Remove CISO Remove Digital transformation Remove Network Security
article thumbnail

Integrating Perimeter and Internal Defenses: 5 Facts That May or May Not Surprise

Cisco Security

This blog has been authored by Frank Dickson, Program Vice President, Cybersecurity Products Practice, and Christopher Rodriguez, Research Director, IDC Network Security. IDC recently had the opportunity to talk to CISOs regarding the integration of Cisco Secure Workload and Secure Firewall.

article thumbnail

How the CISO has adapted to protect the hybrid workforce

IT Security Guru

When developing a security strategy for supporting a hybrid workforce, it is essential to identify risks, as well as any potential blind spots. As CISOs embark on their transformational journeys, identifying these areas of weakness should be the top priority. Security landscape requires adaptation .

CISO 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Years overdue, the profile of the CISO begins to rise as cyber grabs attention in boardrooms

SC Magazine

Cybersecurity garnered far more attention in executive boardrooms and among regulators and insurance underwriters during the last couple years, thanks to both an increasing volume of attacks and growing demand for digital transformation. Our profile is certainly getting higher. Failure to communicate.

CISO 115
article thumbnail

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

The Last Watchdog

There’s a frantic scramble going on among those responsible for network security at organizations across all sectors. Some 27 percent of IT professionals who partook in a survey conducted by next-gen firewall supplier Imperva at RSA 2018 reported receiving more than 1 million security alerts daily. Demisto launched in May 2016.

article thumbnail

Black Hat insights: How Sonrai Security uses graph analytics to visualize, mitigate cloud exposures

The Last Watchdog

The good news is that there is a very powerful, proven tool that can help companies decipher complex networking security relationships. With Black Hat USA 2021 just around the corner, I had a deep discussion about this with Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security.

Risk 214
article thumbnail

Is Your Security Stack and Legacy Tech Keeping Pace With Your Business?

CyberSecurity Insiders

By Tyler Farrar, CISO, Exabeam. The pandemic spurred digital transformation unlike anything we have ever seen since the dawn of the internet as we know it. The key to this apparent contradiction is the role played by legacy tech and the limitations of security solutions designed before the cloud era. Leaving The Legacy.

article thumbnail

NEW TECH: Will ‘Secure Access Service Edge’ — SASE — Be the Answer to Secure Connectivity?

The Last Watchdog

It’s called Secure Access Service Edge, or SASE , as coined by research firm Gartner. SASE (pronounced sassy) replaces the site-centric, point-solution approach to security with a user-centric model that holds the potential to profoundly reinforce digital transformation. Greenfield.

Firewall 213