Palo Alto will spent nearly $670 million buying Talon and Dig to broaden its cloud security portfolio and protect unmanaged devices without affecting usability. Purchasing Tel Aviv, Israel-based Talon Cyber Security for $435 million will help safeguard the 36% of the workforce that's independent.
Improve your organization’s cyber readiness so you can confidently respond to the latest threats. The Google Cloud Cybersecurity Forecast 2024 provides insights on the year ahead from experts on the frontlines of the latest attacks. Read the report to learn what 2024 holds for generative AI-enabled security,...
The savvy decision-makers who work in financial services know their data is a hot commodity for money-motivated attackers who use the latest tricks and techniques to get ahold of it. And they know that nation-state hactivists often use financial services data as a bargaining chip to push their political...
Corporate boards of directors are now mandated to take stronger roles in enterprise cybersecurity. That can be both good news and concerning. David Homovich of Google Cloud tells how to turn board interest into a positive relationship to improve crisis communication and defenses.
Palo Alto Networks plans to purchase a data security posture management startup led by a Microsoft and Google veteran and backed by Samsung. The proposed buy of Tel Aviv, Israel-based Dig Security will give Palo Alto Networks customers visibility into and control of their multi-cloud data estate.
Digital transformation in the cloud is continuous. It comes with an ever-expanding risk landscape that's increasingly challenging. As IT teams seek to meet these challenges, they must focus on scaling their businesses securely while continuing to innovate to improve the customer experience.
Visibility, consistency, efficiency - are goals every security leader strives to achieve across cloud environments, and remains one of the key digital transformation challenges. Cisco's Sean Baze talks about how to overcome this challenge and discover new efficiencies through a data-driven approach.
The maker of the world's most popular VPN service hauled in $100 million on a $3 billion valuation to accelerate growth through mergers and acquisitions. The Warburg Pincus-led investment will allow the Lithuania-based internet privacy and security vendor to expand its product offering.
Zscaler's ability to inspect traffic in-line and secure application-to-application communications has driven massive growth in its data protection business, CEO Jay Chaudhry said. Customers have embraced Zscaler's data protection technology over incumbents such as Symantec as well as CASB tools.
Organizations struggle with governing the data that goes into and informs large language models since it's in documents rather than spreadsheets or SQL databases, said BigID CEO Dimitri Sirota. Companies need a more effective governance framework for managing unstructured data, Sirota said.
Financial services organizations face unique cloud security challenges, due to special regulatory, data security and privacy considerations that don't necessarily apply to other industries. Security and payments experts with overlapping skill sets unpack the challenges and how to deal with them.
With the growth of generative AI services, organizations want better control of the data going in and coming out of AI. Talon CEO Ofer Ben-Noon discussed how his firm has built a DLP compliance model around generative AI services that blocks healthcare information or SWIFT data shared with ChatGPT.
Boosting Organizational Productivity with Generative Artificial Intelligence while Preventing Sensitive Enterprise Data Leakage.
The risks vs. the rewards of using generative AI tools when it comes to increasing organizational productivity at the potential expense of enterprise data leaking into the wrong hands is a...
With data distributed across multiple clouds serving an increasingly remote workforce, can existing data protection programs truly be successful? Most data protection solutions have been built on a foundation of legacy technologies and operations that only drive up complexity and costs.
A best-in-class data...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.