Threat intelligence leads to intelligent defense
The modern workplace makes the traditional network perimeter irrelevant, and businesses must adapt to secure themselves

The business landscape has changed dramatically over the last decade, and the modern workplace is almost unrecognisable compared to what came before. SaaS applications, mobile connectivity and remote working have eroded the effectiveness of traditional moat and wall approaches to perimeter defense, while changes in attacker behaviour have exploited the gaps left by this shift.
In this webinar, presented in association with Cloudflare, reviews and community editor Adam Shepherd sits down with Cloudflare CTO John Graham-Cumming to find out why the new network perimeter is so different, and how organisations can utilise cutting-edge cloud technologies to stay ahead of the curve.
Adam Shepherd
Reviews and Community Editor, IT Pro
As reviews and community editor, Adam is responsible for coordinating all of the hardware and software reviews across IT Pro, Cloud Pro and Channel Pro, from laptops and smartphones, all the way up to enterprise-grade data centre servers and network management software. He also runs the IT Pro Panel, a flagship initiative which sees CIOs and tech leaders from the likes of Dominos, Oxfam and GoCompare sharing their experience and insight with the IT Pro community.
John Graham-Cumming
CTO, Cloudflare
John Graham-Cumming is CTO of Cloudflare and is a computer programmer and author. He studied mathematics and computation at Oxford and stayed for a doctorate in computer security. As a programmer, he has worked in Silicon Valley and New York, the UK, Lisbon, Germany, and France. His open source POPFile program won a Jolt Productivity Award in 2004.
He is the author of a travel book for scientists published in 2009 called The Geek Atlas and has written articles for The Times, The Guardian, The Sunday Times, The San Francisco Chronicle, New Scientist, and other publications.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Cisco takes aim at AI security at RSAC with ServiceNow partnership
News The companies claim Cisco AI Defense and ServiceNow SecOps will help address new challenges raised by AI
By Jane McCallion
-
Why veterans can excel in data centers – and could help the IT sector address its skill shortages
In-depth Ex-military workers can bring software and hardware to civilian roles
By John Loeppky
-
Edge devices are now your weakest link: VPNs, firewalls, and routers were the leading source of initial compromise in 30% of incidents last year – here’s why
News Compromised network edge devices have rapidly emerged as one of the biggest attack points for small and medium businesses.
By Bobby Hellard
-
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
News Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
By Emma Woollacott
-
Cisco claims new smart switches provide next-level perimeter defense
News Cisco’s ‘security everywhere’ mantra has just taken on new meaning with the launch of a series of smart network switches.
By Solomon Klappholz
-
Five Eyes cyber agencies issue guidance on edge device vulnerabilities
News Cybersecurity agencies including the NCSC and CISA have issued fresh guidance on edge device security.
By Emma Woollacott
-
"Thinly spread": Questions raised over UK government’s latest cyber funding scheme
The funding will go towards bolstering cyber skills, though some industry experts have questioned the size of the price tag
By George Fitzmaurice
-
T-Mobile security chief insists its defenses stood up to attacks linked to Salt Typhoon
News No T-Mobile customers or services were affected after its security teams detected suspicious activity on their routers
By Solomon Klappholz
-
Securing your network in every direction with zero trust
Whitepaper Webinar on the evolution of network security
By ITPro
-
Turning your log and incident data into real-time security insights
Whitepaper Integrate multiple data sources for a comprehensive security view
By ITPro