For CISOs, it's critical to not implement security without first carefully considering the user's experience, says Bernardo Vasquez, advisory CISO in the strategic client practice of Palo Alto Networks. He explains why and discusses other topics, including ZTNA 2.0.
Most publicly traded security vendors specialize in one technology category, but Palo Alto Networks has built out industry-leading practices around network security, cloud security and security operations. CEO Nikesh Arora discusses this unique path.
Erwän Keräudy and Jeff Gore of CybelAngel say that due to cloud migration, people working remotely, and the connected ecosystem of suppliers, "the perimeter is dead." We need a comprehensive assessment of critical external threats, they say, including a scan of "the infrastructure of the internet."
A rise in remote employees and an increased reliance on SaaS applications create new, wider gaps in security. It’s more challenging to protect users at the edge — ensuring seamless connections that optimize productivity without creating performance issues that drag down user satisfaction. Converging cybersecurity...
If you think the only way your network and devices can be compromised via email is phishing, think again!
A majority of data breaches are caused by attacks on the human layer, but email hacking is much more than phishing and launching malware. From code execution and clickjacking to password theft and rogue forms,...
Memo to IT administrators: Don't store data in cloud in an unsecure manner. Security researchers at Secureworks have found more than 1,200 cloud-based, unsecured Elasticsearch databases that attackers wiped, leaving only a ransom note demanding Bitcoin in return for their restoration.
A data breach at Turkish firm Pegasus Airlines has put more than 6.5TB of sensitive electronic flight bag data at risk, including sensitive flight details, source code and staff data, researchers say. The misconfigured AWS S3 bucket that led to the incident has now been secured.
Broadcom has agreed to buy cloud and virtualization giant VMware for $61 billion, bringing together the $1.6 billion Symantec and $1 billion VMware security teams. Broadcom will incorporate its existing security offerings into the VMware portfolio and bring them to market under the VMware brand.
Cybersecurity startup Lacework has announced layoffs - affecting 20% of its employees, according to one report - to strengthen its balance sheet, just six months after raising $1.3 billion. The company says it restructured its business in response to a large shift in the public and private markets.
IDC conducted interviews with organizations using Prisma Cloud by Palo Alto Networks to secure and support workloads running on Google Cloud (Prisma Cloud for Google Cloud). Study participants reported achieving important gains in security and risk minimization for their Google Cloud environments, while increased...
As one might suspect, low-hanging fruit is an easy target for threat actors when it comes to cloud infrastructure. Protect those vulnerable areas with an approach designed for securing cloud environments. The four key tactics are:
Enable runtime protection
Eliminate configuration errors
Leverage a...
While embracing the cloud may grant organizations newfound agility, it can also introduce new vulnerabilities. This white paper covers five critical steps organizations can take to adapt and improve their security approaches in a multi-cloud environment. Leverage these takeaways to secure your organization’s data...
Embracing the cloud is critical to achieving digital transformation initiatives, but for them to be successful, security must transform alongside the business. Keep pace in an evolving landscape of risks by learning how to:
Protect your environment from host to cloud and everywhere in between
Enable runtime...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.