Remove Case Study Remove Internet Remove Security
article thumbnail

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

One of the many topics coved at the event was software defined perimeter and cloud security alliance. Coca-Cola was used as a case study. Some of the issues discussed include the Internet of things, hacktivists and cyber attacks. Next Steps for the Cybersecurity Framework (vormetric.com). legalzoom.com).

article thumbnail

How CIOs Are Addressing The “Unsustainable” Security Challenge

CIO

The proliferation of cyber threats has become so great that earlier this year the Australian government issued the recommendation that organisations “ urgently ” adopt an enhanced cyber security posture. Cyber security attacks are an inevitability that all businesses should now be prepared for.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Key skills tech leaders need to secure a board seat

CIO

Cybersecurity oversight is a shared responsibility across the whole board. Therefore, we have programs to educate all directors on cybersecurity. We’ve also published, in partnership with the Internet Security Alliance (ISA), the 2023 Director’s Handbook on Cyber-Risk Oversight. It’s a win-win.

article thumbnail

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

Tenable

Check out what’s new in NIST’s makeover of its Cybersecurity Framework. Also, how to assess the cybersecurity capabilities of a generative AI LLM. 1 - NIST’s Cybersecurity Framework 2.0 1 - NIST’s Cybersecurity Framework 2.0 The Cybersecurity Framework at 10.and And the most prevalent malware in Q4. And much more!

article thumbnail

Harness AI’s potential and navigate disruption with Digital Realty

CIO

Cloud as a case study: What we learned The cloud journey is a good case study for thinking about disruption. Initially, cloud was accessed over the public internet, often with little thought to proximity and security. The big question now is how do you optimize this relationship to create maximum value?

article thumbnail

What COVID-19 Response Strategies Tell Us About the Business-Cybersecurity Disconnect

Tenable

As organizations around the world raced to develop strategies to respond to the COVID-19 pandemic, an independent business risk study shows cybersecurity leaders were largely left out. Yet, many cybersecurity leaders are still struggling to get a seat at the table. . COVID-related scams were the No.

article thumbnail

Cybersecurity Snapshot: Insights on Log4Shell, the Metaverse, IoT, Pig Butchering, Active Directory

Tenable

Get the latest on Log4Shell’s global remediation status; the need for metaverse security rules; a shutdown of “pig butchering” domains; tips for secure IoT products; an informal poll about AD security; and more! . Cybersecurity and Infrastructure Security Agency (CISA). Log4j guidance from the U.S.

IoT 52