New Voice of the CISO Report Uncovers Top Security Concerns Across North America, EMEA, and APAC (Proofpoint)
In our inaugural 2021 Voice of the CISO Report, we capture insights from 1,400 security leaders from around the world. The survey results present some interesting findings.
Check Point Software announces new Microsoft integrations at RSA® Conference 2021 to make enterprises more resilient
The instant switch to remote work over a year ago challenged this resilience, presenting security issues with accessing corporate data and applications. To meet these challenges, Check Point recently released several security solutions on Microsoft’s marketplaces and app galleries.
Evolving IT service delivery to suit modern digital business, workplace needs (Citrix)
Digitally determined companies and IT admins see the current situation as an opportunity to further streamline and optimize how they manage desktop and app delivery.
Infrastructure is still an attractive attack vector (F5)
For as long as there is a need for infrastructure—and that means the foreseeable future—there will exist a need to protect it.
PCI Security Standards Secure Software Standard and Program Version 1.1
This version includes a new Terminal Software Module that contains requirements for software used on PCI-approved PIN Transaction Security (PTS) Point-of-Interaction (POI) devices.
CrowdStrike Falcon Continues Impressive Record with Highest AAA Rating in SE Labs Enterprise Endpoint Protection Report
Accurately detecting threats is critical. CrowdStrike ingests and analyzes more than 5 trillion endpoint-related events in real-time every week, making the Falcon security cloud platform one of the industry’s most advanced sources of truth for security insight and adversary intelligence.
SD-WAN is Essential for any SASE Deployment (Fortinet)
It’s important to remember that when you look to implement a SASE framework, you should look for a solution that converges security and networking — not just stitching them together, but having a unified policy so it’s easier for them to transform.
Microsoft, Adobe Exploits Top List of Crooks’ Wish List
According to researchers Microsoft products made up a whopping 47 percent of the requests, compared with, say, internet of things (IoT) exploits, which only accounted for 5 percent.
Bounce Back Faster with Tiered Backups and Bunkers (Pure Storage)
Data protection strategies can’t just cover the before of an event—they have to meet expectations after an event, too.
Opportunistic vs. Targeted Ransomware Attacks (CyberArk)
U.S. Acting Deputy Attorney General John Carlin recently told the Wall Street Journal, “By any measure, 2020 was the worst year ever when it comes to ransomware and related extortion events.”
CSA Releases New Cloud Incident Response and Security Guidelines for APIs
The Cloud Security Alliance released two new research documents to provide guidance on Cloud Incident Response and Consuming and Providing APIs.
Palo Alto Networks Introduces Complete Zero Trust Network Security
To secure access in today’s hybrid workplaces, we’re releasing an integrated cloud access security broker (CASB) that keeps pace with the explosion of software-as-a-service (SaaS) applications.
This ransomware-spreading malware botnet just won't go away
The botnet has been known for using old-fashioned worms that spread via removable USB drives and instant messaging apps, began diversifying its infrastructure in recent years to become more resilient and to deliver more dangerous payloads.