Security appliances are targets for sophisticated threat actors who take advantage of devices' limited configuration and logging features, as well as their incompatibility with endpoint detection and response. Suspected Chinese hackers took advantage of a Fortinet zero-day to implant a backdoor.
In this episode of "Cybersecurity Unplugged," Galit Lubetzky Sharon, CTO of Wing Security, discusses the challenge of securing SaaS applications, which are decentralized and ever-expanding. She describes how Wing Security manages app inventories and issues of compliance, remediation and privacy.
As companies have gone through a digital transformation, increased adoption of cloud and Internet of Things (IoT), a growing remote workforce, and a technology talent shortage have led to an exponential rise in organizations' attack surface. This expansion makes it harder for security teams to correlate externally...
Conventional wisdom now suggests that fine tuning authentication is an important step in protecting your organization. On the surface, this sounds simple. Yet, the reality is much more complex with a myriad of systems and methodologies. How do you decide what steps to take next?
Download the “Navigating the Path...
Please join us for our Prisma Cloud Security Briefing to learn how Palo Alto Networks Prisma® Cloud can enable your organization to secure multicloud, hybrid and microservice environments with a single tool.
Prisma® Cloud is the industry’s most comprehensive cloud-native application protection platform(CNAPP)...
Rising offensive security star NetSPI has bought boutique penetration testing firm nVisium to help customers assess their cloud defenses. NetSPI says nVisium's deep understanding of specific cloud platforms will come in handy since Azure penetration testing differs from AWS pen testing.
In a world where the adversary has historically had the upper hand, cortex and IBM have partnered together to flip the script for their clients by partnering best in breed technology with extraordinary services.
Bringing together best-of-breed technology and services, Palo Alto Networks and IBM today announced...
If you use APIs today – which you very likely do if you are leveraging cloud-native technology in any way – mastering the concepts discussed in the following pages is crucial for ensuring that you can balance the benefits of APIs with security challenges. Indeed, avoiding APIs is simply not realistic for most...
You use nine cloud environments. Is that your final answer? That’s what one client thought, only to find out they were using 23 clouds. That’s what happens when you use attack surface management for the first time. Advanced, intelligent ASM discovers and manages unknown assets, misconfigurations and expired...
Security operations centers (SOCs) have gradually become more critical within enterprises over the last five years. With a need to prevent cyberattacks and the adoption of centralized security operations (SecOps), security teams are challenged by a lack of qualified personnel (staff, skills, knowledge), budgetary...
Phishing and other socially-engineered schemes are going to get bolder, the attack surface is only going to get bigger, and enterprises everywhere are going to have to focus more on building cyber resilience. These are among the New Year's predictions from Zoom's new CISO, Michael Adams.
How can successful organizations prepare for a possible recession? Most look for ways to reduce costs. Despite inflation and uncertainty, however, organizations aren't slowing their spend on security. Surprising? Maybe not. Savvy executives now see remote work as a cost-savings opportunity, and they're taking...
Asset management historically either looked at network traffic or attempted to put an agent on everything, which Axonius CEO Dean Sysman says left organizations drowning in data. Axonius focuses solely on bringing data together from a customer's existing infrastructure and controls.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.