article thumbnail

A CISO POV: Securing AI in your company

CIO Business Intelligence

In my recent column, I delved into the challenges enterprises face in integrating AI into the workplace and outlined strategies for CISOs to monitor or control the use of AI effectively. Firewall capability for AI security: Enhance security measures by providing firewall capabilities to safeguard against potential AI-related vulnerabilities.

Company 71
article thumbnail

Cathay Pacific to take cloud journey to new heights

CIO Business Intelligence

Like many enterprises, Cathay Pacific relied heavily on a lift-and-shift approach in its initial phase to benefit from the immediate efficiencies and scalability of the cloud. At the same time, enterprises are increasingly pursuing zero-trust strategies.

Cloud 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Leveraging MITRE ATT&CK: How Your Team Can Adopt This Essential Framework

CIO Business Intelligence

Throughout his career, Mark has been on the front lines of innovation, leading product efforts in both start-up and large enterprise organizations including Check Point Technologies, Security Focus, Symantec and Hewlett Packard Enterprise.

Security 105
article thumbnail

Outmaneuvering the Adversary: How to Detect Cyberthreats You Didn’t Know Were There

CIO Business Intelligence

Throughout his career, Mark has been on the front lines of innovation, leading product efforts in both start-up and large enterprise organizations including Check Point Technologies, Security Focus, Symantec and Hewlett Packard Enterprise.

How To 97
article thumbnail

Fountainhead: What Is Meant by a "Cloud-Ready" Application?

Fountainhead

unique network topology (including load balancing, firewalls, etc.). We all know that large software and platform vendors (think: Oracle, SAP, Microsoft, Symantec, Citrix, CA, IBM, HP etc.) That might mean continuous orchestration between specific apps and networking, storage, firewalls, IaaS, DBs and more. Because a complex.

article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

However, conventional solutions such as antivirus, firewalls, and other detection and blocking tools can only offer a limited level of security. Integrating browser isolation with existing endpoint security tools promotes layered security, enabling enterprises to be proactive and ensure business continuity.

article thumbnail

Are next-generation firewalls legacy technology?

Network World

A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. NGFWs followed in the footsteps of earlier firewalls—physical appliances installed inline to protect private networks from the public Internet. Cisco ACI, CloudPassage, Illumio, Unisys, vArmour, VMware NSX, etc.).