In an effort to upstage Microsoft in the AI space, AWS CEO Adam Selipsky invited NVIDIA CEO Jensen Huang and Dario Amodei, co-founder of Anthropic, to share the stage at AWS re:Invent 2023. Selipsky committed to integrating generative AI across AWS solutions and guardrails to secure customer data.
As digitization, tools, and the attack surface increase — all against the backdrop of a global shortage of cyber talent — the need to reduce risk in an organization has never been more evident.
Improve your organization’s cyber readiness so you can confidently respond to the latest threats. The Google Cloud Cybersecurity Forecast 2024 provides insights on the year ahead from experts on the frontlines of the latest attacks. Read the report to learn what 2024 holds for generative AI-enabled security,...
Corporate boards of directors are now mandated to take stronger roles in enterprise cybersecurity. That can be both good news and concerning. David Homovich of Google Cloud tells how to turn board interest into a positive relationship to improve crisis communication and defenses.
From securing modular Kubernetes® components like Helm and Kustomize to automating security guardrails across the development lifecycle, DevSecOps for Kubernetes requires an integrated and modern approach. As the de facto container orchestrator, Kubernetes has undeniable benefits when it comes to building performant...
Stolen and compromised credentials continue to be the crux of major health data security incidents involving cloud environments. But stronger credential management practices and a focused approach to "least privilege engineering" would help, said Taylor Lehmann of Google Cloud.
Developers and DevOps teams need readily available credentials so that they have the access they need to do their jobs. But if those credentials are not locked down, that can lead to the wrong people gaining unauthorized access. And because hardcoded secrets are easy to overlook, it's common for teams to have exposed...
Attack surfaces have become complex and difficult to manage. Security teams need to know where they’re exposed and vulnerable to attack. They also must know what steps to prioritize for securing their attack surfaces.
Check out, Attack Surface Management For Dummies®. This guide offers insights into how ASM...
Palo Alto Networks plans to purchase a data security posture management startup led by a Microsoft and Google veteran and backed by Samsung. The proposed buy of Tel Aviv, Israel-based Dig Security will give Palo Alto Networks customers visibility into and control of their multi-cloud data estate.
Unveiling a vision of factory workers using AI chatbots to control the assembly line, fix production issues and develop code, Rockwell Automation plans to buy an industrial cybersecurity vendor and team up with Microsoft's generative AI practice to speed automation design and development.
A mid-market security operations vendor founded by a ex-Marine Corps officer closed its Series B funding round to pursue a product-led growth strategy. Washington D.C.-based Adlumin will use the $70 million to launch free tools in the cloud configuration and remote monitoring and management spaces.
Tenable held steady atop Forrester's vulnerability risk management rankings while Vulcan Cyber broke into the leaders category and Rapid7 and Qualys tumbled from the leaderboard. The way vendors deliver vulnerability management has shifted away from ingesting vulnerability assessment results.
The trend toward a multicloud IT environment is irreversible due to the growing investment in the cloud. Adopting cloud technologies and modernizing infrastructure and business processes with the cloud can enable organizations to step up their overall resilience and manage operational risk.
Check out this spotlight...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.