Hypr raised $30 million from Silver Lake Waterman to boost its identity security offerings, aiming for market expansion and a potential initial public offering. The investment supports the New York-based company's multi-product strategy in a rapidly evolving threat landscape.
Hackers are targeting clients of artificial intelligence data platform provider Snowflake that lack multifactor authentication, the company warns. Threat actors are compromising organizations’ Snowflake customer tenants by using stolen credentials obtained by info-stealing malware, said Mandiant.
The proposed $1.54 billion buy of Venafi by CyberArk will enhance its machine identity security capabilities, adding $150 million in annual recurring revenue and expanding the size of its total addressable market by 20%. The deal will close in late 2024 and immediately boost CyberArk's margins.
Dealing with generative artificial intelligence is challenging for CISOs on multiple fronts, including monitoring employee use of gen AI, as well as how to red team and security test their own large language models and products, said Daniel Kennedy, principal research analyst at 451 Research.
Mickey Bresman, co-founder and CEO of Semperis, discusses why ransomware actors increasingly target identity systems and backup files. He explains the importance of securing these systems to prevent attackers from crippling organizations and extorting ransom payments.
David Bradbury, chief security officer at Okta, discusses the shift in the cyberthreat battleground, the effect of artificial intelligence technology on identity protection, Okta's investments into its own security and lessons learned along the way.
SailPoint's CEO Mark McClain discusses the complexities of identity security and the emerging threats and solutions in the changing landscape of cybersecurity. Perimeter-based security has expanded, so security teams need to understand access in a world of mobile and cloud computing.
What are the key elements of a successful identity security program, and what are common pitfalls organizations experience when launching one? SailPoint healthcare experts Matthew Radcliffe and Rob Sebaugh detail myths and realities of today's cloud-based identity security deployment strategies.
The proliferation of identities, combined with cloud migration and the growing sophistication of attacks, has created the perfect storm for security teams who are facing a surge in identity-based cyberattacks. But as the number of identities grows, "you can do more with less," experts advise.
Threats to nonhuman identities encompass a broad spectrum of entities, including automation tools, AI agents and cloud applications that authenticate differently from traditional human identities, such as usernames and passwords, said Danny Brickman, co-founder and CEO, Oasis Security.
Organizations recognize the need for robust identity platforms to protect data and apply controls. With so much data being generated and processed, the market is going to experience a proliferation of next-generation identity platforms, said Alberto Yépez, co-founder and managing director, ForgePoint Capital.
With the ever-evolving threat landscape overlaid onto the continuous digital transformation underway at so many organizations across all sectors, a unified identity-centered zero trust security approach has never been more important, said Clay Rogers of CyberArk and Amit Chhikara of Deloitte.
The feds have expanded regulations for cybersecurity with the long-awaited NIST CSF 2.0 standards, and the new guidelines place more emphasis on overall risk management, as well as the "outsized role of identity in the context of a zero trust security posture," said Rohit Ghai, CEO, RSA.
Organizations are facing a critical imperative: strengthening their cyber resilience. Brian Spanswick of Cohesity and Tom Gillis of Cisco share insights into the evolving landscape of cyberattacks and the proactive measures being taken to combat them.
The U.S. federal government's cybersecurity agency warned that hackers are exploiting a vulnerability in DevOps platform GitLab that was patched in January. The vulnerability allows hackers to use the "forgot your password" function to send a reset link to an attacker-controlled inbox.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.