Tag: Security News | VentureBeat

Coro raises $75M for all-in-one platform to tackle SOC complexity

Coro announces it has raised $75 million for an all-in-one cybersecurity platform designed to address SOC complexity. This article has been indexed from Security News | VentureBeat Read the original article: Coro raises $75M for all-in-one platform to tackle SOC…

The top 20 zero-trust startups to watch in 2023

With venture funding cooling off but cybersecurity needs increasing, here are our top 20 zero trust startups to watch in 2023. This article has been indexed from Security News | VentureBeat Read the original article: The top 20 zero-trust startups…

Dashlane releases ‘first’ SSO powered by confidential computing

Dashlane Confidential SSO uses virtual machines to create an encrypted confidential computing environment for password management. This article has been indexed from Security News | VentureBeat Read the original article: Dashlane releases ‘first’ SSO powered by confidential computing

Why unifying endpoints and identities is the future of zero trust

The many reasons combining endpoint security and identity security on one platform is becoming key to a successful zero trust strategy. This article has been indexed from Security News | VentureBeat Read the original article: Why unifying endpoints and identities…

How mass layoffs can create new risks for corporate security

With more organizations like Meta announcing layoffs, security teams need to be prepared to address attacks from malicious insiders. This article has been indexed from Security News | VentureBeat Read the original article: How mass layoffs can create new risks…

Managing machine identities in a zero-trust world

Survey results suggest the importance of a data-driven approach to managing machine identities at scale in order to strengthen zero trust. This article has been indexed from Security News | VentureBeat Read the original article: Managing machine identities in a…

83% of organizations paid up in ransomware attacks

Research released by security vendor ExtraHop finds that 83% of breached organizations paid hackers to end ransomware attacks. This article has been indexed from Security News | VentureBeat Read the original article: 83% of organizations paid up in ransomware attacks

Defending against backdoor attacks with zero trust

Defining a zero trust framework that fits an enterprise’s business strategy is table stakes. And it need not be expensive to be effective. This article has been indexed from Security News | VentureBeat Read the original article: Defending against backdoor…

GPT has entered the security threat intelligence chat

Recorded Future announces the release of a GPT-powered threat intelligence tool that can generate real-time reports. This article has been indexed from Security News | VentureBeat Read the original article: GPT has entered the security threat intelligence chat

How machine learning can help crack the IT security problem

By leveraging machine learning-based security tools and third-party experts, organizations can strike the perfect cybersecurity balance. This article has been indexed from Security News | VentureBeat Read the original article: How machine learning can help crack the IT security problem

Ambient computing is coming; security teams may not be ready

We’ve already welcomed smart devices into our homes and lives. Ambient computing is just the next step — but it comes with security risks. This article has been indexed from Security News | VentureBeat Read the original article: Ambient computing…

A third of organizations admit to covering up data breaches

Research released by Bitdefender finds that almost a third of IT and security professionals (29.9%) admit to covering up data breaches. This article has been indexed from Security News | VentureBeat Read the original article: A third of organizations admit…

The advantages of an anti-exec leadership team

Meet the anti-exec team, where every leader is personally invested and feels responsible for making products better and driving growth. This article has been indexed from Security News | VentureBeat Read the original article: The advantages of an anti-exec leadership…

How microservices have transformed enterprise security

Why microservices allow DevOps and security teams to respond to security threats far faster and more effectively than ever before. This article has been indexed from Security News | VentureBeat Read the original article: How microservices have transformed enterprise security

Why zero trust depends on solving identity sprawl

How an identity data fabric provides the unified identity approach needed to implement zero trust effectively. This article has been indexed from Security News | VentureBeat Read the original article: Why zero trust depends on solving identity sprawl

GPT-4 kicks AI security risks into higher gear

GPT-4 has been released into the wild. But while it offers new capabilities and possibilities, it brings evolving security threats, too. This article has been indexed from Security News | VentureBeat Read the original article: GPT-4 kicks AI security risks…

How to prepare for a world without passwords

Passkey technology will soon be ubiquitous. Until then, a combination of good password hygiene and MFA is our safest bet. This article has been indexed from Security News | VentureBeat Read the original article: How to prepare for a world…

Diffusion models can be contaminated with backdoors, study finds

New research shows that threat actors can easily implant backdoors in diffusion models used in DALL-E 2 and open-source text-to-image models. This article has been indexed from Security News | VentureBeat Read the original article: Diffusion models can be contaminated…

How to slam the brakes on account takeover fraud

Account takeover fraud is on the rise. These strategies that can substantially reduce the amount of ATO fraud your business faces. This article has been indexed from Security News | VentureBeat Read the original article: How to slam the brakes…

Analysts share 8 ChatGPT security predictions for 2023

Top cybersecurity insights share their predictions for how ChatGPT will change the cybersecurity threat landscape in 2023. This article has been indexed from Security News | VentureBeat Read the original article: Analysts share 8 ChatGPT security predictions for 2023

4 key trends from the Gartner IAM Summit 2023

Experts reveal how to harden IAM (identity and access management) by adopting an identity-first security approach, ITDR, CIEM and more. This article has been indexed from Security News | VentureBeat Read the original article: 4 key trends from the Gartner…

A roadmap to zero-trust maturity: 6 key insights from Forrester

From data discovery to microsegmentation, Forrester offers guidance for achieving the next stage of zero trust maturity. This article has been indexed from Security News | VentureBeat Read the original article: A roadmap to zero-trust maturity: 6 key insights from…

Oleria raises $8M to make multi-factor authentication adaptive

Oleria announces it has raised $8 million in funding for an adaptive authentication solution for simplifying multi-factor authentication This article has been indexed from Security News | VentureBeat Read the original article: Oleria raises $8M to make multi-factor authentication adaptive

Defining endpoint security in a zero-trust world

Increased cloud attacks and the need for stronger endpoint security are making 2023 more challenging than many CISOs budgeted for. This article has been indexed from Security News | VentureBeat Read the original article: Defining endpoint security in a zero-trust…

Twitter’s fraud problem isn’t too hard to solve

When first rolled out, Twitter Blue was a disaster. But it offers opportunity to break new ground for social media identity verification. This article has been indexed from Security News | VentureBeat Read the original article: Twitter’s fraud problem isn’t…

Innovating during a regulatory wave

With adequate tools and workflows, financial institutions can smartly adjust to regulation and minimize risk while maximizing innovation. This article has been indexed from Security News | VentureBeat Read the original article: Innovating during a regulatory wave

How access management helps protect identities in the cloud

Facing attacks on access management systems, CISOs are under pressure to consolidate tech stacks and stop identity-driven breach attempts. This article has been indexed from Security News | VentureBeat Read the original article: How access management helps protect identities in…

How ChatGPT can become a security expert’s copilot

Sophos unveils new research examining how ChatGPT can be use as a security expert’s copilot to detect cyber threats. This article has been indexed from Security News | VentureBeat Read the original article: How ChatGPT can become a security expert’s…

Forget the hybrid cloud; it’s time for the confidential cloud

The hybrid cloud needs additional security protections to work; at OC3 industry leaders discuss how the confidential cloud can help. This article has been indexed from Security News | VentureBeat Read the original article: Forget the hybrid cloud; it’s time…

CrowdStrike report shows identities under siege, cloud data theft up

CrowdStrike finds cyberattackers targeting authentication processes, compromising identities in the cloud, and becoming access brokers. This article has been indexed from Security News | VentureBeat Read the original article: CrowdStrike report shows identities under siege, cloud data theft up

Report: Hackers leaked over 721 million passwords in 2022

Research found over 721 million passwords were leaked online in 2022, and 72% of exposed users were still using compromised credentials. This article has been indexed from Security News | VentureBeat Read the original article: Report: Hackers leaked over 721…

Security risks threaten the benefits of the edge

The highly distributed compute power of the edge provides opportunity for more powerful cyberattacks. How enterprises can arm themselves. This article has been indexed from Security News | VentureBeat Read the original article: Security risks threaten the benefits of the…

What is confidential computing exactly? Fortanix CEO explains

VentureBeat conducts a Q&A with Anand Kashyap, cofounder and CEO of Fortanix, who explains what confidential computing is and how it works. This article has been indexed from Security News | VentureBeat Read the original article: What is confidential computing…

Trust emerges as the path forward for digital assets in 2023

Digital assets can be a powerful, disruptive technology. Why orgs that address consumer needs and concerns will have a distinct advantage. This article has been indexed from Security News | VentureBeat Read the original article: Trust emerges as the path…

Access management must get stronger in a zero-trust world

Why access management done right is the fuel for successful digital transformation in a zero-trust world — and how CISOs are getting it done. This article has been indexed from Security News | VentureBeat Read the original article: Access management…

Why machine identity management should be your focus in 2023

Reduced budgets should not dictate security posture. Why organizations must make security and machine identity management a priority now. This article has been indexed from Security News | VentureBeat Read the original article: Why machine identity management should be your…

Modernizing identity access management with zero trust

Why and how orgs should focus on identity data and real-time activity monitoring to deliver the potential of zero trust (ZTNA) This article has been indexed from Security News | VentureBeat Read the original article: Modernizing identity access management with…

How to avoid billion-dollar fines due to unsecured messaging apps

End-to-end encryption is one key to securing an enterprise’s internal messaging. Read about encryption and other essentials here. This article has been indexed from Security News | VentureBeat Read the original article: How to avoid billion-dollar fines due to unsecured…

Creating secure customer experiences with zero trust

Trust is the revenue multiplier that businesses need to survive a downturn. Why zero trust is a business enabler and a board-level priority. This article has been indexed from Security News | VentureBeat Read the original article: Creating secure customer experiences…

NCA executive director shares top cybersecurity risks in 2023

Lisa Plaggemier of the National Cybersecurity Alliance talks the top cybersecurity risks in 2023, and how CISOs can mitigate them. This article has been indexed from Security News | VentureBeat Read the original article: NCA executive director shares top cybersecurity…

Should organizations swear off open-source software altogether?

While open-source software is too common to eliminate, here are steps organizations can take to mitigate the associated risk. This article has been indexed from Security News | VentureBeat Read the original article: Should organizations swear off open-source software altogether?

The importance of synchronizing siloed security solutions

Integrated siloed cybersecurity is key to cyber-defense. Security leaders should drive vendors to provide highly integrated solutions. This article has been indexed from Security News | VentureBeat Read the original article: The importance of synchronizing siloed security solutions

Cloud future overcast by security concerns

Security breaches are common in the cloud. Orgs must understand cloud threats and best practices to protect valuable cloud-hosted workloads. This article has been indexed from Security News | VentureBeat Read the original article: Cloud future overcast by security concerns

What will security and threat prevention look like in Web3?

Web3 offers great promise when it comes to decentralization and data ownership. And threat detection and prevention will evolve, too. This article has been indexed from Security News | VentureBeat Read the original article: What will security and threat prevention…

5 key cybersecurity trends for 2023

As cyber threats continue to evolve, modern cyber defense must be flexible and adjustable. Top cybersecurity trends to expect in 2023. This article has been indexed from Security News | VentureBeat Read the original article: 5 key cybersecurity trends for…