IronNet is laying off 17% of its employees in a cost-cutting effort just 10 months after going public by merging with a special purpose acquisition company. The 55 layoffs will occur by the end of June and the company will spend the $1 million allocated for severance and other termination benefits.
Most publicly traded security vendors specialize in one technology category, but Palo Alto Networks has built out industry-leading practices around network security, cloud security and security operations. CEO Nikesh Arora discusses this unique path.
The interconnectedness and interdependence of today’s world has led to incredible growth, innovation and benefits across the technology sector. But when considering cybercrime and cyberattacks, that interconnectedness and interdependence could lead to more disruption, destruction and broad-reaching collateral...
Palo Alto Networks' product portfolio is paying dividends as customers look to reduce their vendor footprint, says CEO Nikesh Arora. He says despite pressures in the global economy, enterprises aren't currently stressing about their IT budgets.
Extended detection and response (XDR) is the evolution of endpoint detection and response (EDR), providing optimized threat detection and response that spans security and business tools. In contrast to legacy SIEM approaches and current security analytics platforms, XDR is grounded in EDR, unifying it with other...
Double-extortion ransomware. Supply chain attacks. Weaponized zero-days. It's an advanced threat landscape, and it requires advanced defenses. Taylor Ettema of Palo Alto Networks outlines the key capabilities today's security solutions require to step up against the adversaries' ongoing innovation.
In this eBook...
Check Point is aggressively expanding its salesforce and standing up "rockets" focused on emerging technology areas to land more customer deals outside network security. The company will couple 25% growth in its salesforce with dedicated investments around cloud security, email security and MDR.
With the need for effective threat detection and response becoming more crucial by the day, cybersecurity leaders realize that partnering with a vendor is crucial. At the same time, they are confused about which service provider is right for their business.
This white paper is intended to help you understand the...
When it comes to advanced threat response, 42% of financial institutions say their current abilities are average. Only 35% say automation currently plays a strong role. Josh Zelonis of Palo Alto Networks and Sid Srivastava of Accenture analyze the State of Security Automation in Financial Services.
Are you interested in exploring how to defend against ransomware and supply chain attacks, or securing your public cloud? Then register now to experience hands on how Vectra sees threats and stops breaches.
Securing hybrid and multi-cloud workloads and supporting infrastructures is a daunting challenge for many organizations. Tried and trusted on-premises approaches and tools often don’t easily translate to the cloud and cloud-native monitoring and security tools are often platform specific making it difficult to gain...
Are you ready to supercharge your security operations using orchestration and automation? A Security Orchestration, Automation and Response (SOAR) tool can automate monotonous security tasks, help you respond to security incidents faster, and increase team productivity and efficiency.
Gartner’s latest Market...
There are thousands of single-purpose security tools on the market. Some search for threats in on-prem environments only. Others only monitor the cloud. And others are focused solely on email security.
But even if your organization could afford to invest in every single-purpose tool on the market, there would still...
Security operations (SecOps) leaders say they struggle to detect hidden and unknown threats with legacy tools, mitigating the potential threats of dark data, and overcoming resource-intensive issues to stay ahead of cyberthreats. They have to navigate these challenges while dealing with a talent shortage.
This is...
XDR - Extended detection and response - promises to integrate data from any source to stop today's sophisticated and often automated attacks. The key is: Which source?
Register for this exclusive session for insights on why network evidence must be a key part of your XDR strategy. Topics to be discussed include how...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.