The National Security Agency last month issued guidance on advancing zero trust programs through the network and environment pillar, with a key focus on microsegmentation. While the concept of microsegmentation is nothing new, why is the NSA behind it? And when will others follow?
Wiz is in advanced negotiations to buy Lacework for between $150 million and $200 million. The companies recently signed a letter of intent and are now in the midst of a comprehensive due diligence process, after which a decision will be made on whether the acquisition will go through.
Hackers who appear to be Chinese are exploiting vulnerabilities in the OpenMetadata platform running as workloads on Kubernetes clusters to download cryptomining software, warned Microsoft. "I want to buy a car," the hackers tell victims in a note and solicit monero donations.
Whether your files are located in the public cloud, private cloud, or within a hybrid environment, managing file transfers securely is essential for businesses today. A robust Managed File Transfer (MFT) solution can provide the security and control needed to move data confidently between systems, locations, users,...
Wiz bought a cloud detection and response startup founded by a longtime Israeli Military Intelligence leader to address security operations and incident response use cases. The deal will bring Wiz's chops in securing infrastructure and cloud environments together with Gem's expertise inside the SOC.
Cloudflare purchased an observability startup founded by an aerospace dynamics expert to enhance the developer experience on serverless platforms. Baselime will allow developers to optimize performance, investigate bugs and regressions, and identify when a release needs to be rolled back.
In the latest weekly update, ISMG editors discussed key insights on OT security from the Cyber Security for Critical Assets Summit in Houston, the implications of a critical Linux utility found to have a backdoor, and a CISO's perspective on comprehensive cloud security strategy.
The evolution of cloud computing in the financial sector has introduced complex security challenges that require innovative solutions. Samrat Bhatt of MatchMove Pay, who recently won ISMG's DCISO Award for technology innovation, shared his organization's journey to better cloud security.
A Department of Health and Human Services division that administers funding, training and other services to children and families is putting sensitive data at high risk because of gaps in cloud security controls and practices, according to a watchdog agency report.
Healthcare entities can easily achieve many of the cyber performance goals set by regulators if they deploy technology solutions that provide robust security by default and create an organizational culture in which security-mindedness is ingrained, said Taylor Lehmann of Google Cloud.
The move to cloud has uncovered a range of risks that enterprises might inadvertently overlook. Transition often highlights cloud concentration risk, which encompasses vendor, availability, business continuity and regulatory risks, said Abid Adam, group chief risk and compliance officer at Axiata.
As enterprises migrate their workloads, applications and data to the cloud, why should business security practitioners consider software firewalls for protecting their cloud environments? Raj Patil of Palo Alto Networks shares his top customer use cases.
Data is the catalyst for innovation and driving business success across industries.
The Industries using data like financial services, healthcare, and manufacturing require efficient data storage for informed decision-making and streamline business operations. Traditional systems often lack agility, leading to...
Major technology vendors keep being hacked by the nation-state hacking group Midnight Blizzard. Essential defenses to combat such attacks begin with implementing log monitoring across multiple platforms to find red flags, said John Fokker, head of threat intelligence at Trellix.
Amazon Web Services hired Gee Rittenhouse to help organizations protect their data and applications in the cloud. Rittenhouse spent more than two years atop San Jose, California-based security service edge vendor Skyhigh and prior to that, more than three years leading Cisco's cybersecurity unit.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.