George Tsoukas stories
George Tsoukas has penned a collection of insightful columns centred around the pressing concerns and transformative advancements in the realms of network security, cloud computing, and telecommunications. Tsoukas, who appears to have a robust understanding of the intricate relationship between technology and operational effectiveness, delves deep into the critical discourse on network visibility and its cardinal role in safeguarding 5G networks.
With a discerning eye on emerging threats, Tsoukas offers a cautionary narrative on the importance of security fundamentals, especially in light of heightened global cyber threats and the growing complexity of ransomware attacks. His assessments reveal a keen interest in the evolving landscape of cybersecurity, swift adoption of 5G, and the strategic integration of IT and human resources to bolster both security and employee well-being amidst a shift to remote work.
Additionally, Tsoukas has explored the juxtaposition of cloud visibility challenges against its manifold benefits, emphasizing the necessity for meticulous cloud monitoring and transparent strategies to engender trust without compromising agility. His work underscores a nuanced comprehension of cloud-native architectures and the imperatives of seamless network visibility within Zero Trust frameworks, showcasing a forward-thinking stance on operational resilience and digital trust.
What CISOs think about cyber security, visibility and cloud
Let’s clear the cloud visibility haze with app awareness
Why it's essential to focus on security fundamentals
How to prevent ransomware devastation
Why doubling down on corporate defence works so well
Why network visibility must be the foundation of Zero Trust architecture
Dark clouds on the horizon: How to close the gaps in cloud security
What is OT security and how does it differ from IT security?
What exactly is 5G security, and why is it essential?
How cloud monitoring delivers both challenges and benefits
Three ways Shark Week mirrors cybersecurity marketing
What Is TLS 1.2 — and why should we still care?
How multi-cloud visibility ensures business continuity
Three security essentials for financial services
What cloud-native actually means
The ins and outs of cloud-native computing
Why network monitoring and visibility are key to 5G success
Why IT and HR must work together to help businesses weather the storm
Network visibility is the crux of security in 2020