Suspected North Korean hackers who targeted enterprise software firm JumpCloud are likely behind a social engineering campaign targeting the personal GitHub accounts of employees from major technology firms - including those in the cybersecurity sector.
The proposed $2.45 billion sale of Forcepoint's government security business to TPG will fuel investment and growth for both public sector and commercial customers, CEO Manny Rivelo said. Forcepoint determined that its government practice would benefit from an additional set of investments.
Enterprise software firm JumpCloud says a sophisticated nation-state threat actor is behind a security incident that targeted a small and specific set of customers last week. JumpCloud reset all of its API keys, potentially affecting thousands of customers including Cars.com and GoFundMe.
As U.S. government agencies migrate operations and apps to multi-cloud environments, there are lessons learned to be gained from their private sector counterparts. John Sellers of Cisco shares some of these lessons, as well as questions government security leaders need to be asking about the cloud.
Perimeter-based defenses are no longer effective against today’s ever-evolving cyberattacks. When 83% of organizations have experienced more than one data breach, stopping malicious actors requires a faster and better response than traditional perimeter-based security approaches.
This is where Zero Trust,...
Orca has accused cloud security rival Wiz of violating two patents associated with securing virtual machines and virtual cloud assets at rest against cyberthreats. Orca's complaint accused Wiz of patent infringement across its portfolio, including in its CNAPP, CSPM, CIEM, DSPM, IaC and CDR tools.
Enterprises today see the value in leveraging the myriad of applications available in various clouds — however, this means they often end up in multi-cloud by happenstance instead of intention. They find themselves with numerous disjointed applications that do not communicate or interact, preventing enterprises from...
In the latest weekly update, four editors at ISMG discuss highlights from recent ISMG events, the winners and losers in Forrester's first-ever network analysis and visibility rankings, and the ongoing tech trade war between the U.S. and China and its impact on the global supply chain.
Unlock the latest insights on cloud privilege access management. Discover how 500 cloud-forward organizations are securing their AWS environments with cutting-edge JIT temporary access solutions.
Download this report to learn:
Why least-privilege posture is critical to zero trust;
Why AWS needs more efficient...
In this report, you will learn:
Why Google Cloud was named a Leader in IaaS Platform Native Security
How Google Cloud's native security capabilities compare to those of other cloud providers
What contributed to Google Cloud receiving the highest score in the strategy category among all vendors evaluated
Say goodbye to IAM User and other native cloud access permissioning tools, and say hello to automatic multi-cloud permissioning!
Whether you operate in AWS, Azure, OCI or GCP – the new JIT access system automatically grants and revokes privileges across all cloud platforms. In this guide, you will learn how...
A growing number of security teams are looking to consolidate tools to simplify operations, said Gartner analyst Dionisio Zumerle. "When you have the complexity, it's very hard to identify misconfigurations between the different overlapping tools, and it's also hard to identify security gaps."
Financial services organizations face unique cloud security challenges, due to special regulatory, data security and privacy considerations that don't necessarily apply to other industries. Security and payments experts with overlapping skill sets unpack the challenges and how to deal with them.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.