Warning to workers: Your productivity tools may also be tracking your workplace productivity, and your bosses may not even know it. But as more workplace surveillance capabilities appear, legal experts warn that organizations must ensure their tools do not violate employees' privacy rights.
Glen Hymers, CISO and head of data protection at the U.K.-based charity Save the Children International, says adapting to a cloud-first environment requires extensive security measures, including automated monitoring.
Palo Alto Networks plans to acquire security startup Expanse in an $800 million deal. It will integrate Expanse's attack surface monitoring technology into its Cortex product suite.
83% of organizations are looking for new monitoring approaches to handle today's cloud complexity. IT teams are challenged with monitoring cloud services and mission-critical applications by separate tools which lead to swivel chair approaches, runaway costs, and fragmented operational data getting trapped in siloed...
Large financial services companies are prime targets
for a broad variety of threat actors, including the most persistent nation-state sponsored outfits.
From closing gaps in visibility to achieving a more proactive security posture, the following whitepaper illustrates how any organization can benefit from the...
Our apps and services are expected to work quickly and seamlessly on any number of devices, from different kinds of networks and in different locations around the globe. Monitoring the infrastructure that supports those experiences - layers of interconnected technologies that become more complex every year - is key to...
Federal authorities and medical device maker Philips have issued security alerts about security vulnerabilities in some of the company's patient monitoring software. Until patches are available, the company is recommending risk mitigation steps.
Acquirer fraud is a complex challenge with many facets. It ranges from "friendly"
fraud (customers who claim they didn't buy an item) and theft by criminals using stolen
credentials, to falsified transactions by merchants. Each scenario has its own set of
challenges and financial implications, and are difficult to...
TeamTNT, a recently uncovered hacking group, is weaponizing Weave Scope, a legitimate cloud monitoring tool, to help install cryptominers in cloud environments, according to reports from Intezer and Microsoft.
The latest edition of the ISMG Security Report analyzes why Barclays is being investigated for allegedly spying on its employees. Also featured: How the pandemic is affecting CISOs; an FBI assessment of nation-state threats to U.S. election.
The U.K.'s privacy watchdog is probing banking giant Barclays over its use of employee monitoring tools after the bank in February reportedly shifted from anonymized tracking to giving managers the ability to view data for individual employees.
Most cybersecurity tools are designed to help identify and alert on a particular type of malicious activity. But usually the burden lies with the organization to figure out whether the alert is meaningful in a broader context. Splunk can help centralize analysis and visibility across a multi-layered security...
With cloud adoption on the rise, businesses have been transitioning to hybrid and multicloud environments at an incredible pace. In fact, Gartner predicts that 80% of enterprises will have entirely cloud-based infrastructures by 2025.
Having a strategy to mitigate the challenges of these new, complex infrastructures...
Gartner has recognized Splunk as a Visionary in the Magic Quadrant for Application Performance Monitoring (APM). We believe this first-time placement in the research reflects the market-leading APM capabilities from Splunk, the Data-to-Everything™ Platform, including Splunk® Enterprise, and Splunk® IT Service...
Application container technology is revolutionizing app development, bringing previously unimagined flexibility and efficiency to the development process. A good monitoring solution is necessary for dynamic, container-based environments to unify container data with other infrastructure data - only then can you gain...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.