Wouldn’t it be great to understand the financial impact an enterprise-wide purchase would have on your organization before you buy it?
When it comes to cloud security, you can.
Palo Alto Networks commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study that examines the potential return...
In the rapidly evolving technological landscape, cloud-native solutions and microservices are revolutionizing the traditional software supply chain. Kavita Viswanath of JFrog underscores the need for an integrated platform to tackle these complexities in a globally distributed development environment.
Palo Alto will spent nearly $670 million buying Talon and Dig to broaden its cloud security portfolio and protect unmanaged devices without affecting usability. Purchasing Tel Aviv, Israel-based Talon Cyber Security for $435 million will help safeguard the 36% of the workforce that's independent.
Corporate boards of directors are now mandated to take stronger roles in enterprise cybersecurity. That can be both good news and concerning. David Homovich of Google Cloud tells how to turn board interest into a positive relationship to improve crisis communication and defenses.
Visibility, consistency, efficiency - are goals every security leader strives to achieve across cloud environments, and remains one of the key digital transformation challenges. Cisco's Sean Baze talks about how to overcome this challenge and discover new efficiencies through a data-driven approach.
Watch this video to learn, how an exposure management platform that combines risk-based vulnerability management, web application security, cloud security, and identity security
Cisco has released urgent fixes to a critical vulnerability affecting an emergency communication system used to track callers' location in real time. A developer inadvertently hard-coded credentials in Cisco Emergency Responder software, opening a permanent backdoor for unauthenticated attackers.
CrowdStrike will buy an application security firm founded by two Israel Defense Forces veterans to deliver risk visibility and protection across the cloud. The deal will provide visibility into application behavior and vulnerability prioritization for server-based and serverless infrastructure.
Tenable will purchase a cloud security startup founded by the longtime leader of Secdo to help security teams make efficient and accurate remediation decisions. The proposed buy of Ermetic will make it easier for security professionals of all cloud expertise levels to spot and quickly address risks.
GrammaTech has separated its security software products and cyber research services divisions, and venture capital firm Battery Ventures has acquired the former and renamed it CodeSecure. The Washington, D.C.-area application security testing software business will pursue M&A in adjacent markets.
Venture-backed cloud security firm Wiz swallowing up publicly traded endpoint security firm SentinelOne would be one of the most unorthodox and surprising acquisitions the cybersecurity industry has ever seen. But despite the major financial hurdles, the potential technology synergies are obvious.
Large enterprises may have hundreds or thousands of APIs. Concerns over API vulnerabilities have been around for years, but most organizations outside of highly regulated industries such as banking have not taken the steps to understand the threats they face, said Richard Bird, CSO at Traceable.
In the latest weekly update, ISMG editors discuss the White House's debut of a $20 million contest to exterminate bugs with AI, a New York man admitting to being behind the Bitfinex hack, and a new malware campaign that is targeting newbie cybercriminals in order to steal sensitive information.
OpenText acquired several cyber companies in recent years to protect sensitive information and data everywhere from consumer to large enterprise environments, said EVP Prentiss Donohue. The Micro Focus buy shored up OpenText's offerings around application and data security and identity management.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.