Cloud security vendor says consolidation will help customers detect threats across workloads, identities, cloud services, and third-party applications.
Stories by Michael Hill
Identity-centric security cracks are beginning to show in organisations as investment in digital and cloud technology outpaces cybersecurity spend.
The SAIF is designed to help mitigate risks specific to AI systems like model theft, training data poisoning, and malicious injections.
Solution combines email security, web browsing protection, perimeter posture, and awareness culture to help tackle phishing attacks.
SAFE Security’s Cyber Risk Cloud of Clouds generates likelihoods for different risk scenarios based on an organisation’s cybersecurity posture.
Improperly deactivated and unmaintained Salesforce sites are vulnerable to threat actors who can gain access to sensitive business data and personally identifiable information (PII) by simply changing the host header.
How vendors, governments, industry bodies, and nonprofits are contributing to increasing the cyber resilience of critical national infrastructure this year.
Trellix, Netskope announce new Amazon Security Lake support to enhance threat detection, remediation
Trellix expands XDR support for Amazon Security Lake while Netskope integrates its SSE platform with AWS’ centralised security data service.
The rapid emergence of Open AI’s ChatGPT has been one of the biggest stories of the year, with the potential impact of generative AI chatbots and large language models (LLMs) on cybersecurity a key area of discussion.
Cybersecurity training, controls, and requirements that are inaccessible, especially to those with disabilities, can make businesses less secure and more vulnerable to risky behaviour.
Real-time cloud visibility and threat prioritisation aims to eliminate the risks of “point-in-time” scanning that opens the door for increased attacks.
Technology giant IBM has debuted a new set of tools and capabilities designed as an end-to-end, quantum-safe solution to secure organisations and governmental agencies as they head toward the post-quantum computing era.
Partnership aims to help customers find the right combination of solutions to securely meet their cloud needs.
Snake’s custom communications protocols employ encryption and fragmentation for confidentiality and are designed to hamper detection and collection efforts.
Mobile security features for MSPs include anti-malware and malicious app protection.