Welcome to Information Security Media Group's Black Hat and DEF CON 2024 Compendium featuring latest insights from the industry's top cybersecurity researchers and ethical hackers, as well as perspectives from CEOs, CISOs and government officials on the latest trends in cybersecurity and AI.
Data integrity, collection, analytics - they all are essential for compliance reporting, and yet each remains a challenge for enterprises across business sectors. Siva Vrs of Wipro discussed the pain points with compliance in the cloud era and Wipro's partnership with AWS to alleviate them.
In this interview with...
In today's rapidly evolving digital landscape, businesses are becoming increasingly invested in cloud environments to drive innovation and efficiency. However, this shift to the cloud comes with its own set of security challenges. Tools like Cloud Native Application Protection Platforms (CNAPP), Cloud Security Posture...
We’ve talked a lot about the convergence of networking and security over the years. It is a natural evolution to turn to connecting and securing OT environments and cyber-physical systems. Fortinet's John Maddison opens up on the debut of Fortinet's new OT Security Platform.
Aqua Security carried out its second round of layoffs since 2022 as the future prospects for stand-alone cloud security vendors look increasingly uncertain. Aqua said axing 10% of its workforce will ensure Aqua continues on a path to profitability that's aligned with current economic conditions.
Despite all the platformization buzz, there are very few vendors with market-leading capabilities in at least three disparate security technology categories. That could change if Google forges buys cloud security firm Wiz for a reported $23 billion just two years after buying Mandiant.
The dynamic nature of cloud environments introduces unique security challenges, such as maintaining compliance, protecting sensitive data, and ensuring visibility and control over network activities.
Organizations have to maintain robust security in hybrid and multi-cloud environments while balancing customer...
Google Cloud offers a long list of advantages for businesses, with the ability to quickly generate new revenue streams and accelerate time to market for solutions that customers need. But the cloud presents unique security considerations. As an organization grows, so does its attack surface. Failing to address these...
Google Cloud powers nearly ten percent of businesses worldwide. This eBook explains how to secure any variation of a Google Cloud environment, from securing a move to the cloud to continuous data protection at scale.
Download this eBook to learn how to:
Improve perimeter protection without sacrificing...
Large global financial services institutions are facing mounting challenges from several directions at once. The rising demand for more digital products; fiercer, more frequent cyberattacks; and tighter banking regulations are all converging on a competitive, dynamic landscape where legacy institutions and fintech...
Organizations are modernizing their IT operations to develop applications faster and accelerate time to innovate to maintain their competitive position in the digital innovation era. Google Cloud provides customers with modern tools to enable business innovation. However, cloud computing expands the digital attack...
More than 60% of global financial institutions with at least $5 billion in assets were hit with a cyberattack in 2022. Banks have seen a 238% surge in cyberattacks since the start of the COVID-19 pandemic. The key amongst these trends is securing the cloud.
Financial services enterprises continue to leverage the...
Remote workers accessing cloud-based services will only become more common in the foreseeable future. Securing these interactions requires a new approach to endpoint security. Rather than passively waiting for a file-matching malware signature to enter the network, the latest endpoint detection and response (EDR)...
Cloud adoption, innovation, and integration are all on the rise, representing trillions in potential revenue. With those opportunities come cybersecurity vulnerabilities that businesses need to pivot against in a proactive, iterative, and fully integrated manner to keep up with a rapidly evolving threat...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.