Must Read Tech Resources 2019

Galido

These areas of tech include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. If you have an Information Technology Blog you would like to suggest, please submit a listing. Help Net Security.

Resources 107