In this episode of "Cybersecurity Unplugged," Yonatan Khanashvili describes in detail how Golden Security Assertion Markup Language attacks occur and how SOC platforms with much greater capacity to cross-correlate data than legacy SIEMs can help defenders detect and hunt for them.
As enterprises shift to the cloud, many are experiencing a mismatch between their legacy security architecture and the needs of their cloud email environment.
This report is based on a survey of 300 security leaders that sought to learn what matters to them with regard to email security in the current threat...
With its acquisition of Infiot, Netskope now carries both the networking and security technology needed to build a Secure Access Service Edge architecture following. The acquisition of Infiot's platform will allow Netskope customers to address both traditional and emerging SD-WAN use cases.
CyGlass completed a management buyout from Nominet just two years after being acquired and wants to build an EDR stack via partnerships. Board and management changes at Nominet in 2021 resulted in the company returning to its registry roots and gave CyGlass workers the chance to buy the company.
IronNet is laying off 17% of its employees in a cost-cutting effort just 10 months after going public by merging with a special purpose acquisition company. The 55 layoffs will occur by the end of June and the company will spend the $1 million allocated for severance and other termination benefits.
Most publicly traded security vendors specialize in one technology category, but Palo Alto Networks has built out industry-leading practices around network security, cloud security and security operations. CEO Nikesh Arora discusses this unique path.
Palo Alto Networks' product portfolio is paying dividends as customers look to reduce their vendor footprint, says CEO Nikesh Arora. He says despite pressures in the global economy, enterprises aren't currently stressing about their IT budgets.
Check Point is aggressively expanding its salesforce and standing up "rockets" focused on emerging technology areas to land more customer deals outside network security. The company will couple 25% growth in its salesforce with dedicated investments around cloud security, email security and MDR.
When it comes to advanced threat response, 42% of financial institutions say their current abilities are average. Only 35% say automation currently plays a strong role. Josh Zelonis of Palo Alto Networks and Sid Srivastava of Accenture analyze the State of Security Automation in Financial Services.
Are you interested in exploring how to defend against ransomware and supply chain attacks, or securing your public cloud? Then register now to experience hands on how Vectra sees threats and stops breaches.
Security operations (SecOps) leaders say they struggle to detect hidden and unknown threats with legacy tools, mitigating the potential threats of dark data, and overcoming resource-intensive issues to stay ahead of cyberthreats. They have to navigate these challenges while dealing with a talent shortage.
This is...
Are you ready to supercharge your security operations using orchestration and automation? A Security Orchestration, Automation and Response (SOAR) tool can automate monotonous security tasks, help you respond to security incidents faster, and increase team productivity and efficiency.
Gartner’s latest Market...
With cyberattacks, such as ransomware, phishing and malware on the rise, network security has never been more critical. Network Detection and Response (NDR) offers real-time visibility so that you can detect and respond earlier and more effectively to attacks traversing your network.
During this session, LogRhythm...
Change is afoot at Trellix, which is the new name of the cybersecurity software business formed from the merger of McAfee Enterprise and FireEye. CEO Bryan Palma says the extended detection and response - aka XDR - software imperative for his customers is to do more, but with fewer suppliers and management overhead.
Network compromise drives big business on the dark web. Cybercriminals are actively buying and selling unauthorized network access in a variety of underground forums.
This specific variety of criminal market offerings is less well known than others, but the extended cybercrime activity it enables is impacting...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.