Two federal indictments against APT41, a Chinese state-sponsored hacking group, haven't slowed down its operations, the U.S. government acknowledges in a warning telling the healthcare sector to be vigilant about the threat actor. The hackers are believed to be at large, likely in China.
Perennial leaders Fortinet and VMware and a surging Cisco set themselves apart from the pack in SD-WAN, according to the latest Gartner Magic Quadrant. Fortinet and VMware again took the gold and silver in ability to execute, with Cisco leapfrogging both Versa and Palo Alto to capture the bronze.
As budgets tighten in anticipation of economic hardships, cybersecurity threats only continue to grow. Bill Bernard, CISSP of Deepwatch, advises security leaders to consider how senior management and the board view cybersecurity and then adjust how you prioritize people, technology and managed services.
Private equity firm Vector Capital invested $100 million in Malwarebytes a month after the antivirus stalwart laid off 125 employees to focus on smaller customers. The funds will help the vendor reduce clients' attack surfaces and accelerate momentum with MSPs and channel partners.
Darktrace's Cybersprint acquisition allowed the cybersecurity AI vendor to move from focusing solely on internal threats to also defending the external attack surface, Nicole Eagan says. The company says AI will give an outside-in view of the victim and simulate how the attacker will behave.
The latest edition of the ISMG Security Report discusses financial giant Morgan Stanley's failure to invest in proper hard drive destruction oversight, the future of ransomware and the gangs that have attacked organizations in recent years, and the methods required to secure new payments systems.
Whoever stole $160 million from Wintermute, the cryptocurrency trading firm's CEO, Evgeny Gaevoy, would like the money back, minus 10% that's on the house. A hack of the London-based crypto market maker rocked the company, which supplies liquidity to cryptocurrency trading.
SentinelOne is taking on top rival CrowdStrike in the venture arena, unveiling a $100 million fund to support security and data startups of all sizes. S Ventures will give the company broader reach in adjacent markets and enable high-value integrations that can grow over time.
Many modern apps are not compatible with traditional identity and access management (IAM) platforms, forcing reliance on makeshift systems that are difficult to manage. By applying microperimenters around each application organizations can simplify processes around IAM and significantly reduce opportunities for data...
With risks now persisting everywhere, organizations are turning towards Zero Trust delivered in the cloud to adapt. In a single-pass architecture, traffic is verified, filtered, inspected, and isolated from threats.
Download this whitepaper to learn about:
A faster, easier, and safer way to connect...
By 2025, Gartner predicts that 85% of enterprises will run their businesses with a cloud-first principle. As a result, many organizations are driven to find better ways of consolidating security products across their SaaS landscape. As SaaS adoption increases, so does the attack surface organizations need to protect....
Deep Instinct has tasked the former CEO of Palo Alto Networks and COO of Zscaler with reworking the company's go-to-market strategy to better serve large enterprises. The company has moved longtime executive Lane Bess from the executive chair to the CEO's seat to recruit experienced sales leaders.
A newly uncovered vulnerability in a wallet addressing tool may be the reason a hacker stole $160 million in digital assets from market maker Wintermute. The company's CEO tweeted that the company is solvent and will honor requests to repay lenders.
CrowdStrike has purchased external attack surface management startup Reposify to help organizations detect and eliminate risk from vulnerable and unknown assets. This deal will allow CrowdStrike to combine its insights on endpoints and IT environments with Reposify's internet-scanning capabilities.
There are many factors to consider when choosing a SAST tool. DevSecOps has transformed the code security from a siloed, IT centric task to the continuous responsibility of development teams. As security becomes a central concern for developers, security professionals, and operations teams, the process for selecting a...