Remove Enterprise Remove Firewall Remove Security Remove Symantec
article thumbnail

A CISO POV: Securing AI in your company

CIO Business Intelligence

In my recent column, I delved into the challenges enterprises face in integrating AI into the workplace and outlined strategies for CISOs to monitor or control the use of AI effectively. Firewall capability for AI security: Enhance security measures by providing firewall capabilities to safeguard against potential AI-related vulnerabilities.

Company 72
article thumbnail

Cathay Pacific to take cloud journey to new heights

CIO Business Intelligence

Cloud optimization is the new initiative in 2024,” says Rajeev Nair, general manager of IT infrastructure and security at Cathay, a major airliner and cargo carrier in the Asia-Pacific region, with headquarters in Hong Kong. At the same time, enterprises are increasingly pursuing zero-trust strategies.

Cloud 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

This forces IT and information security specialists to constantly enhance protection to effectively counter information security incidents related to malware distribution through rogue websites, links, and email attachments. Traffic goes through filtering and security policies to ensure the user is only exposed to safe information.

article thumbnail

Leveraging MITRE ATT&CK: How Your Team Can Adopt This Essential Framework

CIO Business Intelligence

That would be a tremendous boon for your security team, right? Here’s the not-so-great news: while many teams are aware of the existence of this tool, too few have mastered the use of it, and still fewer have made it a core component of their security workflow. The danger of not understanding attacks : Security evasion.

Security 105
article thumbnail

Outmaneuvering the Adversary: How to Detect Cyberthreats You Didn’t Know Were There

CIO Business Intelligence

These real threats are driving intense efforts within security organizations across industries, from critical infrastructure and financial markets to government organizations, supply chain and logistics, and many others. Here’s what we’ve seen work effectively in best-in-class security organizations: .

How To 97
article thumbnail

The Importance of Connecting with Our Customers

CIO Business Intelligence

By Rob Greer, Vice President and General Manager, Symantec Enterprise Division. As the GM of Symantec , I had the good fortune of being able to attend both the Gartner Security & Risk Management Summit and the 2022 RSA Conference the week of June 6. Security in the post-Covid world has changed.

article thumbnail

Are next-generation firewalls legacy technology?

Network World

A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. These devices combined traditional L3/L4 packet filtering with deep packet inspection, IPS, and other network security services along with knowledge about users and applications. Cryptzone, Google BeyondTrust, Vidder, etc.)