Cisco and Nvidia: Redefining Workload Security

Cisco and Nvidia: Redefining Workload Security

There has been an exponential increase in breaches within enterprises despite the carefully constructed and controlled perimeters that exist around applications and data. Once an attacker can access the network, it becomes an “all you can eat” buffet as they move laterally around the environment, taking control, and either exfiltrating sensitive data, or locking it up with ransomware. Enterprises traditionally use two approaches to mitigate these risks: implementing intrusion detection solutions and defining micro-perimeters around…

Read More

Top 40 Cybersecurity Companies You Need to Know 2024

Top 40 Cybersecurity Companies You Need to Know 2024

eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. As the demand for robust security defense grows, the market for cybersecurity technology has exploded, as have the number of available solutions. To help you navigate this growing market, we recommend 20 of the world’s leading cybersecurity technology providers and another 20 honorable mentions, based on their innovation, revenue and growth, user…

Read More

Sign up for a Tour at the RSA Conference 2024 SOC

Sign up for a Tour at the RSA Conference 2024 SOC

Join the guided tour outside the Security Operations Center, where we’ll discuss real time network traffic of the RSA Conference, as seen in the NetWitness platform. Engineers will be using Cisco Security Cloud in the SOC, comprised of Cisco Breach Protection Suite, User Protection Suite, Cloud Protection Suite and Secure Firewall. Incidents are investigated with Threat Intelligence, provided by Cisco Talos, partners Recorded Future, alphaMountain, Pulsedive and community sources. Outside the SOC, you will receive…

Read More

UK's NCSC Issues Warning as SVR Hackers Target Cloud Services

UK's NCSC Issues Warning as SVR Hackers Target Cloud Services

Russian state hackers are adapting their techniques to target organizations moving to the cloud, an advisory from the UK National Cyber Security Centre and international security agencies has warned. The advisory details how cyber espionage group APT29 is directly targeting weaknesses in cloud services used by victim organizations to gain initial access to their systems. APT29 is also expanding the scope of its attacks beyond governments, think tanks, healthcare and energy providers to include victims…

Read More

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

Highlights from CrowdStrike’s 2024 report: Identity-based and social engineering attacks still take center stage. Cloud-environment intrusions have increased by 75% from 2022 to 2023. Third-party relationships exploitation makes it easier for attackers to hit hundreds of targets. CrowdStrike added 34 new threat actors in 2023. Attackers are compromising networks at a faster rate. Attackers are targeting periphery networks. CrowdStrike’s new 2024 Global Threat report exposed the latest trends in cyberattacks, and we’re highlighting the main…

Read More

Ingress security from Cisco Multicloud Defense: Protecting cloud networks and infrastructure against advanced inbound threats

Ingress security from Cisco Multicloud Defense: Protecting cloud networks and infrastructure against advanced inbound threats

Digital transformation and the cloud are driving unprecedented innovation and growth. However, the move to the cloud is expanding threat surfaces out beyond the perimeter – often on endpoints, applications, and cloud services that fall beyond the visibility and control of the organization’s security team. The lack of visibility and control across multiple clouds, regions, and accounts has created a major security gap for organizations looking to continue to innovate and grow through the scale…

Read More

Egress Security: Part of a Holistic, Multidirectional Security Strategy for Today’s Multicloud World

Egress Security: Part of a Holistic, Multidirectional Security Strategy for Today’s Multicloud World

Cloud transformation has given rise to a new era of business innovation and growth. According to Enterprise Strategy Group, more than half of production workloads will be running on public cloud infrastructure within the next two years, positioning cloud computing center-stage as the best practice for solving critical business issues and enabling agility. However, the unforeseen by-product of this evolution is complexity, and complexity is the enemy of security. Decentralized IT infrastructure, expanding threat surfaces,…

Read More

Introducing Cisco Cloud Protection – Complete Protection, from Ground to Cloud

Introducing Cisco Cloud Protection – Complete Protection, from Ground to Cloud

A few weeks ago, I was speaking with a CISO who said, “Our team is coming to the conclusion right now that we need to hire experts for every cloud – GCP, Azure, AWS – just to maintain our existing security. We don’t have the headcount for that.” This wasn’t the first time I’ve heard this. In fact, it’s become a common theme in my conversations with customers and partners. That’s because today, most organizations…

Read More

Is Your Smart TV Spying on You? | McAfee Blog

Is Your Smart TV Spying on You? | McAfee Blog

In a chilling echo of George Orwell’s dystopian novel 1984, it’s possible that Big Brother – or in this case, Big Hacker – might be surveilling you through your own television. Evidence is emerging that Smart TVs can be just as prone to hacking as home computers. Security analysts Aaron Grattafiori and Josh Yavor from iSEC Partners have spent several months investigating this issue, working alongside Smart TV manufacturers to address potential vulnerabilities. They presented…

Read More

EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

In the active Elektra-Leak campaign, attackers hunt for Amazon IAM credentials within public GitHub repositories before using them for cryptomining. Get tips on mitigating this cybersecurity threat. Image: WhataWin New research from Palo Alto Networks’s Unit 42 exposes an active attack campaign in which a threat actor hunts for Amazon IAM credentials in real time in GitHub repositories and starts using them less than five minutes later. The final payload runs customized Monero cryptomining software…

Read More
1 2 3 4 5 15