Attackers are increasingly using malicious OAuth 2.0 applications to siphon data and access sensitive information from cloud platforms, and mitigating the risks is proving challenging, according to the security firm Proofpoint.
Almost every organization has adopted cloud computing to some extent, and with this great power comes great responsibility. How are cybersecurity leaders managing visibility, access and risk? We asked this exclusive panel of CEOs and CISOs, and they shared frank and thoughtful advice.
All email, cloud, and compliance solutions are not created equal. As organizations make the move to Microsoft 365, many assume that the platform's built-in or bundled features will keep users safe and compliant. But these "good enough" features may not be good enough for your organisation.
Download our e-book to...
Gartner predicts that more than 75% of global organizations will be running containerized applications in production, and it’s no wonder, because containers revolutionize app development, from speed of delivery to scalability.
Learn how containers help organizations save resources and quickly get software to...
Private equity firm Thoma Bravo on Monday announced it had signed a definitive agreement to acquire the cybersecurity and compliance firm Proofpoint in a $12.3 billion all-cash deal.
Rapid7 has acquired Velociraptor, an open-source endpoint-monitoring organization and community that will continue to operate as a stand-alone entity while the security firm adopts some of its technology. Meanwhile, Zscaler had announced a deal to buy Trustdome.
Secured Access Service Edge, or SASE, is no longer a buzzword tossed around by cybersecurity pundits but is a robust, cloud-based service model to enable secure anywhere, anytime access from any device.
In the Are you SASE Ready? 5 Steps for Building Your SASE Roadmap webcast, you will learn how to build a roadmap...
Almost 50% of phishing attacks targeting financial services intend on stealing corporate login credentials.
Cloud reliance has increased mobile vulnerability, as attackers use increasingly complex cyberattacks that go beyond the management capabilities of an MDM. Once attackers have access, they move laterally...
More and more organizations are moving their security tools to the cloud. There are best practices to consider to confidently run applications in the cloud and to integrate security into every phase of a cloud journey. Our panel of experts will share their lessons learned on cloud security and tools.
Join this ISMG...
As cloud computing becomes the new normal for enterprise IT, threats to cloud platforms are growing in both volume and sophistication. And as the market-leading enterprise SaaS platform, Salesforce has become an attractive target for attackers.
Organizations that fail to protect their Salesforce clouds effectively...
View this webinar as we discuss how can organizations throughout Africa maintain security and visibility as employees and customers work from home, and manage the added responsibility this places on the CISO and security team.
View this webinar as we discuss how organizations throughout EMEA maintain security and visibility as employees and customers work from home, and manage the added responsibility this places on the CISO and security team.
Customers of Indian payments platform MobiKwik appear to have gotten a lucky break: A listing for 8.2TB of stolen data pertaining to 99 million customers was withdrawn by a cybercrime forum seller, supposedly because of the public risk posed. MobiKwik continues to deny that it was breached. Who's to be believed?
In its first year, the GigaOm report evaluated vendors and products in the observability space.
According to the report, Splunk earned its ‘Outperformer’ ranking on the list for “massive scalability, sophisticated in-stream analytics and native OpenTelemetry support.”
Read GigaOm Radar for Cloud...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.