Orca Security has promoted Chief Product Officer Gil Geron to CEO to help the agentless cloud security vendor maintain its market leadership and rapid growth. The leadership swap at Portland, Oregon-based Orca will result in Avi Shua moving to the newly created position of chief innovation officer.
The U.S. Federal Trade Commission is asking for public comment on cloud computing provider business and security practices. The top three providers - AWS, Microsoft Azure and Google Cloud - account for approximately two-thirds of worldwide cloud spending, which reached nearly $250 billion in 2022.
Nearly 50,000 documents containing personal information of special education students who live in New York City and attend public school there were recently found exposed on the internet in an unsecured database. Some of those records date back to 2018.
Big changes are ahead this year for cloud-native security! For starters, life in the cloud is moving fast and it’s only going to ramp up, according to a new report.
After surveying over 2,500 of your IT and security peers worldwide, the team at Prisma® Cloud has revealed some fascinating results in our 2023 State...
Video piracy is a major concern for security teams in the media industry. Commander Praveen Kumar, global CISO of media conglomerate Zee Entertainment and winner of ISMG's Dynamic CISO Excellence Award for ROI Champion, shares his secret for reducing piracy by 85%.
Adversaries are relentless, and new research from CrowdStrike Intelligence reveals an increase in speed and sophistication in the last year. Meet these new and evolving adversaries, find out who they are targeting and what they are after. Stopping breaches requires an understanding of the adversary motivations,...
The CrowdStrike 2023 Global Threat Report, a highly anticipated annual intelligence report for the global security community, examines the relentlessness of today’s adversaries and the persistence required to stay a step ahead of them. Based on frontline observations from CrowdStrike’s elite threat intelligence...
A number of disruptive trends emerged in 2022 that threaten productivity and global stability. Growing nation-state attacks coincided with organizations struggling to manage an explosive landscape of vulnerabilities that amplified systemic risk.
Stopping breaches requires an understanding of the adversary,...
5G networks are different from previous generations of network technologies, which means they require a different kind of security and privacy tool, says Md. Mahbub Hasan of Axiata Group Berhad. Organizations must consider the new threats from cloud-based 5G services and new regulatory requirements.
Threat actors who mine digital assets using other people's infrastructure have found a lucrative new cryptocurrency to motivate their hacking: the privacy-focused currency named Dero. CrowdStrike says it discovered a first - a Dero cryptojacking operation operating on a Kubernetes cluster.
SentinelOne has partnered with Wiz and revamped its pipeline generation efforts to capitalize on growing demand for cloud protection, said CEO Tomer Weingarten. By using a simple deployment process and eschewing kernels and agents, the company has prompted customers to switch to Singularity Cloud.
Wiz has become the most valuable venture-backed cybersecurity vendor in the world, raising $300 million on a $10 billion valuation just three years after its founding. The New York-based startup will use the Series D proceeds to guard more complex cloud environments and fulfill robust global demand.
Cisco plans to buy cloud security startup Valtix to simplify network security and protect workloads no matter which cloud they're created or consumed in. The networking giant says Valtix will give clients common policy and enforcements of networking across all major public cloud environments.
In 2023 a survey in the Singapore market revealed that 88% of IT leaders in Singapore believe that Zero Trust is important to their organization's cybersecurity strategy.
In this new age of digital communication, bad actors are always looking for ways to exploit a business. Looking at this, the movement to cloud...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.