How AI Is Changing the Cloud Security and Risk Equation

How AI Is Changing the Cloud Security and Risk Equation

The AI boom is amplifying risks across enterprise data estates and cloud environments, according to cybersecurity expert Liat Hayun. In an interview with TechRepublic, Hayun, VP of product management and research of cloud security at Tenable, advised organisations to prioritise understanding their risk exposure and tolerance, while prioritising tackling key problems like cloud misconfigurations and protecting sensitive data. Liat Hayun, VP of product management and research of cloud security at Tenable She noted that while…

Read More

Products Of The Year 2024: The Finalists

Products Of The Year 2024: The Finalists

CRN staff compiled the top partner-friendly products that launched or were significantly updated over the last year. Now it’s up to solution providers to choose the winners. Application Performance and Observability As more applications run in hybrid-cloud and multi-cloud environments, maintaining application performance has becoming a more complex task. Application performance management and observability tools help IT organizations maintain the health, performance and user experience of business applications, according to market researcher Gartner. Such tools…

Read More

DevOps Decoded: Prioritizing Security in a Dynamic World

DevOps Decoded: Prioritizing Security in a Dynamic World

Introduction: The urgency of security DevOps security marries development, operations, and security to remove the barriers between software developers and IT operations. Doing so ensures the code runs scales and operates reliably across the organization. While DevOps supports rapid updates, there might be reliance on vulnerabilities from third-party components. Development and IT can reduce flaws and adapt new features earlier while fostering teamwork, making software integration more secure. Traditional vs. Integrated Approach: The conventional model…

Read More

DevOps Decoded: Prioritizing Security in a Dynamic World

DevOps Decoded: Prioritizing Security in a Dynamic World

Introduction: The Urgency of Security DevOps security marries development, operations, and security to remove the barriers between software developers and IT operations. Doing so ensures the code runs scales and operates reliably across the organization. While DevOps supports rapid updates, there might be reliance on vulnerabilities from third-party components. Development and IT can reduce flaws and adapt new features earlier while fostering teamwork, making software integration more secure. Traditional vs. Integrated Approach: The conventional model…

Read More

Maximizing business benefits with robust hybrid cloud security

Maximizing business benefits with robust hybrid cloud security

Byline: Chris Jenkins, Principal Chief Architect at Red Hat  The evolution of containers and hybrid cloud technologies has brought significant benefits to the enterprise. These platforms democratize access to new applications and technologies, enabling teams to work more seamlessly together and facilitate increased innovation within the organization. Over the last few years, IT leaders have been championing migrations from on-premises based virtual machines to containers and the hybrid cloud accordingly, with almost three quarters (73%)…

Read More

Ensuring security and compliance in evolving cloud environments

Ensuring security and compliance in evolving cloud environments

With the rapid pace of cloud adoption, organizations are quickly revolutionizing business operations but are having a harder time ensuring that systems are built and operated effectively and deployed with the proper cyber hygiene. Business growth experts say to move fast and break things but failing to implement appropriate cybersecurity controls simply doesn’t work because both the regulatory and threat landscape are evolving more rapidly than ever.  Even before organizations embarked on huge digital transformation…

Read More

CrowdStrike Outage Disrupts Microsoft Systems Worldwide | TechRepublic

CrowdStrike Outage Disrupts Microsoft Systems Worldwide | TechRepublic

A major disruption to Windows PCs in the U.S., U.K., Australia, South Africa and other countries was caused by an error in a CrowdStrike update, the cloud security company announced on Friday. Emergency services, airports and law enforcement reported downtime, which is ongoing. “This is not a security incident or cyberattack,” CrowdStrike said in a statement. Blue Screen of Death widespread due to CrowdStrike outage Affected organizations saw the infamous Blue Screen of Death, the…

Read More

Snowflake Users Targeted for Data Theft and Extortion

Snowflake Users Targeted for Data Theft and Extortion

A new report from Mandiant, part of Google Cloud, reveals that a financially motivated threat actor named UNC5537 collected and exfiltrated data from about 165 organizations’ Snowflake customer instances. Snowflake is a cloud data platform used for storing and analyzing large volumes of data. The threat actor managed to get access to these data by triggering credentials that were previously stolen by infostealer malware or purchased from other cybercriminals. According to Mandiant, the threat actor…

Read More

Product spotlight on risk and threat monitoring

Product spotlight on risk and threat monitoring

With rapidly-evolving threats and staffing shortages, it’s becoming harder for security leaders to monitor their organizations for potential threats. Security magazine highlights a few products that help keep critical systems safe from attack. CROWDSTRIKE Proactively Searches for Threats Falcon Adversary OverWatch is a 24/7 threat hunting service that spans endpoint, identity and cloud to disrupt adversaries. The software is powered by threat intelligence and artificial intelligence (AI). The software is designed to help analysts locate threats and…

Read More

Security, the cloud, and AI: building powerful outcomes while simplifying your experience

Security, the cloud, and AI: building powerful outcomes while simplifying your experience

Over the past year, I’ve spoken with hundreds of professionals about what they expect from their network security. This question is mostly met with equal parts enthusiasm and angst. As we wrap up another successful Cisco Live, I’m eager to share the deep insights I’ve gathered from these extensive conversations and how Cisco is actively addressing your security needs. As organizations navigate application transformations and grapple with the intricacies of defending increasingly complex networks, they’re…

Read More
1 2 3 14