The Biden Executive Order was a catalyst for action, with tight delivery times for action, including promotion of SBOM and Zero Trust. The cyber-physical nexus and expanding threat surface mean it’s not easy to maintain vigilance, but recognizing that is the first step.
Web application attacks are one of the biggest causes of data breaches. However, many organizations are either unwilling or unable to prioritizing application security. The Breakdown of the Application Security Report expands on the barriers that prevent companies from addressing their cybersecurity weaknesses and...
Ransomware-wielding criminals constantly refine their behavior and tactics to maximize the chance of a payday, and recently they have been implementing fresh strategies for monetizing stolen data, says Steve Rivers at threat intelligence firm Kela.
XM Cyber has purchased Cyber Observer to help customers ensure their security products are installed and configured correctly and not opening up potential attack vectors. The deal will help customers see both their areas of exposure as well as how their existing security controls can react.
The apps your dev teams are building have changed, your security tools should too. Digital transformation, omnichannel marketing and directly connecting with customers among other key business imperatives have accelerated application development cycles. Development teams have widely adopted agile development practices...
IronNet is laying off 17% of its employees in a cost-cutting effort just 10 months after going public by merging with a special purpose acquisition company. The 55 layoffs will occur by the end of June and the company will spend the $1 million allocated for severance and other termination benefits.
Watch out for APT and state-sponsored hackers using the Log4Shell vulnerability to gain unauthorized entry into unpatched VMware Horizon Systems and Unified Access Gateway servers, says a joint advisory from CISA and the U.S. Coast Guard Cyber Command.
Nearly 1,400+ Elastic customers shared their experience through a third-party survey managed and analyzed by Socratic Technologies. The insights show a quantified acceleration of key benefits across Elastic’s solutions, cloud capabilities, and platform.
Read this report to understand how Elastic empowers users to...
Modern applications and architectures are permeating more deeply into organizations to transform back-office functions as well as those that directly affect the customer experience, according to Kara Sprague, F5's executive vice president and general manager of application delivery.
EDR, MEDR, MDR, XDR - How does one begin to make sense of this alphabet soup that attempts to spell "detection and response?" Nirav Shah of Cisco discusses the merits of each of these options, as well as how one can start to make the decision on which is right for one's own organization.
The U.S. Cybersecurity and Infrastructure Security Agency has begun issuing alerts about 56 flaws across operational technology equipment built by 10 different vendors. Researchers at Forescout Technologies say the flaws trace to poor design decisions by vendors.
If you thought consumer expectations were already high, did you know that 57 percent of users now say brands have just one shot to impress them? Once a company’s digital service is unavailable or doesn’t perform, they won’t use it again.
That’s a serious challenge for enterprises today. How do you ensure...
Grappling with the ever-increasing scale and complexity of your IT infrastructure?
You’re not alone. In fact, 75 percent of global technologists say they are faced with more IT complexity than ever before.
Like other IT leaders, you’re charged with managing more data, more providers, and more...
CISO’s need a plan of attack for their external digital risks. Join us to see how these 5 use cases will help you embrace ASM and make the most out of your investment.
Discovery of all assets;
Discovery of all vulnerabilities and prioritizing them;
Exposing shadow IT;
Measuring M&A risk;