The Italian cybersecurity agency says at least a dozen hacks against unpatched VMware ESXi servers in the country are likely tied to the BlackBasta ransomware group. Investigators say the ransomware campaign may have hit thousands of organizations worldwide since Thursday.
Cisco plans to debut a common design language across its network and security offerings so that products such as Cisco Meraki and Umbrella will no longer look or feel different from one another, says Jeetu Patel, executive vice president and general manager for security and collaboration at Cisco.
Proofpoint has focused on preventing cyberattacks, but customers have increasingly asked for help with blocking lateral movement from compromised identities, says CEO Ashan Willy. Acquiring Illusive in December will help Proofpoint block identity attack paths when a user is compromised.
Praveen Kumar, group CISO of Zee Entertainment Enterprises, says the market has failed to provide enough solutions to isolate the network when an attack happens. While a zero trust approach helps, there are not enough tools available in the market, he adds.
Incumbent XDR platforms target large enterprises with access to a full security operations center, threat hunters and incident response teams, says Bitdefender CEO Florin Talpes. But firms looking to successfully serve the SMB market need to modify their XDR tools to address the skills shortage.
The impact of a breach is rising which makes cybersecurity as a critical concern, and the CISOs are looking for a way to manage risk across millions of diverse, dynamic and distributed assets.
Unfortunately, most CISOs lack the tools to perform effective risk assessment and remediation. This forces CISOs to stitch...
Tufin has promoted chief revenue officer Raymond Brancato to CEO and tasked him with simplifying visibility, compliance and automation for AWS and Azure. Brancato plans to focus on helping clients better understand their security posture in cloud, SD-WAN and SASE environments.
In a world where the adversary has historically had the upper hand, Cortex and IBM have partnered together to flip the script for their clients by combining best in breed technology with extraordinary services.
Palo Alto Networks and IBM today announced that IBM Security's X-Force will use Palo Alto Networks'...
Acquiring Area 1 Security has allowed Cloudflare to extend its network protection capabilities from DDoS attacks to phishing emails, says co-founder and CEO Matthew Prince. Area 1's technology means customers will enjoy a better rate of detection with fewer false positives than legacy offerings.
IronNet is just days away from insolvency and its board of directors says it will investigate allegations that company executives misled investors over growth projections. The firm was founded and is helmed by retired Army Gen. Keith Alexander, the former NSA director and U.S. Cyber Command chief.
Experiencing an attack is only a matter of time. Most organizations are unaware when a breach is made, and threats go undetected for months at a time due to a global lack of visibility, especially when it concerns endpoints. But there are X5 firewall practices to prevent a data breach.
The security industry has traditionally tried to protect sensitive data by putting control points on endpoints or networks, but Skyhigh Security has taken a different approach. The company applies consistent policies around how data is treated across its ZTNA, SWG and CASB offerings.
Data and users are everywhere: on your network, in the cloud and working remotely.
The result is an incredibly complex network environment that, historically, has significantly increased your business risk.
You can minimize this risk with the right next-generation firewall (NGFW) platform – one that leverages...
As the banking sector undergoes digital transformation, the future of banking requires both securing transactions and building cyber resiliency through consistent cyber drills and creating a private network for secure financial transaction, says professor D. Janakiram, director of IDRBT.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.