article thumbnail

Your biggest barriers to digital transformation aren’t technical…they’re cultural

CIO Business Intelligence

As an infrastructure and security practitioner with nearly 30 years of experience, I’ve witnessed periods of rapid change in the technology landscape. For decades, organizations have considered networking and security a cost of doing business. Our networking and security methods have been successful.

article thumbnail

Ransomware, zero-day exploits keep network security pros scrambling

Network World

The networks that enable today’s hyper-distributed enterprises face persistent and emerging security challenges. By comparison, the firm saw data theft in only about 40% of cases in a mid-2021 analysis. So now, one of our hot topics is how to detect such fraud – our API security team is all over it right now,” Anderson said.

Network 131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘The Everything War’: Inside Amazon with author and Wall Street Journal reporter Dana Mattioli

GeekWire

.” Amazon’s lax internal controls for confidential data: “I learned that Amazon, even though they’re one of the biggest, most sophisticated companies in the world, has very primitive firewalls in place to protect confidential data. Any comparison of the two companies is not based in reality.”

Journal 96
article thumbnail

Unbiased third-party testing is critical for network security

CIO Business Intelligence

Today, CIO and CISO teams are tasked with multiple business-critical initiatives like securing and connecting work-from-anywhere employees, moving applications to the edge or the cloud, and securing operational technology (OT) and IT environments. security effectiveness rating.

Network 81
article thumbnail

Technology Short Take #50

Scott Lowe

This is kind of cool, and (in my humble opinion) a sign of changing times: Juniper has Vagrant boxes as well as a Vagrant plugin for working with vSRX (virtual firewall) VMs (via this article from Matt Oswalt). Kevin Houston’s March 2015 blade server comparisons might be a useful place to start. Servers/Hardware.

Vmware 60
article thumbnail

Technology Short Take #63

Scott Lowe

Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall. In talking with customers, I find that one of the things that really challenges their thinking is how to best utilize security groups to their maximum effect. Servers/Hardware.

Vmware 60
article thumbnail

Technology Short Take #49

Scott Lowe

Anthony Burke (disclaimer: Anthony works for VMware in the NSBU) has a post on how to use Python to automate the bulk creation of firewall rules for use with the VMware NSX distributed firewall. As we evolve towards more automated/orchestrated environments, it’s important we don’t leave security behind.

Vmware 60