article thumbnail

Vinay Sridhara, CTO of Balbix, on Invisible Battles and Hidden Figures

CTOvision

Read Vinay Sridhara, CTO of Balbix explain why it is important to keep track of cybersecurity trends and how Balbix is developing new-age cybersecurity tools on Security Boulevard: If you […].

CTO 402
article thumbnail

Cloud Security Basics CIOs and CTOs Should Know

Information Week

Chief information officers and chief technology officers don't tend to be cybersecurity experts and yet they may have responsibility for it. Cloud security is somewhat unique because you can't control everything.

CTO 218
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Conversation With Quantum Security Practitioner Jane Melia

CTOvision

In this OODAcast, OODA CTO Bob Gourley was joined by Dr. Jane Melia of QuintessenceLabs to dive deep into topics of Quantum Computing, Quantum Security and best practices for ensuring […].

Security 254
article thumbnail

A Conversation With National Security and Technology Expert Lewis Shepherd (Part Two)

CTOvision

In this second of a two part OODAcast, OODA CTO Bob Gourley, was joined by Lewis Shepherd, seasoned federal technology executive and a senior director of technology strategy at VMware for an interactive discussion on the actionable lessons we should all be learning from the current crisis but also how the events of today are […].

Vmware 334
article thumbnail

Your Team's Pragmatic Guide to Security

Speaker: Naresh Soni, CTO, Tsunami XR

The pandemic has led to new data vulnerabilities, and therefore new cyber security threats. As technology leaders, it's time to rethink some of your product security strategy. Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered.

article thumbnail

5 Global Supply Chain Security Threats (and How to Handle Them)

CTOvision

Haughey explain the top five global supply chain threats and how to mitigate them on Security Intelligence : In December 2020, a nation-state attack on the SolarWinds network management system compromised the supply chains of over 18,000 organizations, including the Pentagon and the Department of Homeland Security.

Security 389
article thumbnail

F5 teams with Intel to boost AI delivery, security

Network World

F5 this week said it’s working with Intel to offer customers a way to develop and securely deliver AI-based inference models and workloads. Integrating an Intel IPU with NGINX Plus creates a security air gap between NGINX Plus and the OpenVINO servers, according to Intel.

Intel 187