In today's rapidly evolving digital landscape, businesses are becoming increasingly invested in cloud environments to drive innovation and efficiency. However, this shift to the cloud comes with its own set of security challenges. Tools like Cloud Native Application Protection Platforms (CNAPP), Cloud Security Posture...
Microsoft blamed a widespread Azure cloud computing platform service outage, including Microsoft 365 problems, on its failure to stop a distributed denial-of-service attack after "an error in the implementation of our defenses amplified the impact of the attack rather than mitigating it."
Ransomware hackers discovered a way to gain full administrative privileges on VMware ESXi hypervisors connected to Microsoft's Active Directory, a finding that resulted in extortion demands from cybercriminals, including Storm-0506, Storm-1175, Octo Tempest and Manatee Tempest.
The Department of Health and Human Services is facing some of the same cloud security problems as the healthcare organizations it regulates: weaknesses in a dozen different cloud security controls and inventories of cloud systems, according to an inspector general's audit report.
In this insightful webinar, ClearDATA's Chief Technology Officer (CTO), Jim Ducharme, explores the intricate landscape of cloud security, focusing on the advanced threats facing healthcare organizations and the unique challenge of protecting PHI in cloud. Ducharme presents actionable insights into developing resilient...
Orca Security CEO Gil Geron outlines the integration of AI for advanced security posture management. He emphasizes the importance of deep visibility into cloud environments, customer adoption and preventing security issues early in the development life cycle.
Aqua Security carried out its second round of layoffs since 2022 as the future prospects for stand-alone cloud security vendors look increasingly uncertain. Aqua said axing 10% of its workforce will ensure Aqua continues on a path to profitability that's aligned with current economic conditions.
Despite all the platformization buzz, there are very few vendors with market-leading capabilities in at least three disparate security technology categories. That could change if Google forges buys cloud security firm Wiz for a reported $23 billion just two years after buying Mandiant.
The theft of terabytes of Snowflake customers' data through credential stuffing hacks highlights how multifactor authentication shouldn't be optional for safeguarding accounts. Experts are calling on providers to build in more robust identity and authentication security features, at no extra cost.
Driven Technologies Chief Operating Officer Vinu Thomas provides an in-depth look at how AI and automation are enhancing cybersecurity. He talks about the shift to distributed environments, the integration of security tools, and the effectiveness of AI in threat detection and response.
Discover cutting-edge strategies to safeguard your organization against advanced AI-powered threats. This webinar brings together top industry experts to share insights on leveraging secure cloud-native architectures and threat intelligence. Learn how to implement zero trust controls and enhance secure collaboration...
Integrating cyberthreat intelligence across all business operations is essential for enhancing security and managing risks effectively. But that valuable threat intel should not be limited to security operations centers, said Tim Gallo, head of global solutions architects, Google.
The Federal Risk Authorization Management Program unveiled a new framework designed to help agencies increasingly adopt emerging technologies that maintain rigorous security standards and that can be implemented into new and existing federal systems, according to a recent blog post.
This webinar will equip you with the insights and strategies you need to stay ahead of the curve in navigating the complexities of modern-day SaaS and data security challenges. You’ll learn how organizations are adapting to the dynamic intersection of SaaS-based collaboration and artificial intelligence while...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.