Cloud vendors from Amazon, Microsoft and Google to IBM and Sumo Logic have turned to Sysdig's Falco open-source threat detection engine to secure their environments. Sysdig CEO Suresh Vasudevan says Falco has become the standard for threat detection in the industry.
Observability is not necessarily a commonly understood term in cybersecurity circles. What exactly does it mean in context, and how does it relate to security? Jackie McGuire of Cribl discusses the observability pipeline and how best to build a solution.
For many brands, especially large enterprises with a substantial online presence, it is important to be able to have eyes all over the internet in order to properly mitigate the effects of external elements on their brand’s reputation.
Karl Sebastian Greenwood, a dual citizen of Sweden and the United Kingdom, pleaded guilty in U.S. federal court to his role in selling the purported multibillion-dollar cryptocurrency pyramid OneCoin that netted $4 billion. He now faces sentencing.
IronNet is just days away from insolvency and its board of directors says it will investigate allegations that company executives misled investors over growth projections. The firm was founded and is helmed by retired Army Gen. Keith Alexander, the former NSA director and U.S. Cyber Command chief.
From the cyberwar in Ukraine to ongoing ransomware threats and emerging global data regulations, 2022 has been a taxing year for CISOs. And they can expect more of the same in 2023, says Rodman Ramezanian of Skyhigh Security. He offers predictions and advice for the new year.
It's called the cybersecurity poverty line, and it distinguishes organizations as haves or have-nots - not just financially, but in terms of cybersecurity defenses. Cisco's Mike Storm discusses how to develop and leverage embedded security to rise above the line.
After 20 years DDoS remains a problem due to the old protocols used by the internet, making DDOS protection and mitigation not just sensible to have but a fundamental element of cybersecurity.
Anything that can write a software code can also write malware. The latest AI technology can do it in seconds. Even worse, it could open the door to rapid innovation for hackers with little or no technical skills or help them overcome language barriers to writing the perfect phishing email.
Businesses should capitalize on AI, ML and robotic process automation to address every event rather than just ignoring the ones deemed unimportant by a SIEM. Palo Alto Networks founder and CTO Nir Zuk says AI can be used to probe security incidents in real time rather than waiting for a breach.
As the world looks into adapting 5G and studying 6G, satellite IoT is opening a new front for connectivity. There will be a demand for more LEO-based satellites for low-power communication, and these satellites will require completely new kinds of security, says Krishnamurthy Rajesh of GreyOrange.
Experiencing an attack is only a matter of time. Most organizations are unaware when a breach is made, and threats go undetected for months at a time due to a global lack of visibility, especially when it concerns endpoints. But there are X5 firewall practices to prevent a data breach.
Staying one step ahead of both threat actors and competitors is a tall task for Palo Alto Networks given the breadth of its cybersecurity portfolio. Palo Alto Networks has committed to having best of breed features and functionality in each of the technology categories where it chooses to play.
Apple is advancing plans to allow Europeans to access third-party app stores via their iPhone and iPad, as will soon be required under European law. What this means in practice for its vaunted walled garden security model, and whether most users will bother, remains unclear.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.