article thumbnail

A CISO POV: Securing AI in your company

CIO Business Intelligence

Firewall capability for AI security: Enhance security measures by providing firewall capabilities to safeguard against potential AI-related vulnerabilities. Patricia was previously the CISO at Markel Insurance, Freddie Mac, Symantec, and Unisys, and her insights have always been extremely valuable to her peers.

Company 70
article thumbnail

Cathay Pacific to take cloud journey to new heights

CIO Business Intelligence

Still, Cathay is in the very early days of development and testing, and it remains unknown how quickly adoption will change business on a grand scale, Nair says, noting that there’s no doubt that digital transformation has already had a major impact on corporate and consumer culture in less than a decade — and that is only accelerating.

Cloud 93
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Outmaneuvering the Adversary: How to Detect Cyberthreats You Didn’t Know Were There

CIO Business Intelligence

Called the Attack Flow project , it’s a data format for describing sequences of adversary behavior that the Center for Threat-Informed Defense is developing in collaboration with cybersecurity leaders. And finally, there’s an emerging model for understanding the context and relationships between the sequences of techniques attackers use.

How To 77
article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

However, conventional solutions such as antivirus, firewalls, and other detection and blocking tools can only offer a limited level of security. Gartner names WEBGAP, Symantec, Proofpoint, Menlo Security, Light Point Security, Ericom Software, Cyberinc, Citrix, and Authentic8 as the leading players in the global web isolation systems market.

article thumbnail

The Importance of Connecting with Our Customers

CIO Business Intelligence

By Rob Greer, Vice President and General Manager, Symantec Enterprise Division. As the GM of Symantec , I had the good fortune of being able to attend both the Gartner Security & Risk Management Summit and the 2022 RSA Conference the week of June 6. About the Author: Broadcom Software. IT Leadership, Security

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

CareFusion’s parent company Becton Dickinson responded, saying that all 14 hundred and 18 of the identified vulnerabilities were within third-party software applications including Windows XP and Symantec pcAnywhere, and others. Continuous Testing at the Speed of Development. There are’s a lot to unpack here. Now you know.

article thumbnail

The Hacker Mind: Follow The Rabbit

ForAllSecure

And I remember calling Symantec and reporting a serious bug in an early version of their password manager. So the developers of the Jupyter Notebook service found it important that customers cannot access that instance's metadata service IP address. Ohfeld: After elevating our privileges to it, we could inspect the firewall rules.