Products Of The Year 2024: The Finalists

Products Of The Year 2024: The Finalists

CRN staff compiled the top partner-friendly products that launched or were significantly updated over the last year. Now it’s up to solution providers to choose the winners. Application Performance and Observability As more applications run in hybrid-cloud and multi-cloud environments, maintaining application performance has becoming a more complex task. Application performance management and observability tools help IT organizations maintain the health, performance and user experience of business applications, according to market researcher Gartner. Such tools…

Read More

Getting API security right: Ensuring robust protection

Getting API security right: Ensuring robust protection

Application programmable interfaces (APIs) are an essential component of the online experience — from business websites and applications to consumer platforms like social media. APIs enable different software applications to communicate and interact with each other programmatically.  APIs create a unique security environment that can be difficult to get right. The big problem is that many APIs remain unmanaged and undiscovered, and even known APIs are often poorly protected. Without getting a handle on their…

Read More

AI arms race: Cybersecurity defenders in the age of evolving threats

AI arms race: Cybersecurity defenders in the age of evolving threats

As web application cyberattacks surge, defenders are on the frontline of an ever-evolving battlefield. With adversaries leveraging artificial intelligence (AI) to sharpen their assaults, defenders face unprecedented challenges. However, AI isn’t just empowering attackers — it’s also emerging as a crucial ally for defenders. Organizations can use AI’s capabilities and implement strong security training to identify and neutralize threats.  Rest assured, the rise in web application attacks signifies a persistent shift rather than a passing…

Read More

2024: The year of upticks in cyber warfare

2024: The year of upticks in cyber warfare

Historical trends over the past decade prove that when global conflicts arise, it’s inevitable that we’ll begin to see widespread cyberattacks shortly thereafter. This has been the case during the recent happenings between Russia and Ukraine, and Israel and Gaza. At the beginning of each crisis, we witnessed an immediate uptick in cyberattacks worldwide in areas such as DDoS, API and DNS attacks. Following the Iranian missile strike in April, we have already seen and…

Read More

Here’s What 20 Top Cybersecurity CEOs And CTOs Were Saying At RSAC 2024

Here’s What 20 Top Cybersecurity CEOs And CTOs Were Saying At RSAC 2024

CRN spoke with the CEOs and CTOs of a number of cybersecurity companies, including Proofpoint, Palo Alto Networks, Rubrik and CrowdStrike, during RSA Conference 2024. Here’s what they had to say. While the many implications of GenAI for security continued to be discussed and debated at last week’s RSA Conference, an array of other issues were front and center—including for many CEOs and CTOs at leading cybersecurity vendors. During interviews the week before RSAC 2024…

Read More

73% of security professionals failed to act upon security alerts

73% of security professionals failed to act upon security alerts

A new report by Coro sheds light on the challenges that cybersecurity professionals are facing in regard to their workload. The report surveyed 500 cybersecurity decision-makers in the United States, all of whom worked for companies with 200 to 2000 employees. The survey focused on small and medium-sized enterprises (SMEs), finding that many lacked the resources and abilities to properly handle the large volume security alerts received.  In fact, 73% of security professionals in SMEs…

Read More

Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted

Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted

Organisations that have backed up their sensitive data may believe they are relatively safe from ransomware attacks; however, this is not the case based on findings from a new study from IT security company Sophos. The report showed that cybercriminals attempted to compromise the backups of 94% of companies hit by ransomware in the past year. Attackers are aware that those who fall victim to ransomware must choose to either pay the ransom or recover…

Read More

Product Spotlight on Analytics

Product Spotlight on Analytics

Product Spotlight on Analytics | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

Strengthening financial service cybersecurity

Strengthening financial service cybersecurity

Strengthening financial service cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More
1 2 3