Thycotic and Centrify recently merged to create a powerful new player in the privileged access management space. Art Gilliland, CEO of the new ThycoticCentrify, discusses this combined entity and the role it can play for enterprises small and large in ensuring cloud identity security.
The mass migration to cloud has only added to the global cybersecurity gap, and John Yeoh, global vice president of research at the Cloud Security Alliance is among those calling for greater "diversity by design" as enterprises look to fill these roles.
The ongoing pandemic has driven massive changes in business operations, including increased remote work and accelerated cloud transformation. But while those have enabled organizations to be more agile, they also pose multiple compliance and operational challenges, says Todd Moore, vice president of encryption...
Manoj Sharma has been associated with Symantec for nearly 20 years. But during that time he did not see seismic changes like the ones that have altered the cybersecurity landscape over the past 15 months. He shares insights on how to secure the new extended enterprise.
As your company transforms, it’s moving into a cloud-first world where your ecosystem of customers, partners, employees, applications, and data come together using the internet as the connective tissue. In this world, security must be delivered through the cloud, close to your business ecosystem, using the...
Today, there’s a sharp focus on embracing zero trust as the future of cybersecurity. With apps, users, and workloads everywhere, traditional approaches to cybersecurity are no longer effective, yet minimizing business risk is more critical than ever. Steve House, SVP of Product Management at Zscaler, weighs in...
Digital transformation has fundamentally changed the way modern businesses operate. Business no longer takes place on a trusted corporate network or inside a security perimeter.
Your employees are on the internet accessing applications and data from everywhere. Traditional castle-and-moat security...
Attackers are increasingly using malicious OAuth 2.0 applications to siphon data and access sensitive information from cloud platforms, and mitigating the risks is proving challenging, according to the security firm Proofpoint.
Almost every organization has adopted cloud computing to some extent, and with this great power comes great responsibility. How are cybersecurity leaders managing visibility, access and risk? We asked this exclusive panel of CEOs and CISOs, and they shared frank and thoughtful advice.
Gartner predicts that more than 75% of global organizations will be running containerized applications in production, and it’s no wonder, because containers revolutionize app development, from speed of delivery to scalability.
Learn how containers help organizations save resources and quickly get software to...
All email, cloud, and compliance solutions are not created equal. As organizations make the move to Microsoft 365, many assume that the platform's built-in or bundled features will keep users safe and compliant. But these "good enough" features may not be good enough for your organisation.
Download our e-book to...
Private equity firm Thoma Bravo on Monday announced it had signed a definitive agreement to acquire the cybersecurity and compliance firm Proofpoint in a $12.3 billion all-cash deal.
Rapid7 has acquired Velociraptor, an open-source endpoint-monitoring organization and community that will continue to operate as a stand-alone entity while the security firm adopts some of its technology. Meanwhile, Zscaler had announced a deal to buy Trustdome.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.