Faster, smarter, and more secure: these are the
demands driving application development today
as the cloud delivers exciting opportunities
to create and deploy advanced software at a
previously unimaginable pace. Free from the
shackles of on-premises infrastructure, the
potential is limitless, and providers like...
Amid digital transformation initiatives, the application
shift to the cloud has been happening at a historic pace.
James Brotsos of Checkmarx and James Ferguson of
AWS discuss what this shift means for securing cloud
DevOps and what each of their organizations brings to
their partnership.
In this eBook...
While the past two years have proved to be a watershed moment for cloud adoption, the fear of 'unknown unknowns,' to some extent, hampered its growth. Security practitioners are concerned whether investments in infrastructure-as-a-service (IaaS) or platform-as-a-service (PaaS) are endangering their security or...
Companies need better visibility into their ever-changing distributed environments "like never before," says Mike Kiser, director of strategy and standards at SailPoint. He discusses cloud governance, digital transformation and identities, and the importance of transparency in automation.
For CISOs, it's critical to not implement security without first carefully considering the user's experience, says Bernardo Vasquez, advisory CISO in the strategic client practice of Palo Alto Networks. He explains why and discusses other topics, including ZTNA 2.0.
Most publicly traded security vendors specialize in one technology category, but Palo Alto Networks has built out industry-leading practices around network security, cloud security and security operations. CEO Nikesh Arora discusses this unique path.
Recently CybelAngel CEO, Erwan Keraudy, and CRO Jeff Gore, sat down with Mathew Schwartz, Executive Editor of DataBreach Today to discuss ways for businesses to protect their growing external attack surface.
A rise in remote employees and an increased reliance on SaaS applications create new, wider gaps in security. It’s more challenging to protect users at the edge — ensuring seamless connections that optimize productivity without creating performance issues that drag down user satisfaction. Converging cybersecurity...
If you think the only way your network and devices can be compromised via email is phishing, think again!
A majority of data breaches are caused by attacks on the human layer, but email hacking is much more than phishing and launching malware. From code execution and clickjacking to password theft and rogue forms,...
Memo to IT administrators: Don't store data in cloud in an unsecure manner. Security researchers at Secureworks have found more than 1,200 cloud-based, unsecured Elasticsearch databases that attackers wiped, leaving only a ransom note demanding Bitcoin in return for their restoration.
A data breach at Turkish firm Pegasus Airlines has put more than 6.5TB of sensitive electronic flight bag data at risk, including sensitive flight details, source code and staff data, researchers say. The misconfigured AWS S3 bucket that led to the incident has now been secured.
Broadcom has agreed to buy cloud and virtualization giant VMware for $61 billion, bringing together the $1.6 billion Symantec and $1 billion VMware security teams. Broadcom will incorporate its existing security offerings into the VMware portfolio and bring them to market under the VMware brand.
Cybersecurity startup Lacework has announced layoffs - affecting 20% of its employees, according to one report - to strengthen its balance sheet, just six months after raising $1.3 billion. The company says it restructured its business in response to a large shift in the public and private markets.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.