This week, VMware handled critical vulnerabilities, Capita reported losses, the NSA pushed for zero trust, malware exploited aNotepad, a Taiwanese telecom was breached, the Swiss government dealt with ransomware attack fallout, fake meetings spread malware, Amex was breached and PetSmart was hacked.
Cloudflare's acquisition of Nefeli Networks aims to streamline multi-cloud networking by offering seamless integration and security across cloud platforms. The move simplifies cloud connectivity by providing a unified platform for businesses to manage their network and security policies efficiently.
CEO George Kurtz said Palo Alto Networks' strategy of offering free products won't neutralize CrowdStrike's advantage around total cost of ownership. Customers are smart enough to recognize the difference between the price of a product and the total lifetime cost of operating inferior technology.
In today's digital age, new career opportunities have emerged for digital protectors, and they are not subject to business budgetary trends. For those willing to dedicate their lives to safeguarding the digital corridors we all traverse, the rewards are both tangible and profound.
CrowdStrike plans to purchase a data security posture management startup led by an Israeli Defense Forces team leader to safeguard information across endpoints and clouds. The proposed Flow Security deal will give CrowdStrike visibility into cloud data flows and how data interacts with applications.
The administrators of the BlackCat ransomware-as-a-service group claim law enforcement has shut down their operation. But experts and affiliates accuse the group's leadership of running an exit scam on the heels of a $22 million ransom payment by a recent victim - Optum's Change Healthcare unit.
The healthcare sector should have plenty of experience responding to data security incidents and breaches, especially in light of the record number of breaches reported last year. But when leaders are dealing with an incident, response plans can go awry. Experts offer tips for avoiding mishaps.
A startup led by an Israeli intelligence veteran hauled in $200 million to pursue acquisitions that will allow for the protection of more asset types. The money will allow Axonius to better use existing data and build on its recent expansion to safeguard SaaS applications and installed software.
Exploring the depths of modern cyber threats, as we dissect the evolution of phishing tactics and unveil expert strategies to bolster your defenses. Join us to gain invaluable insights on staying ahead of the curve in the battle against cybercrime.
The rise of public cloud infrastructure and remote work have weakened network-based models of security. The network-first models have been replaced by the tenets of Zero Trust and Least Privilege. A core component of Zero Trust is placing user identity and associated entitlements at the center of security. It is now...
In his first week in his new role as interim CEO of SSH Communications Security, Rami Raulas shares insights on the company’s strategic focus on zero trust, operational technology security, and quantum-safe cryptography to address evolving cybersecurity challenges.
Saving passwords in browser-based password managers or via "remember my details" website options might make for simple and fast log-ins for employees, but they also give attackers an easy way to lift legitimate credentials, oftentimes via highly automated, information-stealing malware, experts warn.
Zscaler CEO Jay Chaudhry said Palo Alto Networks' strategy of offering free products to new platform customers will "unravel over time" as firewalls become shelfware. Legacy vendors find themselves "in a defensive position" as the role of firewalls shrinks and demand for zero trust security grows.
A post-SolarWinds move away from Active Directory Federation Services to Azure AD - now known as Entra ID - didn't necessarily stop hackers from forging single sign-on authentication messages, warn security researchers from Semperis, who unveiled an attack they dub "Silver SAML."
This week, the Biden administration urged software developers to adopt memory-safe programming languages and moved to restrict Chinese connected cars, a pharma giant was breached, researchers found malicious repos in GitHub, the Phobos RaaS group is targeting the U.S., and Zyxel patched devices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.