CNAPP buyers guide: Top tools comparedCloud security continues to be a vexing situation, and the tool set continues to become more complex, riddled with acronyms representing...
Day: September 22, 2022
One-third of enterprises don’t encrypt sensitive data in the cloud
One-third of enterprises don’t encrypt sensitive data in the cloudWhile most organizations list cloud security as one of their top IT priorities, they continue to ignore...
Q-Scout aims for smartphone security without the intrusiveness
Q-Scout aims for smartphone security without the intrusivenessMobile security firm Quokka—which earlier this week rebranded from its previous name, Kryptowire—is launching a new smartphone protection product...
Recommended security resources for Microsoft Active Directory
Recommended security resources for Microsoft Active DirectoryMany firms are still firmly in an Active Directory (AD) world. They may have moved some applications to the cloud,...
Iranian cyberspies use multi-persona impersonation in phishing threads
Iranian cyberspies use multi-persona impersonation in phishing threadsOne of the most prolific state-sponsored Iranian cyber espionage groups is targeting researchers from different fields by setting up...
One in 10 employees leaks sensitive company data every 6 months: report
One in 10 employees leaks sensitive company data every 6 months: reportInsider threats are an ongoing menace that enterprise security teams need to handle. It's a...
New Sysdig cloud security software prioritizes risk, cuts remediation time
New Sysdig cloud security software prioritizes risk, cuts remediation timeUnified container and cloud security firm Sysdig on Wednesday launched its cloud security posture management (CSPM) offering,...
AutoRabit launches devsecops tool for Salesforce environments
AutoRabit launches devsecops tool for Salesforce environmentsDevsecops firm AutoRabit is trying to address security issues arising from policy changes and misconfigurations in Salesforce environments with a...
Cybersecurity startup launches mobile app to protect against phishing attacks
Cybersecurity startup launches mobile app to protect against phishing attacksCybersecurity startup novoShield has launched an enterprise-grade mobile security application, designed to protect users from mobile phishing...
Excess privilege in the cloud is a universal security problem, IBM says
Excess privilege in the cloud is a universal security problem, IBM saysExcess privilege granted to cloud identities is a key component in 99% of all security...
Russia’s cyber future connected at the waist to Soviet military industrial complex
Russia’s cyber future connected at the waist to Soviet military industrial complexThe Center for European Policy Analysis (CEPA) recently published a 38-page study, Russian Cyberwarfare: Unpacking...
U.S. government issues guidance for developers to secure the software supply chain: Key takeaways
U.S. government issues guidance for developers to secure the software supply chain: Key takeawaysSoftware supply chain attacks are on the rise, as cited in the Cloud...