Remove Conference Remove Firewall Remove Network
article thumbnail

VMware adds more security for diverse cloud workloads

Network World

VMware has added more security features to its forthcoming on-demand multi-cloud networking and security service called Northstar that it previewed during its August VMware Explore 2022 conference. To read this article in full, please click here

Vmware 494
article thumbnail

Ransomware, zero-day exploits keep network security pros scrambling

Network World

The networks that enable today’s hyper-distributed enterprises face persistent and emerging security challenges. We need to take security, melting [it] into the fabric of the network, so that we have distributed enforcement points. One of those challenges is ransomware. What do we need to do in order to contain lateral movement?

Network 446
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco, Nvidia team to deliver secure AI factory infrastructure

Network World

Cisco and Nvidia have expanded their partnership to create their most advanced AI architecture package to date, designed to promote secure enterprise AI networking. The Secure AI Factory, which the vendors announced at Nvidias GTC AI Conference going on this week in San Jose, Calif., Nvidia BlueField-3 DPUs and SuperNICs.

Security 243
article thumbnail

F5 integrates security for multi-cloud app protection.

Network World

F5 Networks has rolled out an integrated, cloud-based security platform and services aimed at protecting widely distributed enterprise applications. How to build a hybrid-cloud strategy.

Cloud 391
article thumbnail

With Project Cypress, VMware brings generative AI to cyberdefense

Network World

At the VMware Explore conference going on this week in Las Vegas, VMware announced the addition of a generative AI weapon to its own cybersecurity platform, vDefend. For example, attackers can exploit weaknesses in enterprise applications or infrastructure to infiltrate networks, then move laterally as they hunt for high-value assets.

Vmware 480
article thumbnail

Koch CTO teams up to get cloud networking right

CIO Business Intelligence

Integrating a new network after an acquisition can be a sizable headache for any CIO. Traditionally, to integrate its acquisitions, Koch would flatten the acquired company’s core network, says Matt Hoag, CTO of business solutions at Koch. It’s more complicated than standard networking, Hoag says. Laying the foundation.

CTO 243
article thumbnail

Sweat the small stuff: Data protection in the age of AI

CIO Business Intelligence

Data protection in the AI era Recently, I attended the annual member conference of the ACSC , a non-profit organization focused on improving cybersecurity defense for enterprises, universities, government agencies, and other organizations. Anecdotal evidence shows that even LLM firewall providers havent encountered attacks in recent months.

Data 264