As digitization, tools, and the attack surface increase — all against the backdrop of a global shortage of cyber talent — the need to reduce risk in an organization has never been more evident.
Flexibility and agility are the two key factors driving cloud adoption. The cloud gives you the flexibility to only pay for what you really need and the agility to consume value-added services to help you innovate as fast as possible.
In 2021, Palo Alto Networks introduced the industry's most flexible way to adopt...
New York State will soon seek public comment on sweeping new cybersecurity regulations for hospitals. The proposed rules would come with $500 million in requested funding to help the providers step up their security investments to comply with the new requirements.
A new landscape of cyberthreats demands a new approach. What’s needed is a way to transform threat detection, investigation, and response and help security teams stay one step ahead of adversaries.
See how Google Cloud and Deloitte are combining their expertise in generative AI to build and scale modern...
What does “digital resilience” mean in the modern enterprise, and why is it so hard to practice at scale? This eBook contains an exclusive interview with John Pelton, Senior Director of Managed Detection and Response for Optiv, along with Splunk Field CTO, Anthony Pierce.
During their discussion, they talk...
In this guide, we’ll show how leveraging identity management — often working in tandem with the security, analytics, and operational tools you already have — can not only keep your organization safe in a dangerous and ever-evolving threat environment, but can also help you accelerate time-to-market, save time,...
More than ever, IT teams need automation to effectively manage their increasingly complex identity tasks—especially as their networks of end-users grow. And without the time or money to build these capabilities in-house, many are turning to modern, low- to no-code solutions. Check out the infographic below to learn...
AT&T will split its managed cybersecurity services practice from its core connectivity business by standing up a joint venture with Chicago-area investor WillJam Ventures. AT&T will move its security software, managed security operations and cyber consulting into an entity owned by WillJam and AT&T.
Global Tel*Link, a major telecommunications provider for state and federal prison systems, will be required to notify the FTC and consumers of future security incidents after a sweeping data breach left hundreds of thousands of its users vulnerable to identity theft and other privacy concerns.
Are you ready to unlock the secrets of cloud security? In this whitepaper, we delve deep into the hidden challenges and vulnerabilities that often go unnoticed in cloud environments.
Whether you are a small business owner, an IT professional, or a decision-maker in your organization, this whitepaper is a must-read...
SonicWall acquired a longtime master MSSP partner to bring MDR, SOC and vulnerability management capabilities to its managed service providers. Buying Solutions Granted will help SonicWall detect and respond to endpoint or cloud-based threat activity on behalf of its MSP and MSSP partners.
As organizations globally embrace cloud-native technologies for agile innovation, the rise of containers brings unparalleled advantages in speed and efficiency. Yet, with great power comes new security challenges. Cybercriminals are quick to exploit vulnerabilities in Kubernetes environments, and the speed of...
In today's data-driven world, organizations rely on a multitude of applications to drive business operations and deliver exceptional user experiences. However, managing and controlling application usage can be a daunting task. App Control is a comprehensive tactic that empowers organizations to take control of their...
Palo Alto will spent nearly $670 million buying Talon and Dig to broaden its cloud security portfolio and protect unmanaged devices without affecting usability. Purchasing Tel Aviv, Israel-based Talon Cyber Security for $435 million will help safeguard the 36% of the workforce that's independent.
The European telecom standards body behind a widely used radio encryption system will soon open-source its encryption protocols. The European Telecommunications Standards Institute on Tuesday said it will soon publish Terrestrial Trunked Radio, or TETRA, a European standard for radio communication.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.