As digitization, tools, and the attack surface increase — all against the backdrop of a global shortage of cyber talent — the need to reduce risk in an organization has never been more evident.
Sam Altman's abrupt exit from OpenAI has sent shockwaves rippling through Silicon Valley over this weekend, but of a variety very different than those that emanated from the recent collapses of FTX and SVB. Altman spent the last six years building a transformational technology.
Corporate boards of directors are now mandated to take stronger roles in enterprise cybersecurity. That can be both good news and concerning. David Homovich of Google Cloud tells how to turn board interest into a positive relationship to improve crisis communication and defenses.
Stolen and compromised credentials continue to be the crux of major health data security incidents involving cloud environments. But stronger credential management practices and a focused approach to "least privilege engineering" would help, said Taylor Lehmann of Google Cloud.
Palo Alto Networks plans to purchase a data security posture management startup led by a Microsoft and Google veteran and backed by Samsung. The proposed buy of Tel Aviv, Israel-based Dig Security will give Palo Alto Networks customers visibility into and control of their multi-cloud data estate.
Unveiling a vision of factory workers using AI chatbots to control the assembly line, fix production issues and develop code, Rockwell Automation plans to buy an industrial cybersecurity vendor and team up with Microsoft's generative AI practice to speed automation design and development.
A mid-market security operations vendor founded by a ex-Marine Corps officer closed its Series B funding round to pursue a product-led growth strategy. Washington D.C.-based Adlumin will use the $70 million to launch free tools in the cloud configuration and remote monitoring and management spaces.
The Clop ransomware operation's recent mass zero-day exploit of Progress Software's MOVEit secure managed file transfer software followed the criminals launching similar attacks against users of Accellion FTA, SolarWinds Serv-U and Fortra GoAnywhere.
Tenable held steady atop Forrester's vulnerability risk management rankings while Vulcan Cyber broke into the leaders category and Rapid7 and Qualys tumbled from the leaderboard. The way vendors deliver vulnerability management has shifted away from ingesting vulnerability assessment results.
Digital transformation in the cloud is continuous. It comes with an ever-expanding risk landscape that's increasingly challenging. As IT teams seek to meet these challenges, they must focus on scaling their businesses securely while continuing to innovate to improve the customer experience.
Visibility, consistency, efficiency - are goals every security leader strives to achieve across cloud environments, and remains one of the key digital transformation challenges. Cisco's Sean Baze talks about how to overcome this challenge and discover new efficiencies through a data-driven approach.
Watch this video, which takes you on a step-by-step walkthrough of a cloud breach and shows you how it could have been prevented with comprehensive cloud visibility and exposure management.
Cloud compromises and supply chain attacks are overshadowing ransomware as the top cyberthreats worrying healthcare sector organizations - but all such incidents are still viewed as significant risks to patient outcomes and safety, said Ryan Witt of Proofpoint, citing new research findings.
Microsoft says it spotted an unusual hacking campaign in which hackers attempted to move laterally through the Azure cloud after compromising a virtual SQL server. It marks the first time that computing giant defenders have seen a lateral movement attempt with SQL Server as the starting point.
Atos snagged the longtime European CEO of Accenture Technology to lead its soon-to-be-independent $5.76 billion cybersecurity, big data and digital unit. Yves Bernaert, 55, will split Atos' infrastructure and data management and business and platform solutions unit from its high-growth Eviden unit.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.