The need to secure cloud workloads and environments isn't new, but a surge of funding and attention has come to the sector over the past year. One of the most acclaimed cloud security startups has been Wiz, which in October raised $250 million on a $6 billion valuation.
CTO Daniele Catteddu of the Cloud Security Alliance sees significant gaps in how the cybersecurity industry delivers education and training. For example, he says, while organizations are demanding Zero Trust services and guidance on implementation, the industry's offerings do not meet that demand.
What are 1,200 different organizations across 16 countries and 14 industries doing to protect against rising cyber threats–and what differentiates advanced organizations from beginners? This study uncovers top investment areas for the next two years, common challenges, and emerging cybersecurity...
Organizations are struggling to implement all the security technology they've purchased and ensure they are protected across the most important areas of risk and posture, according to Amol Kulkarni, chief product and engineering officer at CrowdStrike.
Cloud has a dirty little secret: While most say moving to cloud is inevitable, not everything today can or even should run in the cloud, says SecZetta's Richard Bird. He explains why hybrid approaches are here to stay and how security teams must respond, especially when it comes to identity.
Microsoft Azure Chief Security and Risk Officer Edna Conway says the industry is getting better at sharing information, but adds, "We don't have the protections that we need." She envisions a new model for information sharing that will be better suited for use in the next 10 years.
The COVID-19 pandemic has accelerated the migration to the cloud for many organizations, and there have also been challenges associated with securing hybrid or multi-cloud environments, according to Omdia Senior Principal Analyst Fernando Montenegro.
Companies need better visibility into their ever-changing distributed environments "like never before," says Mike Kiser, director of strategy and standards at SailPoint. He discusses cloud governance, digital transformation and identities, and the importance of transparency in automation.
For CISOs, it's critical to not implement security without first carefully considering the user's experience, says Bernardo Vasquez, advisory CISO in the strategic client practice of Palo Alto Networks. He explains why and discusses other topics, including ZTNA 2.0.
Most publicly traded security vendors specialize in one technology category, but Palo Alto Networks has built out industry-leading practices around network security, cloud security and security operations. CEO Nikesh Arora discusses this unique path.
Erwän Keräudy and Jeff Gore of CybelAngel say that due to cloud migration, people working remotely, and the connected ecosystem of suppliers, "the perimeter is dead." We need a comprehensive assessment of critical external threats, they say, including a scan of "the infrastructure of the internet."
If you think the only way your network and devices can be compromised via email is phishing, think again!
A majority of data breaches are caused by attacks on the human layer, but email hacking is much more than phishing and launching malware. From code execution and clickjacking to password theft and rogue forms,...
Memo to IT administrators: Don't store data in cloud in an unsecure manner. Security researchers at Secureworks have found more than 1,200 cloud-based, unsecured Elasticsearch databases that attackers wiped, leaving only a ransom note demanding Bitcoin in return for their restoration.
With the home office as a target, there is an increased risk of losses. Data security incidents cost organizations an average of 4.42 million USD, and an additional 1.07 million USD when remote work is included.
Download the whitepaper to find out:
5 tips for working securely from home;
What are the top risks...