How AI Is Changing the Cloud Security and Risk Equation

How AI Is Changing the Cloud Security and Risk Equation

The AI boom is amplifying risks across enterprise data estates and cloud environments, according to cybersecurity expert Liat Hayun. In an interview with TechRepublic, Hayun, VP of product management and research of cloud security at Tenable, advised organisations to prioritise understanding their risk exposure and tolerance, while prioritising tackling key problems like cloud misconfigurations and protecting sensitive data. Liat Hayun, VP of product management and research of cloud security at Tenable She noted that while…

Read More

Proofpoint Expands Data Security With Normalyze Acquisition

Proofpoint Expands Data Security With Normalyze Acquisition

Data Loss Prevention (DLP) , Endpoint Security Normalyze’s AI-Powered DSPM Technology Boosts Proofpoint’s Data Visibility, Control Michael Novinson (MichaelNovinson) • October 29, 2024     Proofpoint will make its first acquisition under CEO Sumit Dhawan, scooping up a data security posture management startup led by a longtime former Qualys executive. See Also: 2024 Threat Landscape: Data Loss is a People Problem The Silicon Valley-based email security vendor said its proposed buy of Normalyze will…

Read More

DevOps Decoded: Prioritizing Security in a Dynamic World

DevOps Decoded: Prioritizing Security in a Dynamic World

Introduction: The urgency of security DevOps security marries development, operations, and security to remove the barriers between software developers and IT operations. Doing so ensures the code runs scales and operates reliably across the organization. While DevOps supports rapid updates, there might be reliance on vulnerabilities from third-party components. Development and IT can reduce flaws and adapt new features earlier while fostering teamwork, making software integration more secure. Traditional vs. Integrated Approach: The conventional model…

Read More

DevOps Decoded: Prioritizing Security in a Dynamic World

DevOps Decoded: Prioritizing Security in a Dynamic World

Introduction: The Urgency of Security DevOps security marries development, operations, and security to remove the barriers between software developers and IT operations. Doing so ensures the code runs scales and operates reliably across the organization. While DevOps supports rapid updates, there might be reliance on vulnerabilities from third-party components. Development and IT can reduce flaws and adapt new features earlier while fostering teamwork, making software integration more secure. Traditional vs. Integrated Approach: The conventional model…

Read More

Obsidian Security Warns of Rising SaaS Threats to Enterprises

Obsidian Security Warns of Rising SaaS Threats to Enterprises

SaaS environments are emerging as an “unaddressed blind spot” in enterprise cyber security for Australian and APAC organisations, according to SaaS security management firm Obsidian Security. This issue is partially attributed to confusion around the shared responsibility model in SaaS contracts. In September, Obsidian Security, which announced that it is expanding operations across Australia and APAC, said it expects a surge in local organisations re-evaluating their SaaS security strategies once they complete ongoing cloud security…

Read More

Proofpoint Sets New Standard for Human-Centric Security with Powerful AI-driven Intelligence, Insights and Integrations

Proofpoint Sets New Standard for Human-Centric Security with Powerful AI-driven Intelligence, Insights and Integrations

Expanded platform capabilities broaden human-centric risk protection to stop threats across a wide range of applications, prevent account takeover, protect information, and drive sustained behavior change Proofpoint, Inc., a leading cybersecurity and compliance company, announced expanded capabilities across its award-winning platform to provide customers with broader, adaptive human-centric security controls. These new solutions and integrations shield organizations from incoming threats across messaging, collaboration and social media apps; secure SaaS applications and identity posture across a vast…

Read More

SOCI Act 2024: Insights on Critical Infrastructure

SOCI Act 2024: Insights on Critical Infrastructure

A rise in ransomware incidents and the embrace of artificial intelligence are considered potential data risks facing Australia’s critical infrastructure organisations, according to a new report. This news comes as new cyber security rules under the Security of Critical Infrastructure Act 2018 come into force in August 2024. The Critical Infrastructure Edition of the 2024 Data Threat Report, by technology organisation Thales, found that ransomware incidents at critical infrastructure organisations are on the rise globally…

Read More

5 Types of IVR Testing Tools and When To Use Each

5 Types of IVR Testing Tools and When To Use Each

IVR is a powerful tool for managing call queues and improving customer satisfaction, but it requires maintenance for optimal use. Regular IVR testing is essential to make sure your system is secure and works as it should. Testing also helps you improve call flows, ensure quality, and understand performance. Here are the different types of IVR testing tools you’ll need in order to run an efficient and successful system. Types of IVR testing tools 1….

Read More

The Critical Role of Data Center Technology in Transforming the Manufacturing Industry

The Critical Role of Data Center Technology in Transforming the Manufacturing Industry

How data centers enhance efficiency, support advanced tech, and ensure data security in manufacturing.  In today’s rapidly evolving digital landscape, data centers are the backbone of IT infrastructure, ensuring the smooth operation of web hosting, cloud computing, data storage, and large-scale enterprise applications. However, the manufacturing industry faces unique challenges and opportunities when it comes to data center technology. This blog will delve into why data center technology is crucial for the manufacturing sector.  Gartner…

Read More

Data breach victims increased by 490% since the first half of 2023

Data breach victims increased by 490% since the first half of 2023

The Identity Theft Resource Center (ITRC) has released a report analyzing H1 data breach incidents for 2024. According to the report, there was a 490% rise in data breach victims in H1 of 2024 compared to H1 of 2023. Yet, Q2 had 732 publicly reported data breaches, which represents a 12% decrease from Q1.  Security leaders weigh in  Stephen Kowski, Field CTO at SlashNext:  “The surge in breach victims is likely due to several large-scale…

Read More
1 2 3 8