Cisco plans to debut a common design language across its network and security offerings so that products such as Cisco Meraki and Umbrella will no longer look or feel different from one another, says Jeetu Patel, executive vice president and general manager for security and collaboration at Cisco.
Security appliances are targets for sophisticated threat actors who take advantage of devices' limited configuration and logging features, as well as their incompatibility with endpoint detection and response. Suspected Chinese hackers took advantage of a Fortinet zero-day to implant a backdoor.
Appgate has promoted CISO and Federal President Leo Taddeo to CEO and tasked him with capturing zero trust deployment opportunities with the U.S. Defense Department. Appgate has tapped Taddeo to help the Defense Department grant access to users based on context as part of a new zero trust strategy.
Tufin has promoted chief revenue officer Raymond Brancato to CEO and tasked him with simplifying visibility, compliance and automation for AWS and Azure. Brancato plans to focus on helping clients better understand their security posture in cloud, SD-WAN and SASE environments.
How can successful organizations prepare for a possible recession? Most look for ways to reduce costs. Despite inflation and uncertainty, however, organizations aren't slowing their spend on security. Surprising? Maybe not. Savvy executives now see remote work as a cost-savings opportunity, and they're taking...
Experiencing an attack is only a matter of time. Most organizations are unaware when a breach is made, and threats go undetected for months at a time due to a global lack of visibility, especially when it concerns endpoints. But there are X5 firewall practices to prevent a data breach.
Data and users are everywhere: on your network, in the cloud and working remotely.
The result is an incredibly complex network environment that, historically, has significantly increased your business risk.
You can minimize this risk with the right next-generation firewall (NGFW) platform – one that leverages...
How can successful organizations prepare for a possible recession? Most look for ways to reduce costs. Despite inflation and uncertainty, however, organizations aren't slowing their spend on security. Surprising? Maybe not. Savvy executives now see remote work as a cost-savings opportunity, and they're taking...
A surging Fortinet and Check Point have joined perennial stalwart Palo Alto atop the firewall Forrester Wave while Cisco slipped to the strong performers category. The leaderboard now belongs solely to pure-play cybersecurity vendors, with all three having at least 15 years of firewall experience.
Over half of organizations have made changes to their cybersecurity structure over the last two years in response to this shift in business environments, but it’s barely moved the needle. The number of cyberattacks has increased, specifically through third-party vendor access, and businesses are failing to take...
The steady barrage of acquisition reports around publicly traded digital experience vendor Akamai has intensified in recent weeks. The latest salvo landed Monday when StreetInsider reported that the intelligent edge platform provider held talks with a private equity firm about a potential takeover.
Perennial leaders Fortinet and VMware and a surging Cisco set themselves apart from the pack in SD-WAN, according to the latest Gartner Magic Quadrant. Fortinet and VMware again took the gold and silver in ability to execute, with Cisco leapfrogging both Versa and Palo Alto to capture the bronze.
Existing security operations tools focus too much on detecting threats and creating alerts rather than stopping attacks before they happen, says Check Point CEO Gil Shwed, who claims the firm's new MPR and XPR tools will reduce the number of events security analysts handle by at least 90%.
This DNS threat report can help you discover the most recent real-life threats you could be at risk for and how DNS-layer security helps you stop threats before a connection is even made.
Download this report to learn more about;
Ways to enhance your security posture
The lifecycle of malicious cyber-attack...
Today, transformation is continuous— and with it comes an ever-expanding attack surface and a risk landscape that is more challenging than ever.
Modern security should deliver integrated and automated security across your organization so you can shift focus to scaling and innovating your business. Learn how to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.