Search

Showing 910 results for: ""cloud+application"".

Investment round pulls in $37.5M for Portnox
SiliconAngle reports that Texas-based network security startup Portnox has procured $37.5 million from a Series B funding round, bringing total investment to $59.5 million, with the newly obtained funds to be allocated toward strengthening its cloud-based zero-trust access control solutions and its ...
4 ways to protect business-critical SAP applications
COMMENTARY: By now, it’s clear that the business of the world gets conducted through mission-critical SAP applications, with SAP customers generating 84% of total global commerce. Of the 100 largest companies, 98 are SAP customers. These companies and 400,000 additional ones depend upon SAP tool...
How security teams can manage shadow APIs
COMMENTARY: Chinese state-sponsored hackers last December breached multiple Treasury Department workstations and accessed unclassified documents by exploiting vulnerabilities in a Remote Support application programming interface (API) from a third-party software provider. The incident should ser...
The Oracle Breach: Data exposure, denial, and cloud security lessons
COMMENTARY: Just a short couple of weeks ago, Oracle Corporation became the center of a major cybersecurity incident involving the unauthorized access and theft of sensitive data from its cloud services. Reports suggest that the compromised information includes 6 million records, credentials, en...
Google’s $32B Wiz deal ends the era of ‘security theater’
https://youtu.be/_5hvBf0bWpU?si=4-YK0hb_5F-jxDcD Google’s $32 billion acquisition of Wiz represents a fundamental shift in the cloud security landscape. The deal, announced Tuesday, is Google’s most aggressive move yet to bolster its cloud security capabilities and compete with Amazon Web Serv...
The Bybit Hack: A crypto heist with cloud security lessons
COMMENTARY: However people look at the cryptocurrency industry, it's clear that the rise of digital currencies has become a primary catalyst for a growing number of high-stakes security incidents, with breaches like the Bybit hack underscoring the critical risks involved. This latest breach, one...
Aviatrix introduces Kubernetes firewall for cloud-native security
Aviatrix has introduced a Kubernetes firewall designed to enhance security in cloud-native environments, where the rapid consumption of IP addresses complicates traditional cybersecurity enforcement, according to Cloud Native Now. The firewall dynamically applies security policies based on Kube...
Microsoft reveals Silk Typhoon supply chain attack
China-backed espionage group Silk Typhoon is leveraging supply chain attacks against IT and cloud services providers to spy on downstream customers. Microsoft Threat Intelligence published a report Wednesday exposing Silk Typhoon’s latest tactics, noting the group’s exploitation of zero-day vuln...

You can skip this ad in 5 seconds