Check Point's product sales have taken their biggest nosedive since 2018 as customers extend sales cycles and postpone projects while prospects decline to buy new products. The company said businesses have increasingly delayed product refresh projects since November in an effort to tighten budgets.
Healthcare sector entities' reliance on specialty and legacy equipment, including imaging systems and other gear, continues to present attractive targets for threat actors and a growing risk for medical providers, said Frank Catucci, CTO and head of research at security firm Invicti Security.
The threat posed by cybercriminals and fraudsters creates shared risks across the financial services industry including fintech companies. But fintech firms can balance rapid innovation with security and work with each other and governments to repel attackers, said Razorpay CISO Hilal Lone.
The transition to the cloud at a fast pace during the pandemic affects information security to this day, said Amer Deeba, co-founder and CEO, Normalyze. Cloud drove innovation but left organizations wondering where the data was going across multiple clouds and what was the best way to secure it.
The increase in attack vectors and new threats has prompted companies to invest heavily in cybersecurity tools. But CISOs struggle with managing siloed products that do not integrate with each other. Consolidation of security architecture is a priority for CISOs, said Check Point's Itai Greenberg.
Cybersecurity is "a full-time task" that requires a lot of discipline, says Ajay Sabhlok, CIO and chief digital officer at Rubrik. He discusses tips for increasing your company's cyber maturity, ideas about how CIOs and CISOs can align, and advice on what not to do, such as pay a ransom.
In recent years, a wide range of organizations have made unprecedented migrations to cloud. But as businesses increasingly rely on cloud-based technologies, the need to mitigate cybersecurity threats has never been greater. Is CNAPP the solution to defending against adversaries in the cloud?
Threat actors are exploiting Kubernetes Role-Based Access Control in the wild to create backdoors and to run cryptocurrency miners. Researchers observed a recent campaign that targeted at least 60 Kubernetes clusters by deploying DaemonSets to hijack and steal resources from the victims' clusters.
Palo Alto Networks and IBM have joined forces to create a strong partnership designed to deliver best-in-class security solutions and services. In an exclusive interview, Bob West of Palo Alto Networks joins IBM's Abhi Chakravorty to discuss the power of the partnership for customers.
House Oversight Committee members on Thursday called for the firing of whoever caused the DC Health Benefit Exchange breach and exposed the personal information of Congress members on a dark web forum. The breached was blamed on "human error" and a server configured with no authentication controls.
Important lessons about security and risk management aren't being learned, remembered and applied by defenders amid organizations' rapid migration to the cloud, according to the finding that just 5% of security rules, on average, trigger 80% of all alerts, threat intelligence group Unit 42 warns.
The launch of Microsoft's Security Copilot may have attracted the most attention in the market since it was developed by the company that brought generative AI chatbots to the masses, but it's neither the first nor the only security product to incorporate OpenAI's ChatGPT into its design.
Cradlepoint has bought seasoned Israeli security veteran Ericom Software to bring SASE, zero trust and cloud security to hybrid 5G and wireline environments. The deal will help Cradlepoint's SASE and zero trust technology portfolio cover fixed-site, remote worker, in-vehicle and IoT use cases.
Hard disk drive maker Western Digital disclosed a hacking incident the company says likely resulted in data theft. Online services offered by the California company - including personal and enterprise cloud storage and email and push notifications - are down as of publication.
Hackers have used a modular toolkit called "AlienFox" to compromise email and web hosting services at 18 companies. Distributed mainly by Telegram, the toolkit scripts are readily available in open sources such as GitHub, leading to constant adaptation and variation in the wild.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.