IoT deployments cause constant security concern, due to their frequent use as attack vectors for bad actors to gain access to broader network resources. Traditional security measures relying on agents and software updates pose challenges to manage and control on always-on, open IoT devices.
A new wireless WAN...
On July 14, 2021, the world welcomed a newborn.
Named cyber asset attack surface management (CAASM), Gartner announced its arrival in the Hype Cycle for Network Security 2021.
New acronyms and repackaged tools aimed at IT and security professionals pop up every year, though. So what makes CAASM different? Aside from...
Obsidian Security has in recent months invested in giving enterprises more visibility into how their SaaS applications are talking to other SaaS applications so that supply chain compromise can be more easily detected and thwarted, according to CEO Hasan Imam.
As the Russia-Ukraine war continues, Ukrainian government cybersecurity official Victor Zhora says that the country's computer emergency response team has tracked more than 1,600 online attacks and that defensively, "wipers continue to be the biggest challenge."
While security and risk management leaders can’t predict future threats, they can use the past to indicate how to prepare. This Gartner® analyst report recommends "shifting priorities toward designing security programs that rely on shared risk ownership, resilience and more-flexible response...
Infoblox has invested in shifting left in the cybersecurity kill chain with on-premises, cloud and hybrid versions of its BloxOne Threat Defense tools, which help security practitioners find and identify threats earlier and mitigate risks, says President and CEO Jesper Andersen.
Thoma Bravo is eyeing its third take-private security deal of 2022, initiating talks with Darktrace months after agreeing to buy SailPoint and Ping Identity. The cybersecurity AI firm says it's in early discussions with private equity giant Thoma Bravo on a possible cash offer for the business.
Signal says 1,900 of its customers have been affected by the recent phishing attack on its third-party vendor Twilio. Signal says phone numbers and SMS verification codes of 1,900 customers are compromised, potentially transferring access of these accounts to the attackers.
Robotic process automation (RPA) helps your business be more efficient, scalable and compliant. By arming your teams with these security best practices, you can help ensure RPA bots and the credentials they need are secure without slowing down the pace of business.
Security executives at Black Hat USA 2022 discuss the latest cybersecurity trends from confidential computing and unified threat hunting languages to attack surface management and recovery services, social engineering campaigns and blockchain vulnerabilities.
Black Hat USA 2022 opened with somber warnings from Chris Krebs about why application developers, vendors and the government need to solve major industry challenges. Key security executives also discussed DNS visibility, cloud security, patch management, APT strategies and supply chain woes.
An open architecture, a single pane of glass and robust endpoint security are vital to fueling Trellix's growth in XDR, says Chief Product Officer Aparna Rayasam. Trellix has given customers a unified view into their security posture for configuration, reporting and forensic purposes.
From a business perspective, Robotic Process Automation (RPA) promises to be a fast route to increased efficiency, productivity, and quality. Organizations are rapidly adopting RPA to automate business processes, from finance and HR to manufacturing and customer service. From a cybersecurity perspective, RPA also...
Recently CybelAngel CEO, Erwan Keraudy, and CRO Jeff Gore, sat down with Mathew Schwartz, Executive Editor of DataBreachToday to discuss ways for businesses to protect their growing external attack surface.
“Digital cloud technologies have added great flexibility and connectivity to business operations. However,...
Today’s challenges call for a new approach to Identity and Access Management strategy and solutions. In this brief whitepaper, you’ll learn about:
Building a CIO- and CISO-driven shared vision: With insights from IT and security leaders, you can better identify where you have the most existing and emerging...