As cloud adoption accelerates, the unchecked growth of nonhuman identities is exposing companies to increased risks. Adam Cheriki, CTO and co-founder of Entro Security, explains why securing these identities is crucial and how the company's platform delivers a comprehensive solution.
Kevin Kin, global vice president of systems engineering at Palo Alto Networks, and Matt Shriner, global executive partner of threat management at IBM, outline the role of AI in the cybersecurity landscape, the evolution of threats, and collaborative solutions.
Huntress CTO Chris Bisnett outlines the firm's innovative approach to simplifying SIEM by reducing data storage costs and focusing on relevant logs. These services support small and midsized businesses looking to enhance their security posture without the high expenses of a traditional SIEM.
Change Healthcare officials projected that the company's massive February cyberattack affected one-third of the American population. So why did the IT services provider's HIPAA breach report to federal regulators lowball the initial estimate, saying the cyberattack only affected 500 people?
Microsoft blamed a widespread Azure cloud computing platform service outage, including Microsoft 365 problems, on its failure to stop a distributed denial-of-service attack after "an error in the implementation of our defenses amplified the impact of the attack rather than mitigating it."
Ransomware hackers discovered a way to gain full administrative privileges on VMware ESXi hypervisors connected to Microsoft's Active Directory, a finding that resulted in extortion demands from cybercriminals, including Storm-0506, Storm-1175, Octo Tempest and Manatee Tempest.
The Department of Health and Human Services is facing some of the same cloud security problems as the healthcare organizations it regulates: weaknesses in a dozen different cloud security controls and inventories of cloud systems, according to an inspector general's audit report.
Orca Security CEO Gil Geron outlines the integration of AI for advanced security posture management. He emphasizes the importance of deep visibility into cloud environments, customer adoption and preventing security issues early in the development life cycle.
Aqua Security carried out its second round of layoffs since 2022 as the future prospects for stand-alone cloud security vendors look increasingly uncertain. Aqua said axing 10% of its workforce will ensure Aqua continues on a path to profitability that's aligned with current economic conditions.
Social engineering, which involves manipulating individuals into sharing confidential data or performing actions that compromise security, is a big threat. As organizations realize the importance of addressing human-centric security risks, the demand for social engineering defense experts will rise.
To make cybersecurity a business enabler, cybersecurity teams need to focus on opening things up in a secure fashion so that the functionality and productivity of the business can flourish. Hearst's Andres Andreu discusses the areas in which this can be done.
Despite all the platformization buzz, there are very few vendors with market-leading capabilities in at least three disparate security technology categories. That could change if Google forges buys cloud security firm Wiz for a reported $23 billion just two years after buying Mandiant.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.