A startup that was reportedly almost acquired by Palo Alto Networks for $600 million has instead raised $100 million to forge ahead on its own. App security vendor Apiiro plans to use the proceeds to strengthen its ability to analyze code and developer activities across the software supply chain.
Organizations expect the IT security landscape to be consistent - from builds and hardware to operating systems - but for product security, everything Honeywell makes is a snowflake with flexible, highly tailored design across many technologies, says Honeywell Product Security Chief James DeLuccia.
The MITRE ATT&CK framework has been around for years, but we are now seeing it being adopted by organizations more as they realize the need for a strong IT security team and more funding is becoming available to increase the maturity of information security programs.
This framework helps organizations manage cyber...
A surging Microsoft has leapfrogged to the top of the SIEM Gartner Magic Quadrant, catapulting past security operations stalwarts IBM, Splunk, Securonix and Exabeam. Microsoft has climbed from being named a visionary by Gartner last year to crushing the SIEM market in execution ability this year.
For Round 4 of the MITRE ATT&CK® Evaluations, 30 vendors participated to see how their solutions stacked up in defending against modern threats. These tests leveraged the tactics, techniques and procedures of two sophisticated threat groups: Wizard Spider and Sandworm.
If you’re considering an XDR or EDR vendor,...
The Abnormal Security team just launched a new threat intel site named Abnormal Intelligence. Crane Hassold shares resources available, including an attack library, semiannual threat intel reports, a glossary and exclusive insights from the Abnormal team.
A phishing and fraud prevention vendor has bought a startup founded by Qualys' longtime engineering leader to help organizations more effectively discover and monitor assets. Red Sift says its purchase of Hardenize will help customers assess the security of their digital asset inventory.
In this episode of "Cybersecurity Unplugged," Amit Shah, director of product marketing at Dynatrace, discusses the implications of the Log4Shell software vulnerability and the need for organizations to take an observability-led approach to software development and security going forward.
Qualys has purchased a startup founded by longtime Qualcomm leaders to help detect supply chain infections, crypto miners and unauthorized activity in the cloud. The deal will allow customers to detect active exploitation, identify advanced threats and create an adaptive risk mitigation program.
With so much of the world now working remotely, the playing field for cyberattacks has never been bigger. And how companies respond to security incidents has never been more important. In this eBook, we’ll discuss five ways you can navigate the choppier waters of cyberthreats. You’ll discover why it’s critical...
The United States is arguably involved in a cyberwar against Russia and China - and appears to be losing. In this episode of "Cybersecurity Unplugged," Tom Kellerman of Contrast Security and Richard Bird of Traceable.ai discuss what the U.S. government and companies need to do to win this cyberwar.
Ransomware actors have intensified their attack campaigns by threatening critical infrastructure shutdowns, risking public health and safety, diverting vital public resources, and impacting data privacy.
Early detection of the intrusion allows an organization to accelerate their response, minimize the impact of...
It’s estimated that 300,000 new pieces of malware are created and an average of 30,000 websites are hacked every day, a speed that makes it very challenging for security systems to recognize the newest threats.
By examining trends in ransomware targets, it is becoming clear that some threat actors are motivated...
A compromise assessment answers the all-important question: Have you been breached? Even the most secure organizations routinely commission such assessments because attacks evolve, and corporate security cannot always keep up.
Download this whitepaper to learn more about:
Lifecycle of a targeted attack;
...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.