Join CrowdStrike VP of Product Marketing Ian McShane and Zscaler Director of Transformation Strategy Nathan Howe as they offer insight into how cloud and endpoint security can join hands to strengthen security protection, detection and remediation.
In technology, buzzwords come and go, but one of the more common terms in security these days is "next-generation (or next-gen) endpoint protection."
But what does that really mean? Solutions from all origins are now deemed "next-gen" with seemingly little basis for comparison. Is it nothing more than spin, or is...
Despite significant investments in common DLP and analytics technologies, breaches and theft of sensitive data continue to rise. This is because the data itself is only monitored, not protected. But what are the gaps in your current technology investments and how can they be filled?
To ensure data security and...
An internet-connected coffee machine is the latest IoT device to show security problems. The security firm Avast infected the Smarter Coffee machine with ransomware that causes uncontrollable spinning of its grinder and dispensing of hot water. The only option to stop it? Unplug the machine.
Microsoft removed 18 apps from its Azure cloud platform that were being used by hackers as part of their command-and-control infrastructure. The threat group, called Gadolinium, was abusing the infrastructure to launch phishing email attacks, Microsoft researchers say.
Revisiting remote workforce security defenses, simplifying cloud access controls and pursuing risk-based vulnerability management and passwordless authentication are among the 10 security projects that all organizations should consider for this year and next, according to advisory firm Gartner.
Establishing and maintaining a secure IT environment that consists of diverse hardware, software, and network
components with increasingly emerging security attacks have presented many organizations with a
formidable challenge today. IT operations and security teams continue to seek more effective ways to...
When a crisis manifests, organizations need to respond quickly or risk insolvency. Some crises
require that companies, organizations, and government agencies enable remote workers quickly
and efficiently to ensure operational and business continuity. Such efforts to enable a remote workforce
are challenging for...
Cost saving initiatives are more important than ever as global crises force employees to work at home amid
falling revenues and impacts to business continuity. As fiscal scrutiny increases, companies are recognizing
the significant operational and financial costs of having too many tools, often with redundant...
In this webinar we explore Public Key Infrastructure as a Service (PKIaaS) and how this time-tested solution will provide organizations with a secure certificate-based strategy that reduces the threat landscape. A cloud-based PKIaaS solution can reduce the complexity and expense of a traditional PKI deployment, while...
It might be new, but are we ready to call this "normal?" In this latest in a series of CEO/CISO panels, cybersecurity leaders talk frankly about the new risk surface and the role emerging technologies play in helping us keep pace with our adversaries.
What will be the impact of the leak of investigatory documents from FinCEN - the U.S. Treasury Department's Financial Crimes Enforcement Network? For starters, experts warn that FinCEN reports may reveal sensitive information tied to banks and law enforcement agencies' investigatory tools and tactics.
Users are increasingly working from remote locations and applications are moving to the cloud. The internet is the new corporate network. Traditional security models, built for the on-premises, data center era, can no longer keep up.
The Zscaler Cloud Security Platform integrates with the CrowdStrike Falcon...
A hacking group targeting Iranian dissidents has developed malware that can bypass two-factor authentication protection on Android devices to steal passwords, according to Check Point Research. The hackers have also targeted victims' Telegram accounts.
Mozi, a relatively new peer-to-peer botnet, is now dominating global IoT network traffic, according to a new report from IBM's X-Force unit. The malware is being used to launch DDoS attacks as well as mine for cryptocurrency.