Story image

How top CIOs prevent cyber threats

Chief information security officers (CISOs) and other information security executives increasingly find themselves in the line of fire, and not just from cyber attackers. 

These security professionals are being bombarded with escalating demands and expectations from CEOs and corporate boards who find their digitally dependent organisations at significant risk from a wide variety of cyber threats.

As if these responsibilities weren’t enough of a burden, many CISOs face a frightening reality, their existing security tools and procedures are straining and breaking under the pressure of today’s network speeds and data volumes, leaving their enterprise exposed to cyber threats and malicious behaviour.

Further complicating things is the fact that corporate network operations have become more extensive and segmented.

Security initiatives are now the single most important technology project within IT departments, and meeting security, privacy, or compliance goals was tied with increasing productivity as a top organisation objective.

Faced with these challenges, CISOs and other infosec professionals need a comprehensive security solution that also delivers desired business benefits. 

This paper explains why many organisations are turning to the leader in next-generation network packet brokers to meet these diverse and daunting requirements.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.