Tag: Cloud and Data Storage Security

Why SASE will benefit from faster consolidation of networking and security

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More Seventy-five percent of enterprises are pursuing vendor consolidation, up from 29% just three years ago, with secure access service edge (SASE) experiencing significant upside growth as a result. SASE is also proving […]

Read More

GPT-4 kicks AI security risks into higher gear

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More As Arthur C. Clarke once put it, any sufficiently advanced technology is “indistinguishable from magic.” Some might say this is true of ChatGPT, too — including, if you will, black magic.  Immediately […]

Read More

Hacker demonstrates security flaws in GPT-4 just one day after launch

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More OpenAI’s powerful new language model, GPT-4, was barely out of the gates when a student uncovered vulnerabilities that could be exploited for malicious ends. The discovery is a stark reminder of the […]

Read More

The right corporate structure is key to balancing risk and user experience

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More Savvy organizations recognize that the faster you can service customers, the happier they will be. That typically goes hand in hand with savings in operational costs. But due to fraud, connecting with […]

Read More

Analysts share 8 ChatGPT security predictions for 2023 

The release of ChatGPT-4 last week shook the world, but the jury is still out on what it means for the data security landscape. On one side of the coin, generating malware and ransomware is easier than ever before. On the other, there are a range of new defensive use cases.  Recently, VentureBeat spoke to […]

Read More

4 key trends from the Gartner IAM Summit 2023

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More Identity is the new network perimeter. In a world powered by cloud computing, every human and machine identity, whether it exists on-premises or in the cloud, needs to be protected to prevent […]

Read More

A roadmap to zero-trust maturity: 6 key insights from Forrester

Once an enterprise decides to go all-in on zero trust, it usually starts strong, only to hit barriers no one saw coming. This makes a roadmap essential. Seeing its clients who are pursuing zero trust facing challenges in reaching the next level of maturity, Forrester invested a year of its zero trust team’s time in […]

Read More

Defining endpoint security in a zero-trust world

Attackers strike at businesses with identity theft as their top goal. CISOs and CIOs told VentureBeat they’ve seen spikes in identity-driven attacks in the first three months of 2023.  Getting identity right is core to a robust zero-trust framework. It takes endpoint resilience, improved sensing and telemetry data analysis techniques, and faster innovation at protecting […]

Read More

How security access service edge (SASE) can improve performance and security for hybrid workforces

Today’s business environments are more sprawled than ever — users are accessing networks from point A to point B and everywhere in between.  This has left many cybersecurity teams scrambling to cover all network points and users and ensure that gaps and silos don’t provide easy pathways for threat actors.  The broadened physical and virtual […]

Read More

How access management helps protect identities in the cloud

Things are rapidly growing more challenging on the security front in 2023. Many CISOs didn’t expect this much pressure to consolidate tech stacks, make budgets go further and do better at stopping identity-driven breach attempts. CISOs tell VentureBeat that access management (AM), identity and access management (IAM) and privileged access management (PAM) are under attack […]

Read More

A zero-trust roadmap for cybersecurity in manufacturing — from a 98-year-old company

Manufacturers are the most popular corporate targets for ransomware attacks and identity and data theft. With customer orders and deliveries hanging in the balance, they can only afford to have their product lines down for a short time. So attackers know that if they can disrupt manufacturing operations, they can force a high ransom payout.  […]

Read More

Forget the hybrid cloud; it’s time for the confidential cloud 

As cloud adoption gains traction, it’s clear that security teams have been left to play catch up. In diverse hybrid cloud and multicloud environments, encrypting data-at-rest and in-transit isn’t enough; it needs to be encrypted in use, too. This is where confidential computing comes in.  Today, The Open Confidential Computing Conference (OC3) gathered together IT […]

Read More

CrowdStrike report shows identities under siege, cloud data theft up

Cyberattacks exploiting gaps in cloud infrastructure — to steal credentials, identities and data — skyrocketed in 2022, growing 95%, with cases involving “cloud-conscious” threat actors tripling year-over-year. That’s according to CrowdStrike’s 2023 Global Threat Report. The report finds bad actors moving away from deactivation of antivirus and firewall technologies, and from log-tampering efforts, seeking instead […]

Read More

Cloud incident response nets another $45M with Mitiga’s latest funding  

Cloud adoption is on the rise. Just last year, 89% of enterprises migrated data from on-premise storage to the public cloud. And, 84% of organizations expect to increase the amount of data they store in the public cloud in 2023.  This is great news for decision makers. But for security teams, the growing use of […]

Read More

Report: Hackers leaked over 721 million passwords in 2022 

There’s no simpler way to hack someone’s account than to enter their username and password. In fact, threat actors routinely leak users’ login credentials on the dark web, where they can be purchased by cybercriminals and fraudsters to commit further crimes. According to research released today by Cybercrime Analytics (C2A) provider SpyCloud, researchers discovered 721.5 […]

Read More

Security risks threaten the benefits of the edge

Edge compute is touted for its ultra-low latency and high efficiency.  But it also presents a new attack surface can that bad actors can use to compromise data confidentiality, app integrity and service availability.  “What else is also getting distributed? The attacks,” said Richard Yew, senior director of product management for security at Edgio. Ultimately, […]

Read More

Multifactor authentication: Keeping employee data secure through digital ID management

Digital security is a growing concern for business owners. We live in a post-pandemic era defined by data breaches and online threats that have only increased as everyone has adjusted to a remote-first work world. As digital threats continue to ramp up, you must take a proactive stance to keep your company’s data secure — […]

Read More

The challenges of attracting cybersecurity talent and how to address them

The cybersecurity industry is at an interesting inflection point. We are now approaching three years of remote and hybrid work, and individuals and organizations alike have had to adjust and improve their security infrastructures. And this push for more security will only amplify in 2023 in new and unique ways. Despite the growing need for […]

Read More

What is confidential computing exactly? Fortanix CEO explains 

When it comes to data encryption, confidential computing is one of the fast-growing solutions in the enterprise market.  In fact, Everest Group predicts that the confidential computing market could grow to $54 billion by 2026, with vendors ranging from Microsoft, Intel and AMD all using the technology to help organizations protect their critical data assets. […]

Read More

5 steps to gain control of vulnerability management for your enterprise

Over the last decade, organizations have significantly scaled up their business processes. They’ve increased the amount of technology they use, the size of their teams spinning up new systems, and the number of assets they have created. However, as businesses themselves have accelerated, their vulnerability management systems have been left in the dust. Businesses must […]

Read More

Cloud security platform lands $20M to automate incident response in the cloud 

As cloud adoption has increased, it’s become clear that many security teams can’t keep up. According to IBM, almost 45% of breaches occur in the cloud. Organizations don’t just need to improve their detection of cloud-based breaches. They also need to learn how to remediate intrusions as fast as possible to protect their data. Cado Security, […]

Read More

Access management must get stronger in a zero-trust world

Access management (AM) done right is the fuel for successful digital transformation. Identities and AM are core to earning customers’ trust — a must for digital-first initiatives to get a strong start and deliver revenue. AM and identities must be granular, role-based and as just-in-time as possible. Enterprises achieving that today are seeing zero-trust security […]

Read More

Want data security? Concentrate on cybersecurity training, RangeForce raises $20M 

Security awareness is an organization’s greatest defense against threat actors.  Yet, research shows that last year, 80% of organizations suffered one or more breaches that they could attribute to a lack of cybersecurity skills and/or awareness.  As a result, cybersecurity training is one of the easiest ways that an organization can protect its data from […]

Read More

Why machine identity management should be your focus in 2023

There’s no doubt that the pressure on security teams is on the rise. From geopolitical tensions and nation-state attacks to the growing complexity of cloud — security professionals have had their work cut out for them to keep organizations secure. But, with 2023 likely to bring further economic downturn, the security industry will be reassessing […]

Read More

Modernizing identity access management with zero trust

CISOs tell VentureBeat they’re taking an increasingly pragmatic approach to modernizing identity access management (IAM) — and this starts with reducing legacy app and endpoint sprawl. The goal is a more efficient, economical, lean tech stack that’s solid enough to scale and support their enterprise-wide zero-trust frameworks.  Identities are under siege because attackers, criminal gangs […]

Read More

How to avoid billion-dollar fines due to unsecured messaging apps

In September, the U.S. Security and Exchange Commission (SEC) issued $1.8 billion in fines to some of Wall Street’s biggest banks for their inability to keep private information secure when using internal communications. These banks, including Barclay’s, Bank of America, Citigroup Global Markets, Goldman Sachs, JP Morgan Chase and others, received these fines for their […]

Read More

Creating secure customer experiences with zero trust

Check out all the on-demand sessions from the Intelligent Security Summit here. Solving the problem of protecting personalized customer experiences at scale will grow a digital business faster than competitors, fueling confidence and trust. Getting the balance of security, safety, confidence and trust right is table stakes for deriving the greatest value from digital transformation […]

Read More

How threat intelligence helps SecOps prevent cyberevents before they happen

CISOs tell VentureBeat they’re looking to get more value from security operations (SecOps) by identifying threats rather than analyzing them after an event. Gartner’s direction is that “SecOps’ goal is to create proactive risk understanding and enable threat exposure reduction as well as detection of, and response to, cyber events that negatively affect the organization.”  […]

Read More

How SlashNext is using generative AI to shut down ChatGPT phishing attacks  

Check out all the on-demand sessions from the Intelligent Security Summit here. ChatGPT and generative AI have made life difficult for security teams. Simply by writing a brief prompt, a wannabe hacker can generate a phishing email template in seconds, which they can send off to countless unsuspecting users until one makes the mistake of […]

Read More

Immuta and ServiceNow partner to tackle cloud data visibility crisis 

Check out all the on-demand sessions from the Intelligent Security Summit here. “Where is my organization’s critical data?” is the CISO’s million-dollar question. Today, security leaders need to be able to pinpoint what data assets exist and where, so they can implement access controls to protect them. Unfortunately there’s a data visibility crisis in the […]

Read More

Cloud security provider Wiz raises $300M for consolidated CSPM/CNAPP platform

Check out all the on-demand sessions from the Intelligent Security Summit here. Cloud technology has changed the data economy. Data is no longer locked in on-premise silos and servers, but traverses through a dynamic patchwork of cloud service providers, apps, APIs and containers. An unchecked vulnerability or misconfiguration in any of these components can leave critical […]

Read More