In today’s ever-evolving threat landscape, organizations require robust network security solutions to protect
their critical assets in the cloud. Google Cloud and Palo Alto Networks visited us recently to talk about the
general availability of Google Cloud NGFW Enterprise, the next-generation cloud firewall that...
Network security threats are ever-evolving, and all types of organizations work hard to face down emerging threats while maintaining robust performance across their hybrid cloud infrastructure. In this quest, Gigamon stands out as a critical ally.
Chief Information Security Officers (CISOs) face unprecedented challenges in their efforts to protect their organizations against a rising tide of increasingly sophisticated cyberthreats.
Fortinet recently surveyed over 900 security professionals about cloud security, and Frederick Harris, senior director of product marketing at Fortinet, pointed out that one key finding was no big surprise: "Security and compliance continue to be a major roadblock to cloud adoption."
Fortinet plans to purchase trouble late-stage startup Lacework to integrate its AI-driven cloud native application protection platform into the Fortinet Security Fabric. The deal enhances Fortinet's Unified Secure Access Service Edge platform, providing protection from code to cloud.
Tenable plans to acquire Israeli startup Eureka to enhance its cloud security platform with advanced data security posture management capabilities. The transaction aims to provide customers with comprehensive risk assessment and management tools in a single, unified platform.
In a clash of cloud security titans, Wiz denied all claims made by rival Orca Security of patent infringement and unauthorized use of proprietary information. Instead, Wiz said Orca copied its technological advancements and used confidential information to enhance its own products.
Microsoft is calling security research asserting a high-severity vulnerability exists in Microsoft Azure evidence that customers should better configure their cloud environments. An attacker with an Azure instance could obtain access to company resources by sending customizable HTTP requests.
George Kurtz said CrowdStrike's Falcon platform is leading the way in cybersecurity consolidation, with deals involving cloud, identity or SIEM doubling year-over-year. Customer are seeing significant cost savings and faster response times, which Kurtz said has solidified CrowdStrike's position.
Multiple Chinese cyberespionage groups, including Volt Typhoon, are using operational relay box networks, aka ORBs, built using leased proxy servers and compromised or end-of-life routers, to avoid detection and complicate efforts to track their activities, warns Google Cloud's Mandiant.
AI technologies are now being integrated into cloud environments to bolster security. Dror Davidoff, co-founder and CEO of Aqua Security, discusses the intricate role of AI in enhancing cloud application security, underscoring the critical need for advanced monitoring and policy enforcement.
Hyperscalers such as Microsoft, Amazon Web Services and Google are enhancing cybersecurity acquisitions and investments to better secure their cloud environments and to build robust partner ecosystems, said Hamza Fodderwala, executive director, U.S. Software Equity Research, Morgan Stanley.
As the cyber insurance market matures, insurers are leveraging artificial intelligence technology and cloud security metrics to better assess risks and provide broader coverage, said Monica Shokrai, head of business risk and insurance at Google Cloud.
Raaz Herzberg, chief marketing officer and vice president of product strategy, Wiz, discusses the company's recent $1 billion funding, its acquisition of Gem Security to enhance its capabilities to secure cloud environments, and the shifting cybersecurity landscape.
Organizations onboard multiple security solutions to meet their specific needs, such as securing cloud workloads or protecting identities, but many organizations lack the personnel or the training required to maximize the use of such tools, says Curt Aubley, COO and chief product officer, Deepwatch.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.