The 2019 RSA Conference offers an opportunity to learn about new concepts across all aspects of cybersecurity. One such area is "data gravity," which will be the topic of a session featuring Microsoft's Diana Kelley and Sian John. They discuss the concept in a joint interview.
As the guardians of their enterprises' ever-expanding attack surfaces,
security architects look for more effective ways to deliver threat
protection and to coordinate it with threat detection and remediation.
Next-generation firewalls (NGFWs), which typically anchor security
architectures, are the linchpins of...
If your organization is one of the 95% of enterprises
that operate in the cloud, you are already grappling
with cloud security. And if your organization is one of
the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS)
clouds, you have additional issues to...
Enterprises have leveraged cloud platforms such as Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP) to facilitate web applications for years, and the platforms have proven effective and reliable. That's why many enterprises have begun taking advantage of the scalability provided by these...
A severe vulnerability in Kubernetes, the popular open-source software for managing Linux applications deployed within containers, could allow an attacker to remotely steal data or crash production applications. Microsoft and Red Hat have issued guidance and patches; they recommend immediate updating.
Effective threat detection and containment at the organizational level now requires continuously monitoring activity across all deployed SaaS applications (e.g. Office 365, G Suite, Salesforce, etc.), all on-premises network infrastructure, endpoints and more. In today's rapidly evolving threat landscape, businesses...
For small to midsize enterprises (SMEs), the cloud is their ticket to digital transformation, giving them added flexibility and the ability to conduct business from anywhere at any time. However, cloud adoption comes in many types (private, public, hybrid) and forms (IaaS, PaaS, SaaS), each with its own cybersecurity...
How do you ensure that the cloud technologies enabling your business aren't also introducing security risks, impacting customer experience (CX), or accumulating more expenses than anticipated?
Download this eBook and learn how to:
Extend and enable your cloud infrastructure to protect your business from...
Another day, another "Have I Been Pwned" alert, this time involving 44.3 million individuals' personal details found in unsecured instances of Elasticsearch, which appear to have been left online by Data & Leads, a Toronto-based data aggregation firm.
Uber has been slammed with $1.2 million in fines by U.K. and Dutch privacy regulators for its cover-up of a 2016 data breach for more than a year. The breach exposed millions of drivers' and users' personal details to attackers, whom Uber paid $100,000 in hush money and for a promise to delete the stolen data.
FireEye is in a unique position to see global cybersecurity threats, threat actors and their impact on breached organizations. Grady Summers, FireEye's CTO, discusses how organizations can use staff and intelligence to bolster their cloud security defenses in 2019.
Grady Summers, FireEye's CTO, discusses how organizations can use
staff and intelligence to bolster their cloud defenses in this
"It almost feels cliché, because every year we say 'the threat
landscape continues to evolve' ... but this really was a unique
year in terms of the types...
The security operations center (SOC) faces mountain challenges: lack of personnel, disparate security tools, multiple alerts that must be run down, prioritization of alerts and the transition between incident detection and incident response.
Security affects and is affected by operational and IT considerations....
Identity and access management is not about compliance anymore - It's really about security, says Gartner's Felix Gaehtgens. With cloud, virtualization, DevOps and other IT trends, IAM has evolved from being a one-off project to an ongoing initiative.