Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cloud data governance and security solutions provider Privacera this week announced that it raised $13.5 million in a Series A founding round. [Read More]
Traceable, a company that provides a security monitoring platform for cloud applications, has emerged from stealth mode with $20 million in funding. [Read More]
Google Cloud introduces Confidential VMs, a Confidential Computing product that leverages a security feature in AMD’s 2nd Gen EPYC CPUs to encrypt data while it is being processed. [Read More]
Cyberattack simulation company XM Cyber has raised $17 million in a Series B funding round, which brings the total raised to $49 million. [Read More]
The necessary and dramatic migration to cloud-based tele-health services will undoubtedly leave the industry more exposed in the future. [Read More]
Threat hunting solutions provider Hunters today announced that it closed a $15 million Series A funding round, which brings the total raised by the company to $20.4 million. [Read More]
Cloud native data security platform Open Raven this week announced that it has closed a $15 million Series A funding, which brings the total raised to date to $19.1 million. [Read More]
IBM has announced a definitive agreement to acquire cloud cybersecurity posture management solutions provider Spanugo. [Read More]
Databases containing sensitive data are frequently left in public Cloud storage without access controls, allowing data to be accessed, downloaded, or manipulated by anyone who finds them. [Read More]
AppOmni's Enterprise Essentials is designed to automate the process of achieving best security practices in each and all the major SaaS platforms, and to provide visibility into what is happening within and between cloud servers. [Read More]

FEATURES, INSIGHTS // Cloud Security

rss icon

Torsten George's picture
The tactics, techniques, and procedures (TTPs) used in the Twitter attack were not much different than in the majority of other data breaches and serve as valuable lessons for designing a modern cyber defense strategy.
Gunter Ollmann's picture
With a diverse and globally distributed workforce, cybersecurity buying decisions will increasingly factor accessibility, usability, and inclusiveness in solution design and operability.
Gunter Ollmann's picture
CISOs are increasingly cognizant of the value deep integration of threat intelligence can bring to cloud protection platforms and bottom-line operational budgets.
Torsten George's picture
Securing multi-cloud and hybrid environments creates an unfamiliar situation for many organizations, in which they’re unsure of who is responsible for controlling access to and securing the underlying infrastructure.
John Maddison's picture
A single, cross-platform security strategy ensures that your cloud security deployment doesn’t replicate the challenges of complexity, siloed solutions, and solution sprawl faced in traditional network security environments.
Gunter Ollmann's picture
The faster in-house network administrators can transition to becoming public cloud network security engineers, architects, or analysts, the faster their organizations can implement digital transformation.
Justin Fier's picture
As executives, developers, security teams, and third-party vendors struggle to exert their influence on digital transformation, threat-actors are exploiting the chaos for their own gain.
Alastair Paterson's picture
If it takes a whole village to raise a child, it takes a whole community of vendors and business partners to build a secure data environment.
Laurence Pitt's picture
“The Cloud Wars” may be dominating IT news headlines, but what does this phrase actually mean? And is it something that an enterprise needs to be concerned with?
Gunter Ollmann's picture
To the surprise of many, public cloud appears to be driving a renaissance in adoption and advancement of managed security service providers (MSSP).