It looks as if Carbon Black's days as part of Broadcom are numbered. Broadcom CEO Hock Tan told staff at newly acquired VMware in both an email and town hall meeting that he plans to "review strategic alternatives." The move comes just four years after VMware purchased Carbon Black for $2.1 billion.
Zscaler infused generative AI features into its data protection bundles and is introducing AI-powered products that quantify risk and predict breaches, said CEO Jay Chaudhry. The cloud security firm enhanced its data protection policies for AI/ML apps and tools to lower the likelihood of data loss.
Not even dairy cows appear to be safe from internet of things flaws, researchers report after reverse-engineering health-monitoring collars for cows and finding they could eavesdrop on and alter data. Once addressed by the manufacturer, they said the non-updateable collars would have to be replaced.
Mobile apps are an indispensable part of digital business, but organizations often underestimate the security threats they pose. AppSealing Managing Director Govindraj Basatwar shared best practices for effective app shielding and factors to consider when selecting a mobile app security vendor.
North Korean state-affiliated hackers are continuing to exploit zero-days in popular software applications as part of global supply chain attack campaigns for espionage and financial theft purposes, British and South Korean cybersecurity and intelligence officials said.
A new guide from the Cybersecurity and Infrastructure Security Agency aims to help healthcare and public health sector entities get a much tighter grip on managing serious risks posed by the most troublesome types of vulnerabilities threatening the beleaguered industry.
Mobile banking Trojans spread through deceptive social media messages remain a problem for Indian smartphone users, warns Microsoft. India accounts for 4 in 10 global transactions made with digital payments, according to the National Payments Corporation of India.
With experts warning that NetScaler ADC and Gateway devices are being exploited by nation-state and cybercrime groups, the manufacturer has again urged all users to "patch immediately" as well as terminate active sessions, which attackers can otherwise use to access devices even post-patch.
In the latest weekly update, editors at Information Security Media Group discuss why a growing number of U.S. and Canadian hospitals have been forced to turn away patients because of cyberattacks, innovations that have surfaced during the Israel-Hamas war and the future of industrial automation.
More organizations than ever rely on backups for securing data. This emphasis has also made the backup infrastructure a desirable target for cybercriminals because it is a key tool that can mitigate or negate data-related attacks. And, while protecting backup copies is important, the ability to quickly restore data is...
To effectively secure your mainframe, your business needs to separate myths from reality. This infographic busts 4 mainframe cybersecurity myths, including the misconception that mainframes can defend against all threats because they encrypt data.
Mainframes are undisputedly the most mature, secure and best defended computing platform. Yet even mainframes are vulnerable to the most common type of cyberattack: phishing.
Mainframes require maximum protection due to the mission-critical nature of their data and workloads. 93% of the world’s companies use the...
Successful phishing attacks lead to a loss of control over user IDs, passwords, and credentials. Bad actors then work to access and exfiltrate data from critical systems and applications, including those residing on mainframes.
Read now to discover a recommended cybersecurity software strategy to better protect...
France and the United Kingdom called for global limits on commercial spyware, warning that unchecked growth of the industry can threaten global internet security. The two nations are part of a multistakeholder working group that includes Microsoft and the UN Office for Disarmament Affairs.
Get Mandiant’s take on building security into AI systems, best practices for effective crisis communications during an incident, mitigating risks to IoT and edge network infrastructure, and much more in this latest edition of The Defender’s Advantage Cyber Snapshot. Once again we’re going beyond incident...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.