Securing thin edge locations, such as very small offices, isn’t commonly discussed as part of campus or branch security. Yet a thin edge location can be an entry point to the corporate network for malware or ransomware. With the rise of the hybrid workforce, many users work from thin edge locations like satellite...
The rapid adoption of cloud technology has brought numerous benefits to businesses, but it has also introduced new risks and challenges to information security. In this session, we’ll explore various scenarios that can lead to the compromise of cloud environments and the impact that can have on an organization’s...
Cloud security is becoming a major challenge for security leaders. Kevin Kiley, chief revenue officer at Lacework, explains why traditional security methods fall short in cloud environments and how data-driven approaches offer better protection against new and complex threats.
Brian Honan, CEO of BH Consulting, discusses the need for robust logging capabilities in Microsoft 365 to prevent security breaches. He called for security features to be standard, highlighting issues from a recent intrusion and the risks associated with technologies such as Microsoft's Copilot.
Attackers who stole terabytes of data from customers of Snowflake have been not only offering the data for sale on data leak marketplaces but also extorting some of the victims, demanding a ransom of $300,000 to $5 million each, security researchers report.
Network security threats are ever-evolving, and all types of organizations work hard to face down emerging threats while maintaining robust performance across their hybrid cloud infrastructure. In this quest, Gigamon stands out as a critical ally.
In today’s ever-evolving threat landscape, organizations require robust network security solutions to protect
their critical assets in the cloud. Google Cloud and Palo Alto Networks visited us recently to talk about the
general availability of Google Cloud NGFW Enterprise, the next-generation cloud firewall that...
Chief Information Security Officers (CISOs) face unprecedented challenges in their efforts to protect their organizations against a rising tide of increasingly sophisticated cyberthreats.
In the dynamic and heavily regulated world of property insurance, companies are constantly seeking innovative ways to streamline operations and enhance security measures. Companies continue to struggle with effectively managing user access reviews (UARs) across their proliferating SaaS and cloud applications....
Fortinet recently surveyed over 900 security professionals about cloud security, and Frederick Harris, senior director of product marketing at Fortinet, pointed out that one key finding was no big surprise: "Security and compliance continue to be a major roadblock to cloud adoption."
Fortinet plans to purchase trouble late-stage startup Lacework to integrate its AI-driven cloud native application protection platform into the Fortinet Security Fabric. The deal enhances Fortinet's Unified Secure Access Service Edge platform, providing protection from code to cloud.
Tenable plans to acquire Israeli startup Eureka to enhance its cloud security platform with advanced data security posture management capabilities. The transaction aims to provide customers with comprehensive risk assessment and management tools in a single, unified platform.
In a clash of cloud security titans, Wiz denied all claims made by rival Orca Security of patent infringement and unauthorized use of proprietary information. Instead, Wiz said Orca copied its technological advancements and used confidential information to enhance its own products.
Microsoft is calling security research asserting a high-severity vulnerability exists in Microsoft Azure evidence that customers should better configure their cloud environments. An attacker with an Azure instance could obtain access to company resources by sending customizable HTTP requests.
George Kurtz said CrowdStrike's Falcon platform is leading the way in cybersecurity consolidation, with deals involving cloud, identity or SIEM doubling year-over-year. Customer are seeing significant cost savings and faster response times, which Kurtz said has solidified CrowdStrike's position.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.