CFOtech Australia - Technology news for CFOs & financial decision-makers

George Tsoukas stories

George Tsoukas has penned a collection of insightful columns centred around the pressing concerns and transformative advancements in the realms of network security, cloud computing, and telecommunications. Tsoukas, who appears to have a robust understanding of the intricate relationship between technology and operational effectiveness, delves deep into the critical discourse on network visibility and its cardinal role in safeguarding 5G networks.

With a discerning eye on emerging threats, Tsoukas offers a cautionary narrative on the importance of security fundamentals, especially in light of heightened global cyber threats and the growing complexity of ransomware attacks. His assessments reveal a keen interest in the evolving landscape of cybersecurity, swift adoption of 5G, and the strategic integration of IT and human resources to bolster both security and employee well-being amidst a shift to remote work.

Additionally, Tsoukas has explored the juxtaposition of cloud visibility challenges against its manifold benefits, emphasizing the necessity for meticulous cloud monitoring and transparent strategies to engender trust without compromising agility. His work underscores a nuanced comprehension of cloud-native architectures and the imperatives of seamless network visibility within Zero Trust frameworks, showcasing a forward-thinking stance on operational resilience and digital trust.

Gettyimages 1273876258  1

What CISOs think about cyber security, visibility and cloud

Wed, 29th Jun 2022
Cloud adoption is growing rapidly in Asia Pacific, but security concerns remain as 72% of adopters do not have all workloads secured.
Pic   george tsuokas  3

Let’s clear the cloud visibility haze with app awareness

Fri, 20th May 2022
Organizations embracing cloud computing face challenges with identifying applications and filtering traffic. A cloud suite can provide a solution.
Compatible pic   george tsuokas  3

Why it's essential to focus on security fundamentals

Wed, 27th Apr 2022
The White House has issued comprehensive cybersecurity recommendations to protect against potential Russian cyber-attacks.
Gettyimages 1331943958

How to prevent ransomware devastation

Fri, 25th Mar 2022
The devastating effects of ransomware have grown over the past two decades from opportunistic to carefully orchestrated attacks.
Gettyimages 1354205086

Why doubling down on corporate defence works so well

Thu, 3rd Mar 2022
The security operations centre has come a long way since the early 2000s. It wasn’t even called a SOC in those days.
Gettyimages 1157016421

Why network visibility must be the foundation of Zero Trust architecture

Tue, 25th Jan 2022
US Presidential Executive Order 14028 directs federal agencies to transition to a Zero Trust Architecture for cybersecurity.
Gettyimages 1297147973

Dark clouds on the horizon: How to close the gaps in cloud security

Thu, 2nd Dec 2021
Cloud security is more trusted than ever, but there are still gaps that need to be addressed. Find out what they are in this article.
Gettyimages 1018651722

What is OT security and how does it differ from IT security?

Thu, 18th Nov 2021
Let’s consider what OT is, its relationship with IT, and the common problems people experience in working with it.
Gettyimages 1187729700

What exactly is 5G security, and why is it essential?

Fri, 22nd Oct 2021
Many things that make 5G so appealing, like the decreased latency and increased bandwidth, are also threats to security.
Gettyimages 1213867496

How cloud monitoring delivers both challenges and benefits

Tue, 12th Oct 2021
To ensure that cloud initiatives are performing to their potential, cloud monitoring takes several different forms.
Gettyimages 1153240263

Three ways Shark Week mirrors cybersecurity marketing

Tue, 24th Aug 2021
Here are three ways that myths are spread by Shark Week and how they are analogous to the myths currently percolating in cybersecurity marketing.
Gettyimages 1219660935

What Is TLS 1.2 — and why should we still care?

Fri, 23rd Jul 2021
TLS 1.2, the improved version of the Transport Layer Security protocol, is crucial for data security as TLS 1.0 and 1.1 become unsupported.
Cloud8

How multi-cloud visibility ensures business continuity

Mon, 12th Apr 2021
New technology solves the visibility gap in hybrid clouds, providing a single view of data in motion and optimising user experience.
Gettyimages 1197955157

Three security essentials for financial services

Wed, 3rd Mar 2021
Financial services must adapt to the current global upheaval by prioritizing customer experience and security, while optimizing costs.
Gettyimages 1188953848  1

What cloud-native actually means

Fri, 12th Feb 2021
Although the benefits of the cloud-native approach are widely recognised, there is a lot of confusion about what cloud-native computing is.
Gettyimages 1204545808

The ins and outs of cloud-native computing

Tue, 24th Nov 2020
Cloud-native computing is a way of thinking, as well as a computing architecture. But what are the benefits? #cloudcomputing #cloudnative.
Gettyimages 1182211371

Why network monitoring and visibility are key to 5G success

Wed, 28th Oct 2020
Service providers must be prepared to offer unparalleled 5G experiences without compromising on speed, performance or security - all without breaking the bank.
Digital globe team

Why IT and HR must work together to help businesses weather the storm

Thu, 15th Oct 2020
Remote work is the new norm in Australia, but IT and HR teams must partner to ensure cybersecurity and employee well-being.
Cybersecurity36

Network visibility is the crux of security in 2020

Thu, 8th Oct 2020
The pandemic's push for remote work has heightened cyber risks. Companies must enhance network visibility to protect against escalating threats.
Mobile security

How businesses can lift protection against mobile threats

Mon, 31st Aug 2020
Rise in personal phone use for work and mobile malware pose increasing risks to organizations, warns report. #cybersecurity.