Tag: Security – VentureBeat

IBM report shows healthcare has a growing cybersecurity gap

IBM’s latest data breach report provides insights into why there’s a growing disconnect between enterprise spending on cybersecurity and record costs for data breaches. This article has been indexed from Security – VentureBeat Read the original article: IBM report shows…

Why the future of APIs must include zero trust

When zero trust becomes a design goal for APIs and devops processes, security becomes strengthened throughout the software development life cycle. This article has been indexed from Security – VentureBeat Read the original article: Why the future of APIs must…

SBOMs: What they are and why organizations need them

As noted by CISA, SBOMs have “emerged as a key building block in software security and software supply chain risk management.” This article has been indexed from Security – VentureBeat Read the original article: SBOMs: What they are and why…

CrowdStrike introduces a new cloud threat hunting service

CrowdStrike unveils a new cloud threat hunting solution to identify hidden and advanced threats in cloud environments. This article has been indexed from Security – VentureBeat Read the original article: CrowdStrike introduces a new cloud threat hunting service

AWS re:Inforce: BigID unveils intelligent access for AWS cloud

BigID announced extended auto-detection and automated discovery for AWS accounts and datasets, with security access controls for AWS cloud. This article has been indexed from Security – VentureBeat Read the original article: AWS re:Inforce: BigID unveils intelligent access for AWS…

Lockbit 3.0 and the ransomware business model

The notorious LockBit ransomware group released its latest ransomware-as-a-service offering, LockBit 3.0 (or Lockbit Black). This article has been indexed from Security – VentureBeat Read the original article: Lockbit 3.0 and the ransomware business model

Confidential computing: A quarantine for the digital age

Confidential computing is an emerging cloud computing technology that can isolate and protect data while it is being processed. This article has been indexed from Security – VentureBeat Read the original article: Confidential computing: A quarantine for the digital age

Coalfire’s analysis on the 2022 software supply chain

Coalfire’s recent report on software supply chain risk reveals budget increases, and growing enterprise demand for more testing, training and process improvements to better protect digital assets in consideration of the gravity of software supply chain risk. This article has…

Forrester’s best practices for zero-trust microsegmentation

Microsegmentation can be difficult to implement, but it doesn’t have to be. Forrester surveyed its clients for these best practices. This article has been indexed from Security – VentureBeat Read the original article: Forrester’s best practices for zero-trust microsegmentation

Kudelski secures IoT hardware lifecycle

Kudelski, a Swiss security firm, has launched a Secure IP portfolio for IoT products. This article has been indexed from Security – VentureBeat Read the original article: Kudelski secures IoT hardware lifecycle

5 ways AI is detecting and preventing identity fraud

2022 has been a record-setting year for identity fraud. Here are five ways to detect and prevent it. This article has been indexed from Security – VentureBeat Read the original article: 5 ways AI is detecting and preventing identity fraud

The current state of zero-trust cloud security

A new survey indicates there are many motivators for cloud transformation, but orgs still face barriers in securing cloud environments. This article has been indexed from Security – VentureBeat Read the original article: The current state of zero-trust cloud security

Hackers leaked two billion usernames and passwords in 2021

The 2022 Forgerock Consumer Identity Breach report finds that hackers leaked two billion usernames and passwords last year. This article has been indexed from Security – VentureBeat Read the original article: Hackers leaked two billion usernames and passwords in 2021

Darktrace launches new family of security AI tools

Darktrace announces the launch of a new family of security AI tools that use AI that can “think like an attacker.” This article has been indexed from Security – VentureBeat Read the original article: Darktrace launches new family of security…

Building a business case for zero-trust, multicloud security

Building a business case for securing multicloud configurations needs to surpass the costs and benefits, while recognizing that public clouds lack advanced zero-trust features and unified reporting. This article has been indexed from Security – VentureBeat Read the original article:…

5 data privacy imperatives for enterprise leaders

For data-informed decision-making and strategic execution, enterprise leaders need to change how they think about data and how it is managed. This article has been indexed from Security – VentureBeat Read the original article: 5 data privacy imperatives for enterprise…

DevSecOps: What enterprises need to know

DevSecOps seeks to address development, security, and operations simultaneously through the full application lifecycle. This article has been indexed from Security – VentureBeat Read the original article: DevSecOps: What enterprises need to know

Microsoft pauses macro security plan, unclear on why

Security experts have praised Microsoft’s decision as an important step in preventing malware from infiltrating enterprise and home networks. This article has been indexed from Security – VentureBeat Read the original article: Microsoft pauses macro security plan, unclear on why

Juniper Networks infuses AI to pump up automation capabilities

Juniper Networks’ most recent set of announcements builds on current capabilities and advances its “Experience-First Networking” vision. This article has been indexed from Security – VentureBeat Read the original article: Juniper Networks infuses AI to pump up automation capabilities

DDR: Comprehensive enterprise data security made easy

DDR, a new data-centric approach to cybersecurity, can provide instant visibility into data stores and real-time protection and response. This article has been indexed from Security – VentureBeat Read the original article: DDR: Comprehensive enterprise data security made easy

Understanding the current social engineering threat landscape

Companies can have all the best security tools, but for threats driven by human actions and social engineering, they remain vulnerable. This article has been indexed from Security – VentureBeat Read the original article: Understanding the current social engineering threat…

Why more orgs are embracing the alternative cloud

Research shows that more organizations are moving away from the big 3 public cloud vendors toward alternative cloud solutions. This article has been indexed from Security – VentureBeat Read the original article: Why more orgs are embracing the alternative cloud

Struggling with endpoint security? How to get it right

Report: Enterprises struggle to maintain visibility and control of their endpoint devices, leading to security breaches and outside attacks. This article has been indexed from Security – VentureBeat Read the original article: Struggling with endpoint security? How to get it…

Deloitte launches a new zero-trust access managed service

Deloitte announces the launch of a new zero-trust access managed service that will provide P2P connectivity between users and apps. This article has been indexed from Security – VentureBeat Read the original article: Deloitte launches a new zero-trust access managed…

Kaseya, one year later: What have we learned?

The attack on Kaseya reveals that ransomware-as-a-Service (RaaS) is becoming the world’s fastest-growing multilevel marketing platform. This article has been indexed from Security – VentureBeat Read the original article: Kaseya, one year later: What have we learned?

How emerging tech can protect your customers’ data privacy

As management of our confidential data becomes increasingly distributed, we must understand how the technology behind the scenes works. This article has been indexed from Security – VentureBeat Read the original article: How emerging tech can protect your customers’ data…

The future of AIops in the enterprise

AI and AIops are the next and ultimate step in the evolution of automation in doing tasks on par with human domain experts. This article has been indexed from Security – VentureBeat Read the original article: The future of AIops…

Demystifying zero-trust network access 2.0

Existing zero-trust network access (ZTNA) approaches have widening gaps, leaving threat surfaces unprotected, but ZTNA 2.0 aims to fill those gaps. This article has been indexed from Security – VentureBeat Read the original article: Demystifying zero-trust network access 2.0

NIST announces four quantum-resistant algorithms

NIST announces which four algorithms will become part of its post-quantum cryptography standard for general encryption and digital signatures. This article has been indexed from Security – VentureBeat Read the original article: NIST announces four quantum-resistant algorithms

Zscaler gives security a shot of AI

Zscaler’s use of AI/ML is critical, because the volume of data generated by security systems has long passed the point of human analysis. This article has been indexed from Security – VentureBeat Read the original article: Zscaler gives security a…

DoD announces launch of a new bug bounty program

The Department of Defense (DoD) announces the launch of a new bug bounty program in partnership with the CDAO and DC3. This article has been indexed from Security – VentureBeat Read the original article: DoD announces launch of a new…

Why you should care about privacy computing technologies

A deep-tech VC’s perspective on privacy computing: a solution for performing data computations without risking the privacy of the data. This article has been indexed from Security – VentureBeat Read the original article: Why you should care about privacy computing…

Top 10 cybersecurity colleges in the U.S. in 2022

Here are our picks for the top cybersecurity training, courses and opportunities available from colleges across the U.S. This article has been indexed from Security – VentureBeat Read the original article: Top 10 cybersecurity colleges in the U.S. in 2022

Dark data: Managing the data you can’t see

Dark data endangers an enterprise’s security and compliance efforts, making it important to address the foundational issues that cause it, This article has been indexed from Security – VentureBeat Read the original article: Dark data: Managing the data you can’t…

Google announces big update to Password Manager

A Google blog post announces new updates to Password Manager that will give users the ability to automatically update weak passwords. This article has been indexed from Security – VentureBeat Read the original article: Google announces big update to Password…