Amazon Web Services hired Gee Rittenhouse to help organizations protect their data and applications in the cloud. Rittenhouse spent more than two years atop San Jose, California-based security service edge vendor Skyhigh and prior to that, more than three years leading Cisco's cybersecurity unit.
Wiz is reportedly set to buy centralized cloud threat management vendor Gem Security for $350 million, Bloomberg reported this week. The deal would come just four months after Wiz made its first-ever acquisition, scooping up cloud-based development platform Raftt for as much as $50 million.
Agility, scale and consumption - these are three business benefits brought to cloud network security by Palo Alto Networks Software Firewalls. Tiffany Henry and Katherine Rigdon of Palo Alto Networks showcase these features and the value of finding them all on a single platform.
As we step into the first half of 2024, the cyber threat landscape continues to evolve, with sophisticated actors exploiting the complexities of cloud environments. Our latest insights reveal a surge in credential abuse leading to cryptomining activities, increased ransomware and data theft incidents, and the...
The New York-based cloud security phenom is speaking with several investors include Thrive, Lightspeed Venture Partners, G Squared, Sequoia and Cyberstarts in hope of raising roughly $800 million at a valuation of more than $10 billion. The cash infusion would help Wiz finance future acquisitions.
Cloudflare's acquisition of Nefeli Networks aims to streamline multi-cloud networking by offering seamless integration and security across cloud platforms. The move simplifies cloud connectivity by providing a unified platform for businesses to manage their network and security policies efficiently.
Selecting a cloud security solution is more than just ticking boxes; it's about making informed decisions that address real problems and protect your business against today’s threats. This webinar dives into the current state of cloud security platforms and, more importantly, guides you on how to evaluate cloud...
In today's global landscape, the bedrock of security for countless organizations and industries lies in the robust framework of Public Key Infrastructure (PKI). PKI serves as the linchpin for safeguarding sensitive data - whether it resides on-premises, floats in the cloud, or straddles the complex terrains of hybrid...
In the dynamic realm of cybersecurity, NetSec, CloudSec, and compliance teams face critical challenges. The management of diverse security, complex hybrid networks, and IT technologies within non-collaborative environments hampers network agility, leaving vulnerabilities exposed, and escalates risks. Siloed security...
Microsegmentation is a fundamental concept in zero trust security, but CISOs should assess its feasibility before diving in. This is particularly true in a public cloud environment where there is no real network policy, said David Holmes, principal research analyst at Forrester.
The Russian intelligence hacking group known as APT29 or Cozy Bear is responding to the corporate migration to the cloud with matching hacking techniques, says an alert from international cyber agencies. Threat intelligence firms warn that APT29 has amplified its global cyberespionage operations.
How can organizations minimize compromised access in the cloud? This whitepaper covers identity security and the challenges and benefits of cloud compliance to reduce security risk.
Learn more about:
Regulations and cloud service providers frameworks to enable compliance and governance for cloud security.
Best...
The cloud represents a major change for the business where many established cloud identity and access management best practices no longer apply or require controls to be enforced in differing ways. To make progress in securing access to the cloud, we recommend the three phases to achieve cloud identity security...
Cloud security threats continue to rise, and adversaries show no signs of letting up.
The effectiveness of cloud security depends on defenders’ ability to collect, correlate, and analyze data across on-premises, hybrid, and multi-cloud environments. Modern defenders need to find exploitable weaknesses...
Global data center provider Zenlayer exposed an internal database accessible on the internet, revealing approximately 384 million records. A spokesperson said no internal or customer operational data, credentials or network traffic was affected.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.