Security
Seven Tech Security Trends Heading Your Way Now (ZDNet)
The shift to cloud computing is creating an ever bigger threat surface -- but it's not the only change ahead.... More
Presidio and Palo Alto Networks Secure Hybrid Workforces With ZTNA 2.0
Up until 2020, digital transformation was among the long-term goals of many organizations. The global pandemic changed all that, compressing the timeframe for digital transformatio... More
Tata Play Turns to Irdeto and Broadpeak for Cybersecurity (DTE)
The platform has implemented Broadpeak BkS350 Origin Packager pre-integrated with Irdeto Control and Irdeto Media Manager to the OTT aggregation platform, Tata Play Binge. The plat... More
Security Leaders Chart New Post-CISO Career Paths (CSO)
The evolution and growing prominence of the CISO role gives holders more options on where to go next in their careers.... More
Wasabi’s IT Hero Nate Returns to Warn About the Dangers of Ransomware
Wasabi launched a new security themed digital campaign, #ThinkBeforeYouClick, featuring IT Hero ‘Nate’ to warn about the dangers of ransomware. #ThinkBeforeYouClick marks the t... More
Why CFOs Must Take the Lead on Digital Executive Protection (Forbes)
Cybersecurity teams do heroic work protecting their organizations from cyberattacks. Although risks remain prevalent, they've made it infinitely more difficult for hackers to achie... More
FPT Software Achieves HITRUST Certification
The certification demonstrates that FPT Software’s systems have met key regulations and industry-defined requirements and are appropriately managing risks. (more…)... More
Palo Alto Networks Introduces the Autonomous Security Platform
Palo Alto Networks announced Cortex XSIAM: an AI-driven platform that can revolutionize the way data, analytics and automation are deployed by security organizations. Extended Secu... More
Palo Alto Networks Makes the Business Case for DevSecOps (SDxCentral)
Organizations can increase employee productivity and earn a better return on their security investments by shifting cloud security left at the infrastructure and application layer,... More
Privacy Certification is Playing a Larger and Larger Role in the IT Buying Process (ITProPortal)
Data privacy is now seen as a business imperative for almost all organisations, with knock-on effects on the IT buying process, new data suggests. According to the report, the vast... More
Vast Majority of Companies Will Increase Their Cybersecurity Budgets Again Next Year (ITProPortal)
Based on a poll of 302 IT security professionals, the report states that more than four in five (81 percent) will give their IT security budgets a boost in 2022. In almost a quarte... More
Data Security: Defending Against the Cache Poisoning Vulnerability (Security Intelligence)
Do you trust your cache? To meet the demands of the end-users and speed up content delivery, content caching by web servers and content delivery networks (CDN) has become a vital p... More
Code42 Incydr Product Protects Salesforce Customer, Pricing, Pipeline Data
Code42 launched a data exfiltration detector in the Code42 Incydr product that detects when reports are exported from an organization’s Salesforce instance to an untrusted destin... More
Code42, Splunk Partner to Enhance Detection and Response to Insider Threat Events
Code42 announced it is to deliver its data exfiltration alerts and dashboards within the Splunk Security Operations Suite. Security teams using the Code42 Insider Threat app for Sp... More
Shadow IT is Evolving as Businesses Sanction More Apps (CIO Dive)
Once solely the domain of super-users with enough technical acumen to surreptitiously set up and run infrastructure and apps, rogue IT now proliferates — and is accepted.... More
CIOs and CISOs – a Modern Power Struggle? (Raconteur)
With security threats a rising priority for businesses, some cyber chiefs want a bigger role, posing challenges for CIOs.... More
Splunk, DTEX Partner to Accelerate Zero-Trust Security Operations With Insider Risk Intelligence, Noise-Free Endpoint Telemetry
Splunk and DTEX Systems are accelerating security response times and root cause analysis, driving faster event resolution with advanced analytics and reporting, as well as decreasi... More
Code42 Incydr Now Detects Risky Data Movement to Unmonitored Devices – Like Personal Phones, Laptops
By identifying when a file moves to an unmonitored device, Incydr alerts security teams to blindspots, with the critical context – what type of information is being exposed, from... More
CISO Churn – Why it’s Happening and How to Stop It (Racontuer)
Only a quarter of chief information security officers (CISOs) last a year in the role. We look at the reasons behind this high turnover and ask what can be done to prevent it?... More
Hybrid Work Here to Stay: What Does That Mean for Security? (ZDNet)
A new survey from Palo Alto Networks shows the key challenges enterprises faced as they moved to remote work and they're doing next as hybrid work models gain more acceptance.... More