Cybersecurity firm SentinelOne is set to acquire PingSafe for an undisclosed sum of cash and stock. The move will integrate PingSafe's cloud-native application protection platform into SentinelOne's Singularity Platform, creating a unified and advanced cloud security solution.
Joe Kim, president and CEO of Sumo Logic, delved into the company's strategic shifts and future priorities after its acquisition by Francisco Partners this year. The company is now focusing on areas such as cloud-native scalability, technological advancements and a customer-centric approach.
Cloud vulnerabilities and misconfigurations can expose government organizations to the threat of data breaches, service outages, and debilitating cyberattacks. To ensure organizational continuity, it is imperative that DevOps and Security teams equip themselves with the tools and shared insights needed to remediate...
Traditionally, connecting private and public cloud networks posed challenges, requiring complex workarounds and multiple products for a hybrid solution. However, the emergence of multitenant VPC capabilities has transformed this landscape. With complete control over network configurations, including IP address ranges,...
Cisco announced plans to acquire another cloud security startup as part of a series of recent acquisitions and investments in the company’s multi-cloud networking capabilities and security offerings, including the major $28 billion acquisition of Splunk.
Wouldn’t it be great to understand the financial impact an enterprise-wide purchase would have on your organization before you buy it?
When it comes to cloud security, you can.
Palo Alto Networks commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study that examines the potential return...
The cloud modernisation of ERP applications is gaining traction rapidly across the Middle East, Turkey, and Africa (META) region. According to the IDC Cloud Survey, conducted in January 2023, approximately 96% of CIOs in South Africa plan to modernise their ERP applications using cloud services. In addition, 92% of...
Despite the ongoing digital shift, some organisations still operate their ERP systems from on-premises servers. Companies' reluctance to adopt cloud-based ERP systems is mainly due to the perceived cost implications of cloud-based solutions and the perceived security risks inherent in the cloud environment.
The...
While the global deployment of CNAPPs is on a steady rise, it is essential to note that adoption is primarily among a small percentage of users, particularly large-scale enterprises with ample resources to explore advanced development models and security defenses, as CNAPPs adoption extends beyond just security...
The modern threat landscape, consisting of hybrid and multi-cloud infrastructure, requires new security measures to detect evolving cyberthreats in real-time. Zero-day threats pose risks that SOC teams can almost entirely mitigate with proactive measures that secure the cloud environment and protect sensitive data....
The modern threat landscape, consisting of hybrid and multi-cloud infrastructure, requires new security measures to detect evolving cyberthreats in real-time. Zero-day threats pose risks that SOC teams can almost entirely mitigate with proactive measures that secure the cloud environment and protect sensitive data....
Vulnerability management in the cloud sits at the critical intersection of AppSec and Cloud Sec, requiring an understanding of both in order to be effective. The cloud presents us with many new opportunities for vulnerability management, but our approach must take into consideration the unique aspects of cloud...
In the constant struggle to manage the other five pillars - identify, protect, detect, respond and recover - security leaders often do not have governance at top of mind, said Netography CEO Martin Roesch, but he added, "Good governance is the root of having good security."
Security researchers say attackers are actively attempting to exploit a critical vulnerability in unpatched ownCloud implementations, which they can use to steal credentials and other secret information. Last month, ownCloud said it had sent all users a security alert and updates to fix the flaws.
In this episode of "Cybersecurity Insights," Eyal Fisher discussed Sweet Security's Cloud Runtime Security Suite, which helps CISOS and security teams defend against all stages of a cyberattack by gathering data, generating insights, baselining the normal environment and looking for deviations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.