Software as a service - it's the new shadow IT, says Phyllis Woodruff of Global Payments. And it highlights the new challenges arising for security leaders overseeing their organizations' cloud migrations. She discusses how to make cloud "bulletproof" for business teams.
Tune in to hear directly from Splunk and Google Cloud experts about the new integrations delivering an automated, cloud-native, serverless and scalable “push” of data from Google Cloud to Splunk Cloud.
Peter Mahoney, global alliances Americas DPS presales senior manager at Dell Technologies, and Ana Maria Ordonez, global solutions architect at Equinix, discuss how to achieve consistent security across physical, containerized and virtual workloads.
Versa Networks has completed a pre-IPO funding round to build out a cloud security portfolio and bring zero trust functionality to campus and branch settings. The SASE vendor says the $120 million Series E round will allow the company to build or buy technology around SSPM, CSPM and CWPP.
The 3rd annual report by IBM Security X-Force helps organizations learn how they can prepare and react to security incidents involving their cloud environments more effectively.
Snyk has made another round of layoffs, axing 14% of its workforce including cloud security leader Aner Mazur and top legal officer Karyn Smith. The company will reduce its more than 1,400-person staff by 198 employees less than four months after laying off 30 people.
Russell Shupert of Veeva Systems explains the challenges faced in securing a complex environment. He discusses how his team overcame these challenges, the benefits they achieved and how Threat Stack's Cloud Workload Protection and Application Infrastructure Protection tool helped along the way.
Palo Alto Networks has scaled back its M&A ambitions, walking away from a $600 million deal for Apiiro in favor of buying Cider Security for $200 million. Palo Alto says it abandoned the negotiations over irreconcilable differences in the valuation of Apiiro's code risk platform business.
An incident response plan and retainer are critical to organizational security, but fewer than 50% of organizations have these procedures and SOPs in place.
ESG’s "An Ounce of Prevention: Investing in Incident Readiness" e-book examines the incident readiness market, reveals how far organizations have come in...
In an age where businesses have been forced to become micro focused on data protection solutions that can deliver cyber-resiliency, organizations are looking for agile, modern solutions that can keep pace with evolving cyber-threats. Organizations are looking to become more cloud-like in their consumption of...
Data classification is a priority for mission-critical data and a keystone to improve data reuse for business and cyber-resilience.
Download this document to receive a technology solution checklist that will answer questions such as:
Why you should have an air gap;
Should mission-critical data be on-premises,...
The endpoint is the terminal on which companies' sensitive information is processed. This makes it a particular focus for potential attackers. But the classic security approach no longer works today: In the past, endpoints were managed from the data center and with central IT. The end devices worked in secure internal...
Cybersecurity firm Eset says its spotted multiple hacks in Israel coming from a Lebanese threat group dubbed Polonium that's affiliated with Iran. The group employs custom-coded backdoors that use a slew of cloud storage accounts to handle command and control.
CEO Yotam Segev says Cyera eschews the focus of data loss prevention tools on blocking users from pulling down data and instead embraces an approach that reduces friction. Cyera has sought to safeguard data by making preventative changes in areas like configuration, permissions and security posture.
Immersive Labs completed a funding round just weeks after laying off 10% of its workforce to cover more developer languages and safeguard Azure and Google Cloud. The Ten Eleven Ventures-led funding will help Immersive Labs expand its coverage from frontline cybersecurity staff to development teams.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.