Hewlett Packard Enterprise in an after-hours regulatory filing disclosed that suspected Russian state hackers had gained access to corporate email inboxes for more than seven months. A threat group tracked as "Midnight Blizzard" first penetrated HPE's cloud-based email service in May 2023.
Organizations don't need to do it alone in their cloud security efforts, nor do they need to incur significant financial costs. In fact, they can use a familiar set of industry-recognized best practices to create secure cloud environments. Working with global adopters and cybersecurity experts, the Center for Internet...
Organizations across industries improve their productivity, innovation, and customer service with an increase in web, mobile, and cloud applications leveraging microservices architectures. This brings an increase in APIs connecting application components and resources.
Organizations need effective API security...
In the era of Zero Trust, cloud adoption, and remote workforces, organizations grapple with securing increasingly complex network architectures. The surge in infrastructure, coupled with publicly facing assets, elevates the risk of compromise. Navigating this landscape demands a profound understanding of what requires...
Attack surfaces have become complex and difficult to manage. With our Attack Surface Management for Dummies® guide, it provides insights into all things attack surface management (ASM), including:
Seven key ASM capabilities and features
Discovering your unknown attack surface
How to prevent common...
Achieving consistency within cloud environments is relatively easy when dealing with a single cloud. But when you shift to a multicloud architecture, the challenge of maintaining consistent configurations grows exponentially.
In this e-book, we've laid out actionable guidance to help you optimize multicloud...
Cloud security teams have become adept at monitoring resource configurations, ensuring compliance and detecting threats. However, cloud security admins are often stuck dealing with a tricky but equally important problem: controlling user or entity (such as containers and APIs) access and permissions.
Because most...
What Does LockBit, Kaseya, and Cognyte Have In Common? They were all Cloud-Based data breaches! Over the past few years, cloud adoption has been steadily on the rise, revolutionizing and reinventing the way organizations drive their businesses. To stay ahead of the competition, organizations are looking for agility...
Accenture has finalized its acquisition of U.K. tech consultancy firm 6point6, which specializes in cybersecurity, cloud and digital transformation solutions. The acquisition will add 6point6's 400 staffers to Accenture in support of its business in the U.K. market.
Cybersecurity firm SentinelOne is set to acquire PingSafe for an undisclosed sum of cash and stock. The move will integrate PingSafe's cloud-native application protection platform into SentinelOne's Singularity Platform, creating a unified and advanced cloud security solution.
Joe Kim, president and CEO of Sumo Logic, delved into the company's strategic shifts and future priorities after its acquisition by Francisco Partners this year. The company is now focusing on areas such as cloud-native scalability, technological advancements and a customer-centric approach.
Traditionally, connecting private and public cloud networks posed challenges, requiring complex workarounds and multiple products for a hybrid solution. However, the emergence of multitenant VPC capabilities has transformed this landscape. With complete control over network configurations, including IP address ranges,...
Cisco announced plans to acquire another cloud security startup as part of a series of recent acquisitions and investments in the company’s multi-cloud networking capabilities and security offerings, including the major $28 billion acquisition of Splunk.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.