Preview Mode
Documentation

Leadership Perspectives: Simplifying security in the age of complexity

Hear from tech leaders on the future of AI, advocating for security investments, and battling human error.

theNET | Security Innovation | Insights for the digital enterprise

Transform your tech stack while reducing costs

Organizations are turning to cloud application platforms for IT consolidation — knowing how to choose the right one can help you deliver innovation, consistently.

Read (4 min)
Featured content

Simplifying IT and security

The adoption of myriad apps and multiple clouds has led to IT sprawl; in turn, connecting clouds, apps, and users has never been more challenging

Read (3 min)

The last frontier of cloud transformation

Despite the cloud revolution in IT service delivery, a critical piece remains elusive: IT still lacks sufficient visibility and control over networking and security

Read (4 min)

Tackling digital modernization: Leadership perspectives

Learn how tech leaders are integrating AI into apps, securing complex networks, and more

Get the magazine!

Calculating the ROI of security investments

Security has a huge impact on customer experience, regulatory compliance, and launch timelines, yet over half of security teams say they are underfunded. To keep security a priority, security leaders should find ways to better communicate the ROI they generate

Read (4 min)

Receive a monthly recap of the most popular Internet insights!

Calculating the ROI of security investments

Security has a huge impact on customer experience, regulatory compliance, and launch timelines, yet over half of security teams say they are underfunded. To keep security a priority, security leaders should find ways to better communicate the ROI they generate

Read (4 min)

Privacy-first security: How security and privacy teams can partner together

The regulatory environment continues to become more complex — maintaining compliance will require privacy and security teams to bolster collaboration, better track data, and strengthen security

Watch (13 min)

A new model for securing public-facing network infrastructure

While organizations devote more and more resources to securing infrastructure, traditional defenses are not measuring up. A new, more scalable approach to security is needed

Read (4 min)

Complexity might be your greatest risk

Research shows 86% of organizations say that security complexity is leaving them vulnerable and stifling innovation — with a strategy centered on consolidation, organizations can enhance resilience, streamline management, and refocus on key projects

Read (6 min)

E-government and cyber security tie for #1 NASCIO priority

The National Association of State CIOs announced that to meet user expectations and protect sensitive information, governments should prioritize digital services as highly as cyber security

Read (7 min)

Navigating data localization and compliance

The GDPR has triggered numerous regulatory actions based on the dubious idea that localizing data makes it more private and secure — organizations need ways to meet localization obligations without impacting user experiences

Read (4 min)

Addressing technical debt

Many IT teams today use more than 20 solutions to secure their organization — leaving gaps in protection while slowing strategic initiatives. Adopting an integrated platform can close security gaps and reduce complexity

Read (3 min)

Building resilient networks for AI applications

The rise of AI-powered, cloud-delivered applications is driving the need to enhance network reliability and security — converging networking and security can help you build more powerful AI models and deploy innovative AI applications everywhere

Read (3 min)

Digital transformation in banking

From cloud and mobile to blockchain and AI, new technologies are reshaping banking — creating unexpected security vulnerabilities

Read (6 min)

Connecting and protecting everything

Today’s network architectures aren’t designed for our era of connectivity. We need to reimagine the network with the connectivity cloud

Read (4 min)

Five ways to build a successful cyber security team

A service-oriented mindset can help cyber security leaders deliver greater value to the business. Paul Farley, Deputy CISO of NCR Voyix, shares best practices for people-first leadership

Read (5 min)
Image of a digital road

A roadmap to Zero Trust adoption

Adopting Zero Trust security is widely recognized as a complex journey, but getting started doesn’t have to be — here are 5 Zero Trust adoption projects that require comparatively little effort

Read (8 min)

A nonprofit playbook for technology transformation

Mark Coffey, Head of Technology Transformation at Irish Cancer Society, shares how he has leveraged digital modernization to improve human experiences

Read (5 min)

Balancing privacy and business risk

Deep dive into the risks and costs of underinvesting in security, and how security and privacy leaders can be powerful partners in convincing their organizations why investments in security are so important

Read (6 min)

New realities of data in a digitally modern world

New digital environments mean data can be anywhere, an evolution that has chipped away at the compliance and security measures organizations have in place — In this article, we explore the who, what, and where of data management

Read (4 min)

Keeping healthcare cyber resilient

Healthcare is one of the most targeted industries — Here are 5 best practices to keep hospital staff, administration, and operations cyber resilient

Read (4 min)

Reducing the cost of consolidation

Many ‘platforms’ have underdelivered on lowering TCO — here are 4 qualities that CISOs can use to evaluate platforms for consolidation and gain real cost benefits

Read (7 min)

Securing the sales organization

Empowering Sales is critical to most businesses because it drives revenue — A challenge if we rely on VPNs and other legacy security tools. Fortunately, there is a way to balance the needs of Sales and Security

Read (9 min)

Pursuing privacy-first security

Data privacy has been elevated as a matter of importance to mitigating risk — now more than ever, CISOs must collaborate with their CPOs to implement a privacy-first security program

Read (6 min)

Redefining cyber security with Zero Trust

The scope of cyber security has extended far beyond fundamental protection — Gartner predicts that by 2025, 60% of companies will use Zero Trust to help navigate IT complexity

Read (4 min)

Any-to-any connectivity for business

Connecting the corporate network has become a challenge for organizations dealing with vendor sprawl. A connectivity cloud eliminates networking complexity and addresses diverse networking needs

Read (4 min)

Securing the healthcare ecosystem

Over 100 million people were affected by cyber attacks in the healthcare industry last year — 5 strategies that keep healthcare cyber resilient

Read (3 min)

The business case for Zero Trust

Zero Trust enables continuous monitoring and validation for a workforce that is often the first and last line of defense when dealing with cyber threats

Read (5 min)

Staying ahead of scammers

The “human element” is still a factor in 3 out of every 4 breaches. Daragh Mahon, CIO of Werner Enterprises discusses how to balance training, penetration testing, and solutions to stay ahead

Read (6 min)

Elevating organizational trust with Zero Trust

Security is at the heart of consumer trust — In an era where data breaches and cyber attacks are both pervasive and prevalent, organizations need a proactive and comprehensive security strategy

Read (6 min)

Security without stagnation

I make room for mentoring because I believe it serves a greater good and helps drive continuous innovation in cyber security. Here are 3 questions CSO's should ask before embarking on a mentorship relationship

Read (7 min)

Regain control of IT with the connectivity cloud

Security has gone from being responsible for one technological domain — the on-prem environment — to many others, causing a loss in visibility and control

Read (9 min)

Regain control of complex network environments

Vendor consolidation does not mean giving up flexibility or scalability. You can implement a connected, composable platform that has flexibility for change and the scalability to expand as your networks expand

Read (8 min)

Unlocking cyber resilience through culture

Building cyber resilience into company culture requires a shift in both mindset and behavior. Here are 8 ways that leadership can reinforce cyber security as a culture

Read (8 min)

Transform cyber security in the boardroom

6 things the board of directors wants you to know: Changing the narrative of cyber security from a cost center to a strategic function that builds business resilience

Read (7 min)
Globe with code

Reducing complexity in the security stack

According to a recent Gartner survey, 75% of organizations are trying to simplify their security stack through vendor consolidation, with efficiency and risk reduction listed as the top goals

Read (6 min)

Showing egress fees the exit

AI requires access to massive amounts of data and significant computing power — storage and data management then, become a large expense in developing AI systems

Read (4 min)
Ones and zeros overlaying a large zero

The benefits of being your own customer

Putting ourselves in the shoes of our customers enable us to better anticipate and mitigate risks, enhance the robustness of products, strengthen regulatory compliance, and ultimately increase customer confidence and trust

Read (7 min)

Demystifying Zero Trust

Zero Trust has been complicated by a slew of acronyms but, as a philosophy empowers organizations to safeguard their critical assets and build a foundation for trust

Read (5 min)
Egress fees

Trading egress for opportunity

Amidst trimming personnel & spending freezes, one of the most obvious places to streamline went unnoticed

Read (4 min)
Secure mergers and acquisitions

Simplify and secure M&A

70 to 90 percent of acquisitions fail. Avoid contributing to this statistic by successfully navigating IT integration

Read (7 min)
Image of a hospital hallway with medical icon overlay

Securing healthcare

5 key solutions that healthcare organizations should consider implementing to protect patient data and address cyber threats

Read (4 min)
Identity icons connected by lines

Redefining cyber security

As digital & data-dependency increase - businesses need to become future-ready to stay secure

Read (5 min)
Identity icons connected by lines

Securing the IT ecosystem

Why a Zero Trust approach is necessary to secure complex infrastructure

Read (4 min)
Screenshot from Dr. Strangelove of Major Kong riding a bomb

Stop worrying and love compliance

Aligning policy and strategy as the foundational starting point for enhancing security

Read (3 min)
Image of a padlock and Internet icons

Gaps in web application security

Disparate security is becoming more susceptible as the complexity and sophistication of cyber attacks rise

Read (7 min)
Digital image of a cloud

Making the case for SASE

The more invested c-suite executives are in security projects, the safer the organization becomes

Read (8 min)
Image of a digital road

A roadmap to Zero Trust adoption

Adopting Zero Trust security is widely recognized as a complex journey, but getting started doesn’t have to be — here are 5 Zero Trust adoption projects that require comparatively little effort

Read (8 min)
Image of a globe with connections

A new framework for network security

SASE: Keeping the modern distributed network connected

Read (6 min)
Image of a maze

Once a target, always a target

Understanding risk posed by employees enables organizations to implement proactive strategies

Read (4 min)

The roadmap to Zero Trust

Clearing up confusion about what Zero Trust means in practice and how to get started

Watch (21 min)
Image of Italy at night from space

Future of web application security

Moving past short-term fixes for remote workforce security and building remote work infrastructure for the long-term

Read (9 min)
Close up photo of hands typing on a keyboard

The rise of Zero Trust Network Access

An alternative to VPN built out of necessity

Read (5 min)
Digital image of a glowing line

Accelerating the journey to SASE

Implementing a comprehensive SASE platform helps to reduce security gaps and enable the future of work

Read (5 min)
Image of secure locks around the world

Zero Trust in the Internet browser

The latest security vulnerability of the distributed enterprise

Read (8 min)
Close up image of a hand inserting a piece into a puzzle

Bringing accountability to the Internet

Choosing to be accountable is what distinguishes a leader from everyone else in our world today. Accountability is bold—it can drive innovation. Accountability can act as a catalyst for the change required to solve seemingly intractable problems

Read (3 min)
Image of an open door

The software supply chain is under attack

These attacks highlight the fragility of software ecosystems

Read (5 min)
Image of price data on a screen

Optimizing security during uncertainty

3 ways to find cost efficiencies and improve your security posture during a down economy

Read (5 min)
Image of a fingerprint

Current state of Zero Trust

A review on how the 2020 global pandemic effected the implementation of Zero Trust

Read (5 min)
Time lapse photo of traffic on a highway

Addressing data regulation

Regulation aimed at protecting consumer privacy is often hard to interpret and difficult to comply with

Read (8 min)
Photo of a server rack

The challenges of network infrastructure

Addressing the challenges of complex cloud environments as you deploy in the cloud

Read (5 min)