Remove CISO Remove Digital transformation Remove Firewall
article thumbnail

How the CISO has adapted to protect the hybrid workforce

IT Security Guru

As CISOs embark on their transformational journeys, identifying these areas of weakness should be the top priority. This has led to CISOs shifting how they approach protecting the corporate perimeter with additional controls and monitoring tools being used to scan any access to the network. Cloud dominance .

CISO 97
article thumbnail

Integrating Perimeter and Internal Defenses: 5 Facts That May or May Not Surprise

Cisco Security

IDC recently had the opportunity to talk to CISOs regarding the integration of Cisco Secure Workload and Secure Firewall. Digital transformation though does not wait for pristine security measures and policies to be put in place. As analysts, we can articulate the technical benefits.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

The Last Watchdog

Enterprises have dumped small fortunes into stocking their SOCs (security operations centers) with the best firewalls, anti-malware suites, intrusion detection, data loss prevention and sandbox detonators money can buy. Now toss in the fact that digital transformation is redoubling software development and data handling complexities.

article thumbnail

Years overdue, the profile of the CISO begins to rise as cyber grabs attention in boardrooms

SC Magazine

Cybersecurity garnered far more attention in executive boardrooms and among regulators and insurance underwriters during the last couple years, thanks to both an increasing volume of attacks and growing demand for digital transformation. Our profile is certainly getting higher. Failure to communicate.

CISO 115
article thumbnail

Why companies need a Chief Product Security Officer

SC Magazine

Digital transformation has changed the way companies do business, which has in turn changed the way consumers interact with the products and services companies provide. As a result, many organizations are finding they need someone beyond the CISO to lead this effort at the organizational level.

article thumbnail

NEW TECH: Will ‘Secure Access Service Edge’ — SASE — Be the Answer to Secure Connectivity?

The Last Watchdog

Locking down web gateways and erecting a robust firewall were considered the be-all and end-all. SASE (pronounced sassy) replaces the site-centric, point-solution approach to security with a user-centric model that holds the potential to profoundly reinforce digital transformation. Connectivity was relatively uncomplicated.

Firewall 213
article thumbnail

Grandson of FISMA: Why We Desperately Need New Cybsersecurity Legislation from the 117th Congress

Cisco Security

Further to the topic of governance, FISMA decided to subordinate the CISO to the CIO, which is an organizational design no longer in favor among enterprises throughout the Fortune 500 and Global 2000. The modern CISO is more than “IT security.” He has also serviced as the CISO of Leonardo DRS and Cubic Global Defense.

CISO 106