Organizations onboard multiple security solutions to meet their specific needs, such as securing cloud workloads or protecting identities, but many organizations lack the personnel or the training required to maximize the use of such tools, says Curt Aubley, COO and chief product officer, Deepwatch.
The Office of the National Cyber Director released the United States' first-ever report on the nation's overall cybersecurity posture, revealing significant improvements despite an ever-changing threat landscape and emerging technologies such as artificial intelligence that pose new challenges.
An enterprise browser offers control over browsing sessions and capabilities, enabling enterprises to manage security and connectivity, according to Amir Ben-Efraim, CEO, Menlo Security. He discusses the inherent vulnerabilities in existing browsers and Menlo Security's approach to securing them.
The move to cloud offers numerous benefits, but cloud apps and multi-cloud environments add complexity to defending IT environments. Palo Alto Networks and Google Cloud just renewed a multiyear, multibillion-dollar partnership to give customers end-to-end protection and secure infrastructure.
Offensive security in the past five years has moved from traditional pen testing to a platform-based strategy. BreachLock CEO Seemant Sehgal discussed why offensive security is more important than ever and how to convince the board to increase the budget for it.
New Veracode CEO Brian Roche discusses the importance of artificial intelligence in managing application risk, the integration of startup Longbow Security into Veracode's ecosystem, and the convergence of traditional application security with cloud security.
Personal branding is the practice of marketing oneself and one's career as a brand. It plays a role in how you are perceived and how you perceive yourself as a professional, and it can set you apart from other candidates. Here are tips on how to create and maintain your personal brand.
Island co-founder and CEO Mike Fey discusses how enterprise browsers facilitate efficient business processes through cloud integrations, safeguard sensitive data effectively and deliver a user experience tailored to the needs of business environments.
The National Security Agency last month issued guidance on advancing zero trust programs through the network and environment pillar, with a key focus on microsegmentation. While the concept of microsegmentation is nothing new, why is the NSA behind it? And when will others follow?
Wiz is in advanced negotiations to buy Lacework for between $150 million and $200 million. The companies recently signed a letter of intent and are now in the midst of a comprehensive due diligence process, after which a decision will be made on whether the acquisition will go through.
Here's ransomware news to celebrate: The number of victims who opt to pay a ransom has dropped to a record low. Also, the operators of two major groups hit by law enforcement disruptions have each chosen to swindle their affiliates, sowing disaffection and driving away burned business partners.
Hackers who appear to be Chinese are exploiting vulnerabilities in the OpenMetadata platform running as workloads on Kubernetes clusters to download cryptomining software, warned Microsoft. "I want to buy a car," the hackers tell victims in a note and solicit monero donations.
Wiz bought a cloud detection and response startup founded by a longtime Israeli Military Intelligence leader to address security operations and incident response use cases. The deal will bring Wiz's chops in securing infrastructure and cloud environments together with Gem's expertise inside the SOC.
Cloudflare purchased an observability startup founded by an aerospace dynamics expert to enhance the developer experience on serverless platforms. Baselime will allow developers to optimize performance, investigate bugs and regressions, and identify when a release needs to be rolled back.
In the latest weekly update, ISMG editors discussed key insights on OT security from the Cyber Security for Critical Assets Summit in Houston, the implications of a critical Linux utility found to have a backdoor, and a CISO's perspective on comprehensive cloud security strategy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.