High-flying cybersecurity startup Lacework has announced layoffs - affecting 20% of its employees, according to one report - in a bid to strengthen its balance sheet, just six months after raising $1.3 billion. The cloud security vendor says it has restructured its business in response to a seismic shift in the public...
Given the growing threat landscape alongside an ever-expanding attack surface, organizations need even higher levels of protection. However, more security vendors result in complex security operations and increases costs. Converging cybersecurity capabilities in a cloud-delivered security solution can drive higher...
Organizations are seeking new, more efficient ways to deliver secure, flexible solutions to their employees, partners and customers. This often means that the focus is no longer with the datacenter, but extends to the public cloud and edge where VPN is being replaced with a SASE approach. With the internet becoming...
Researchers say an unsecured cloud storage bucket belonging to a nonprofit cancer organization has exposed to the internet sensitive images and related data of tens of thousands of individuals. The mishap is the latest health data-related incident involving misconfigured information technology.
Since the shift to work from home, there's been a paradigm shift in the IT and security industry. The concept of experiencing a breach is no longer an ""if"" but a ""when."" Forward-thinking organizations have formulated – and regularly update – their incident response plans and playbooks to ensure smooth and...
The backdrop of this study is: Cloud migration. Remote work. Security at the edge. These are some of the many ways that the COVID-19 pandemic has permanently changed cybersecurity.
At the same time, data security threats continue to rise. Whether it’s new social engineering attacks or the risk of sensitive data...
Check Point is aggressively expanding its salesforce and standing up "rockets" focused on emerging technology areas to land more customer deals outside network security. The company will couple 25% growth in its salesforce with dedicated investments around cloud security, email security and MDR.
AWS has fixed "severe security issues" in hot patches it released last December to address the Log4Shell vulnerability in Java applications and containers. Palo Alto Networks' Unit 42 researchers said containers in server or cluster environments can exploit the patch to take over its underlying host.
Gigamon has promoted Shane Buckley to CEO and tasked him with expanding the company's ability to protect customer data in the cloud. Buckley plans to broaden Gigamon's portfolio and add more functionality to guard data in motion regardless of if it resides in a physical, virtual or cloud network.
For organizations with legacy systems, effective security and risk management remain essential as they transition to cloud or hybrid environments, says Davanathan "Devan" Naidoo, CIO of New Dimension Corp. He shares essential strategies and lessons learned.
Despite the vast array of security measures adopted by organizations in the financial services sector, we continue to see the repercussions of software vulnerabilities.
Nearly half of developers (48%) believe they leave vulnerabilities in their code.
Download this whitepaper to learn more about:
What do developers...
Amid accelerated cloud migration, many enterprises find they struggle with visibility, costs, complexity - even having the right skills in-house to manage these new environments. Robert Sawyer of Bitdefender shares strategies for identifying and improving challenges in cloud workload security.
Establishing Zero Trust in hybrid cloud environments starts with strong access management. From multi-factor authentication to least privilege access, this eBook covers best practices for securing Identity in the cloud with CyberArk Identity Security Solutions and AWS IAM Solutions, including:-Single Sign-On (SSO) and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.