Tool sprawl was an issue before digital transformation and the move to modernization. But now the challenge is amplified, says Jay Livens of Dynatrace. But there is an alternative to tool sprawl, Livens says. He describes a new approach to managing cybersecurity solutions.
Not so long ago, security organizations rallied behind best of breed security solutions. But now, trying to reduce tech debt, rationalize tools and consolidate vendors, there is a push for the platform approach. Cisco's Amilcar Alfaro talks about how to tap into the platform advantage.
Executives and board members always want the answer to be “yes,” but CISOs know it’s irresponsible to make such a blanket statement. An adversary could be any potential threat — whether external or internal, intentional or unintentional. So, the question CISOs should be answering is: “Are we...
In a world where the adversary has historically had the upper hand, Cortex and IBM have partnered together to flip the script for their clients by combining best in breed technology with extraordinary services.
Palo Alto Networks and IBM today announced that IBM Security's X-Force will use Palo Alto Networks'...
Observability is not necessarily a commonly understood term in cybersecurity circles. What exactly does it mean in context, and how does it relate to security? Jackie McGuire of Cribl discusses the observability pipeline and how best to build a solution.
Ngrok has closed a $50 million Series A round to provide enterprise-grade authentication and user and session observability without adding complexity for developers or users. Ngrok will use the proceeds to support additional authentication protocols and build out integrations and connections.
Resiliency is a core topic in OWASP's Mobile Application Security Verification Standard. What's key context to know? Dan Shugrue of Digital.ai discusses how to deepen a DevSecOps program by training developers in code obfuscation, anti-tamper, RASP and monitoring.
Security, observability and search vendor Elastic will shrink its workforce by 13% due to small and medium businesses reducing their purchases amid the economic downturn. Elastic will lay off nearly 400 of its 3,056 employees as it adopts an automated, low-touch motion for SMB customers.
Most cybersecurity tools are designed to help identify, alert on, and in some cases prevent a particular type of malicious activity. Current technologies send alerts and may even prevent specific types of attacks, but the burden remains with the organization to figure out whether that alert is meaningful in a broader...
In 2021, GigaOm released their first report, evaluating vendors and products in the observability space. According to the report, Splunk earned the only ‘Outperformer’ ranking on the list for “massive scalability, sophisticated in-stream analytics and native OpenTelemetry support".
The 2022 report again ranks...
Despite the promise of transformational results, enterprises struggle to gain the full value of multicloud environments. Siloed approaches in the hybrid, multicloud world mayresult in more complexity, slower innovation and higher costs than before cloud migration.
To unlock the fastest path to value, organizations...
Digital experience management (DEM) enables organizations to monitor and manage digital experiences (DX), which are crucial for the online user experience and your bottom line. System reliability engineering (SRE) enables organizations to achieve DX optimization, and by establishing and measuring service-level...
Engineers have long-devised various ways to collect reams of data from across their ever-expanding IT infrastructure operations. This treasure-trove of insights – buried deep within systems and software – helps IT operators improve such critical digital business requirements as network throughput, application...
Most API Security vendors do not collect the depth of data required to fully protect APIs at scale. This usually comes down to limitations in their data collection and deployment methods. And those limitations can result in a data breach.
Traceable takes a unique approach to data collection for context-aware...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.