Remove CTO Remove Malware Remove Security
article thumbnail

Cybersecurity Automation: Leveling the Playing Field

CIO

By Leonard Kleinman, Field Chief Technology Officer (CTO) ) Cortex for Palo Alto Networks JAPAC Many things challenge how we practice cybersecurity these days. Let’s look at some of these cybersecurity challenges and how automation can level the playing field.

CTO 214
article thumbnail

As war escalates in Europe, it’s ‘shields up’ for the cybersecurity industry

TechCrunch

CTO and founder of Reposify , Yaron Tal is a tech entrepreneur and cybersecurity expert with nearly two decades of experience developing cybersecurity software solutions. A deep dive into these deficiencies points to clear solutions all industries – cybersecurity or otherwise – can embrace to protect themselves.

Industry 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What is AI’s current impact on cybersecurity?

CIO

In our inaugural episode, Michael “Siko” Sikorski, CTO and VP of Engineering and Threat Intelligence at Unit 42 answers that question and speaks to the profound influence of artificial intelligence in an interview with David Moulton, Director of thought leadership for Unit 42. Threat Vector is your compass in the world of cybersecurity.

article thumbnail

Versa raises $120M for its software-defined networking and security stack

TechCrunch

Networking and cybersecurity firm Versa today announced that it raised $120 million in a mix of equity and debt led by BlackRock, with participation from Silicon Valley Bank. Versa’s large round suggests that, despite the market downturn, VCs haven’t lost faith in cybersecurity vendors yet. billion in 2021).

Security 193
article thumbnail

CIO-Application security: the 3 pillars of securing your engineering ecosystem

CIO

Speed is great, but not when it comes at the expense of security. The infamous Solar Winds attack occurred because a build system was exploited, and malware was spread to 18,000 clients. The traditional AppSec challenge of preventing security flaws and misconfigurations from reaching production is much more complex.

article thumbnail

The evolving role of security and IT in DR and incident response

CIO

However, as ecommerce has proliferated, security threats have increased, elevating cybersecurity to a board-level concern. Early cybersecurity threats were limited in their scope and damage, but current threats can ruin a business. Worldwide responses show that attackers are increasingly able to extract more sensitive data.”

Security 166
article thumbnail

New Video: Automating Your Cyber Defenses Including Malware Removal

CTOvision

The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your enterprise. It highlights ten requirements CTOs, CIOs, CISOs and CFOs should articulate as critical to success in automating security response.

Malware 110