Wiz bought a cloud detection and response startup founded by a longtime Israeli Military Intelligence leader to address security operations and incident response use cases. The deal will bring Wiz's chops in securing infrastructure and cloud environments together with Gem's expertise inside the SOC.
Cloudflare purchased an observability startup founded by an aerospace dynamics expert to enhance the developer experience on serverless platforms. Baselime will allow developers to optimize performance, investigate bugs and regressions, and identify when a release needs to be rolled back.
In the latest weekly update, ISMG editors discussed key insights on OT security from the Cyber Security for Critical Assets Summit in Houston, the implications of a critical Linux utility found to have a backdoor, and a CISO's perspective on comprehensive cloud security strategy.
A Department of Health and Human Services division that administers funding, training and other services to children and families is putting sensitive data at high risk because of gaps in cloud security controls and practices, according to a watchdog agency report.
Join Palo Alto Networks for an in-person interactive cloud security half-day summit on April 23, 2024, at the JW Minneapolis Mall of America.
Our experts will explain the possible risks across the entire application lifecycle and discuss how to use code-to-cloud intelligence to prioritize, remediate, and mitigate...
Healthcare entities can easily achieve many of the cyber performance goals set by regulators if they deploy technology solutions that provide robust security by default and create an organizational culture in which security-mindedness is ingrained, said Taylor Lehmann of Google Cloud.
The next generation of cybersecurity solutions is built on a scalable cloud data platform that supports fast search, generative AI (gen AI), machine learning (ML), embedded analytics and more, and it’s delivered where security teams already work. Security leaders at leading enterprises are building their security...
The move to cloud has uncovered a range of risks that enterprises might inadvertently overlook. Transition often highlights cloud concentration risk, which encompasses vendor, availability, business continuity and regulatory risks, said Abid Adam, group chief risk and compliance officer at Axiata.
As enterprises migrate their workloads, applications and data to the cloud, why should business security practitioners consider software firewalls for protecting their cloud environments? Raj Patil of Palo Alto Networks shares his top customer use cases.
Over 95% of Fortune 500
companies use Azure, and Microsoft
reported a 30% year-over-year
increase in Azure revenue in the
second quarter of fiscal 2024.
Cloud migration also brings new complexity, which
can hamper the visibility of applications, which in
turn can lead to issues maintaining a strong...
Major technology vendors keep being hacked by the nation-state hacking group Midnight Blizzard. Essential defenses to combat such attacks begin with implementing log monitoring across multiple platforms to find red flags, said John Fokker, head of threat intelligence at Trellix.
Amazon Web Services hired Gee Rittenhouse to help organizations protect their data and applications in the cloud. Rittenhouse spent more than two years atop San Jose, California-based security service edge vendor Skyhigh and prior to that, more than three years leading Cisco's cybersecurity unit.
Wiz is reportedly set to buy centralized cloud threat management vendor Gem Security for $350 million, Bloomberg reported this week. The deal would come just four months after Wiz made its first-ever acquisition, scooping up cloud-based development platform Raftt for as much as $50 million.
Agility, scale and consumption - these are three business benefits Palo Alto Networks Software Firewalls bring to cloud network security. Tiffany Henry and Katherine Rigdon of Palo Alto Networks showcase these features and the value of finding them all on a single platform.
As we step into the first half of 2024, the cyber threat landscape continues to evolve, with sophisticated actors exploiting the complexities of cloud environments. Our latest insights reveal a surge in credential abuse leading to cryptomining activities, increased ransomware and data theft incidents, and the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.