Remove CISO Remove Digital transformation Remove Network Security
article thumbnail

How the CISO has adapted to protect the hybrid workforce

IT Security Guru

When developing a security strategy for supporting a hybrid workforce, it is essential to identify risks, as well as any potential blind spots. As CISOs embark on their transformational journeys, identifying these areas of weakness should be the top priority. Security landscape requires adaptation .

CISO 97
article thumbnail

Integrating Perimeter and Internal Defenses: 5 Facts That May or May Not Surprise

Cisco Security

This blog has been authored by Frank Dickson, Program Vice President, Cybersecurity Products Practice, and Christopher Rodriguez, Research Director, IDC Network Security. IDC recently had the opportunity to talk to CISOs regarding the integration of Cisco Secure Workload and Secure Firewall.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Years overdue, the profile of the CISO begins to rise as cyber grabs attention in boardrooms

SC Magazine

Cybersecurity garnered far more attention in executive boardrooms and among regulators and insurance underwriters during the last couple years, thanks to both an increasing volume of attacks and growing demand for digital transformation. Our profile is certainly getting higher. Failure to communicate.

CISO 115
article thumbnail

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

The Last Watchdog

There’s a frantic scramble going on among those responsible for network security at organizations across all sectors. Some 27 percent of IT professionals who partook in a survey conducted by next-gen firewall supplier Imperva at RSA 2018 reported receiving more than 1 million security alerts daily. Demisto launched in May 2016.

article thumbnail

Innovation in the Fast Lane: Lessons from Motorsport and Cybersecurity

Trend Micro

Respond to Threats Agilely Maximize effectiveness with proactive risk reduction and managed services Learn more Operationalizing Zero Trust Operationalizing Zero Trust Understand your attack surface, assess your risk in real time, and adjust policies across network, workloads, and devices from a single console Learn more By Role By Role By Role Learn (..)

article thumbnail

Black Hat insights: How Sonrai Security uses graph analytics to visualize, mitigate cloud exposures

The Last Watchdog

The good news is that there is a very powerful, proven tool that can help companies decipher complex networking security relationships. With Black Hat USA 2021 just around the corner, I had a deep discussion about this with Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security.

Risk 214
article thumbnail

Is Your Security Stack and Legacy Tech Keeping Pace With Your Business?

CyberSecurity Insiders

By Tyler Farrar, CISO, Exabeam. The pandemic spurred digital transformation unlike anything we have ever seen since the dawn of the internet as we know it. The key to this apparent contradiction is the role played by legacy tech and the limitations of security solutions designed before the cloud era. Leaving The Legacy.