article thumbnail

A CISO POV: Securing AI in your company

CIO Business Intelligence

Firewall capability for AI security: Enhance security measures by providing firewall capabilities to safeguard against potential AI-related vulnerabilities. Patricia was previously the CISO at Markel Insurance, Freddie Mac, Symantec, and Unisys, and her insights have always been extremely valuable to her peers.

Company 72
article thumbnail

Cathay Pacific to take cloud journey to new heights

CIO Business Intelligence

Data management is another key priority for Cathay this year, as the company aims to consolidate data feeds and data repositories from its multiple data warehouses to better enable analytics in all applications, Nair says.

Cloud 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Leveraging MITRE ATT&CK: How Your Team Can Adopt This Essential Framework

CIO Business Intelligence

They couldn’t synthesize all their data and intelligence to answer critical questions such as: Where is the attacker located? It was clear this organization needed the MITRE ATT&CK framework to better understand their intelligence and derive insights into the impact on their critical assets. What is the attacker’s motivation?

Security 105
article thumbnail

Outmaneuvering the Adversary: How to Detect Cyberthreats You Didn’t Know Were There

CIO Business Intelligence

This includes relevant global threat data, including actor, technique, and indicator intelligence. Called the Attack Flow project , it’s a data format for describing sequences of adversary behavior that the Center for Threat-Informed Defense is developing in collaboration with cybersecurity leaders.

How To 97
article thumbnail

Fountainhead: What Is Meant by a "Cloud-Ready" Application?

Fountainhead

Insights into Data Center Infrastructure, Virtualization, and Cloud Computing. unique network topology (including load balancing, firewalls, etc.). We all know that large software and platform vendors (think: Oracle, SAP, Microsoft, Symantec, Citrix, CA, IBM, HP etc.) Big Data. (6). Data Center efficiency. (1).

article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

However, conventional solutions such as antivirus, firewalls, and other detection and blocking tools can only offer a limited level of security. Reliable and substantial computing power is also necessary to handle real-time data, analyze secure components, create a live stream for the end-user, and accommodate all incoming traffic.

article thumbnail

Are next-generation firewalls legacy technology?

Network World

A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. NGFWs followed in the footsteps of earlier firewalls—physical appliances installed inline to protect private networks from the public Internet. Cisco ACI, CloudPassage, Illumio, Unisys, vArmour, VMware NSX, etc.).