CEO George Kurtz said Palo Alto Networks' strategy of offering free products won't neutralize CrowdStrike's advantage around total cost of ownership. Customers are smart enough to recognize the difference between the price of a product and the total lifetime cost of operating inferior technology.
As per Gartner by the year 2028, XDR will be deployed in 30% of end-user organizations to reduce the number of security vendors they have in place, up from less than 5% today.
With more and more organizations adapting this technology, get the strategic guidance you need to understand while deploying XDR.
Download...
The evolving threat landscape is posing new challenges, which means cybersecurity organizations need to invest in security information and event management, behavioral-based threat detection and, ultimately, AI, said Durga Prasad Dube, executive vice president and global CISO at Reliance Industries.
Discontent with legacy SIEM offerings and Cisco's proposed acquisition of Splunk have driven "a significant and pronounced increase in interest" in CrowdStrike's SIEM offering. LogScale hit the $100 million ARR milestone last quarter thanks to its search speed, data gravity and cost efficiency.
As digitization, tools, and the attack surface increase — all against the backdrop of a global shortage of cyber talent — the need to reduce risk in an organization has never been more evident.
Whether you're a seasoned cybersecurity professional or just embarking on your security journey, this guide provides actionable insights into expanding visibility, detecting in depth, and building a resilient defense. Transform your SOC into a stronghold against cyber threats in the digital era.
Check out this...
Effectively managing and monitoring your SIEM technology requires an intricate balance of people, processes and technology. This challenging task is made even more difficult by the increasing volume of threats across an expanding attack surface, evolving compliance demands, talent shortages and tight...
Safeguarding unmonitored channels is imperative. Chris Lehman, CEO of SafeGuard Cyber, highlighted the challenges enterprises face. No matter how many training or awareness programs are in place, Lehman said, "humans are always going to be the biggest wild card in your security strategy."
This week, Information Security Media Group editors covered the hot topics at ISMG's Cybersecurity Summit: Mumbai, including redefining cybersecurity leadership, understanding your adversary's next move and the debate over how to tackle cyber extortion.
Splunk has executed its second round of layoffs since February, axing 7% of its workforce weeks after Cisco announced plans for a $28 billion acquisition. Splunk will reduce its 8,000-person staff by 7% or approximately 560 positions. Most of the jobs being cut are in the United States.
Two cybersecurity vendors are laying off a sizable chunk of their staff, with Exabeam axing 20% of its workforce and F-Secure cutting up to 70 employees. Exabeam eliminated roughly 134 positions this week, while F-Secure wants to shrink its workforce by nearly 14%.
A mid-market security operations vendor founded by a ex-Marine Corps officer closed its Series B funding round to pursue a product-led growth strategy. Washington D.C.-based Adlumin will use the $70 million to launch free tools in the cloud configuration and remote monitoring and management spaces.
In our latest weekly update, ISMG editors discuss key takeaways from a forum on developing a strategy for OT security, guidance issued by the U.S. Food and Drug Administration on cybersecurity in medical devices, and how the acquisition of Splunk by Cisco might affect the cybersecurity industry.
Security practitioners are skeptical of Cisco's proposed $28 billion Splunk purchase given the networking giant's track record around funding and investing in previous acquisition targets. Forrester's Allie Mellen expects some customers to try out other SIEM tools given Cisco's heritage in hardware.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.