20 Coolest Cybersecurity Products At RSAC 2024

20 Coolest Cybersecurity Products At RSAC 2024

At RSA Conference 2024 this week, vendors are showcasing new products in categories including SASE, security operations and application security — with many touting newly released, GenAI-powered cybersecurity capabilities. Big RSAC Product Announcements Even as the cybersecurity industry continues to maintain its rapid growth pace — leading many vendors to roll out product announcements throughout the year — major makers of cybersecurity tools also continue to target the launch of new products and capabilities at…

Read More

Misconfigurations drive 80% of security exposures

Misconfigurations drive 80% of security exposures

A report from XM Cyber analyzes more than 40 million exposures in order to provide a thorough understanding of the current exposure landscape. The report found that 80% of exposures are caused by identity and credential misconfigurations. Out of these exposures, one-third of them put critical assets at risk of a breach. According to the report, a majority of the exposure is within an organization’s active directory, a critical component for connecting users to network…

Read More

Cisco and Nvidia: Redefining Workload Security

Cisco and Nvidia: Redefining Workload Security

There has been an exponential increase in breaches within enterprises despite the carefully constructed and controlled perimeters that exist around applications and data. Once an attacker can access the network, it becomes an “all you can eat” buffet as they move laterally around the environment, taking control, and either exfiltrating sensitive data, or locking it up with ransomware. Enterprises traditionally use two approaches to mitigate these risks: implementing intrusion detection solutions and defining micro-perimeters around…

Read More

Top 40 Cybersecurity Companies You Need to Know 2024

Top 40 Cybersecurity Companies You Need to Know 2024

eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. As the demand for robust security defense grows, the market for cybersecurity technology has exploded, as have the number of available solutions. To help you navigate this growing market, we recommend 20 of the world’s leading cybersecurity technology providers and another 20 honorable mentions, based on their innovation, revenue and growth, user…

Read More

Sign up for a Tour at the RSA Conference 2024 SOC

Sign up for a Tour at the RSA Conference 2024 SOC

Join the guided tour outside the Security Operations Center, where we’ll discuss real time network traffic of the RSA Conference, as seen in the NetWitness platform. Engineers will be using Cisco Security Cloud in the SOC, comprised of Cisco Breach Protection Suite, User Protection Suite, Cloud Protection Suite and Secure Firewall. Incidents are investigated with Threat Intelligence, provided by Cisco Talos, partners Recorded Future, alphaMountain, Pulsedive and community sources. Outside the SOC, you will receive…

Read More

UK's NCSC Issues Warning as SVR Hackers Target Cloud Services

UK's NCSC Issues Warning as SVR Hackers Target Cloud Services

Russian state hackers are adapting their techniques to target organizations moving to the cloud, an advisory from the UK National Cyber Security Centre and international security agencies has warned. The advisory details how cyber espionage group APT29 is directly targeting weaknesses in cloud services used by victim organizations to gain initial access to their systems. APT29 is also expanding the scope of its attacks beyond governments, think tanks, healthcare and energy providers to include victims…

Read More

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

Highlights from CrowdStrike’s 2024 report: Identity-based and social engineering attacks still take center stage. Cloud-environment intrusions have increased by 75% from 2022 to 2023. Third-party relationships exploitation makes it easier for attackers to hit hundreds of targets. CrowdStrike added 34 new threat actors in 2023. Attackers are compromising networks at a faster rate. Attackers are targeting periphery networks. CrowdStrike’s new 2024 Global Threat report exposed the latest trends in cyberattacks, and we’re highlighting the main…

Read More

Ingress security from Cisco Multicloud Defense: Protecting cloud networks and infrastructure against advanced inbound threats

Ingress security from Cisco Multicloud Defense: Protecting cloud networks and infrastructure against advanced inbound threats

Digital transformation and the cloud are driving unprecedented innovation and growth. However, the move to the cloud is expanding threat surfaces out beyond the perimeter – often on endpoints, applications, and cloud services that fall beyond the visibility and control of the organization’s security team. The lack of visibility and control across multiple clouds, regions, and accounts has created a major security gap for organizations looking to continue to innovate and grow through the scale…

Read More

Egress Security: Part of a Holistic, Multidirectional Security Strategy for Today’s Multicloud World

Egress Security: Part of a Holistic, Multidirectional Security Strategy for Today’s Multicloud World

Cloud transformation has given rise to a new era of business innovation and growth. According to Enterprise Strategy Group, more than half of production workloads will be running on public cloud infrastructure within the next two years, positioning cloud computing center-stage as the best practice for solving critical business issues and enabling agility. However, the unforeseen by-product of this evolution is complexity, and complexity is the enemy of security. Decentralized IT infrastructure, expanding threat surfaces,…

Read More

Introducing Cisco Cloud Protection – Complete Protection, from Ground to Cloud

Introducing Cisco Cloud Protection – Complete Protection, from Ground to Cloud

A few weeks ago, I was speaking with a CISO who said, “Our team is coming to the conclusion right now that we need to hire experts for every cloud – GCP, Azure, AWS – just to maintain our existing security. We don’t have the headcount for that.” This wasn’t the first time I’ve heard this. In fact, it’s become a common theme in my conversations with customers and partners. That’s because today, most organizations…

Read More
1 2 3 13