Effective cloud security demands solutions, controls, and countermeasures that are created for the cloud. After all, the cloud exposes digital assets to different kinds of risk from those hosted on traditional on-premises infrastructure. The Next Generation Firewall (NGFW) is particularly relevant in defending...
Days after announcing a security compromise, cloud-based identity and authentication management provider Okta said that an unknown threat actor had accessed files of 134 customers after an employee signed in to a personal Google profile on the Chrome browser of an Okta-managed laptop.
A Colorado-based customer identity platform hauled in $65 million to effectively identify and authenticate users with government IDs or mobile phones. The growth equity investment from Updata Partners will allow FusionAuth to better serve businesses in regions other than the U.S. and Europe.
Members of Congress don't agree on much these days. But a new bipartisan working group launched in the Senate on Thursday hopes to rally congressional support for potential legislation focused on improving the state of cybersecurity in the healthcare sector.
Stolen and compromised credentials continue to be the crux of major health data security incidents involving cloud environments. But stronger credential management practices and a focused approach to "least privilege engineering" would help, said Taylor Lehmann of Google Cloud.
Fortinet plans to shift its R&D and go-to-market investments to the faster-growing SASE and security operations segments as growth slows in the network security market. The company expects "more modest growth" in the near term given that 70% of Fortinet's billings today come from network hardware.
Accenture acquired one of Spain's most prominent cybersecurity service providers to better support multinational companies with a presence in the country. The consulting giant said its buy of Madrid-based Innotec Security will add 500 cyber professionals to Accenture Security's 20,000-person staff.
This week, Canada banned WeChat and Kaspersky apps, REvil members faced trial in a Russian military court, the British Library experienced an IT outage, Iranian state-backed hackers targeted Middle East governments and European officials extended the ban on Meta's behavioral advertising practices.
As enterprises continue their mass cloud migration and modernization, they commonly slip up with configurations, governance or just having access to the right skills to manage their workloads. Fortinet's Aidan Walden discusses the value to be found in a new partnership with Microsoft Azure.
Businesses today face a more diverse and more dangerous array of cybersecurity threats than ever before. With external threats like ransomware gangs and internal threats posed by disgruntled or departing employees, corporate digital forensics professionals need to be able to investigate possible malfeasance quickly...
Texas-based mental healthcare provider Deer Oaks Behavioral Health is notifying nearly 172,000 patients that their information was potentially compromised in a ransomware incident, even though the attack was apparently quickly detected and contained.
The fallout from the SEC's charges of fraud and internal control failures against SolarWinds and its CISO has implications for the industry. Cordery Compliance attorney Jonathan Armstrong advises security leaders to "take heed and remember that the actions of today can determine your fate tomorrow."
Splunk has executed its second round of layoffs since February, axing 7% of its workforce weeks after Cisco announced plans for a $28 billion acquisition. Splunk will reduce its 8,000-person staff by 7% or approximately 560 positions. Most of the jobs being cut are in the United States.
Once ransomware hackers get inside a healthcare sector organization's systems, 3 in 4 attackers will also maliciously encrypt data, says security firm Sophos. Attackers successfully encrypted data in 75% of ransomware attacks on healthcare sector entities, researchers report.
A scientist claims to have developed an inexpensive system for using quantum computing to crack RSA, which is the world's most commonly used public key algorithm. If true, this would be a breakthrough that comes years before experts predicted. Now, they're asking for proof.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.