The CISOs and CIOs guide to securing networks in a digital age
New network technology creates new risk, but the same technology is driving a step-change in how we think about security, writes BT
Security is the C-suite’s top consideration when looking at network services
New network technology creates new risk, but the same technology is driving a step-change in how we think about security.
Multiple pressures are on CIOs and CISOs to meet the present needs of a data hungry business and workforce, and the future needs of the digital business. Software-driven networks, cloud strategies, multiple access points and data distributed across (and sometimes outside) the perimeter are all enough to keep the security team awake at night.
At the same time the technology driving network change is also driving a step change in how we approach security. A multi-layered approach to security augmented by intelligence and advanced data analytics allows CIOs and CISOs to be far more proactive in defending their environments and organisations. We believe it's a crucial step in giving a business the agility and flexibility it needs, while assuring the protection of its data, assets and reputation.
This paper provides a summary of the key security considerations in this future network landscape, as well as some suggestions as to how the challenges can be overcome.
Tricia Hayes takes on number-two role
Home Office agency to work with French IT heavyweight
Scottish Land Commission opens new digital platform
Deals awarded to Post Office and Digidentity also include the transfer of data to government
It’s been one of the most challenging years for healthcare providers, but Salesforce sees lasting change from accelerated digital transformation
Cloud-based applications can provide ways for agencies and departments to innovate and operate in new ways, as the past year has highlighted they must, writes Oracle
Higher Education institutions are some of the most consistently targeted organisations for cyberattacks. CrowdStrike explores the importance of the right cybersecurity measures.