Broadcom has agreed to buy cloud and virtualization giant VMware for $61 billion, bringing together the $1.6 billion Symantec and $1 billion VMware security teams. Broadcom will incorporate its existing security offerings into the VMware portfolio and bring them to market under the VMware brand.
Cybersecurity startup Lacework has announced layoffs - affecting 20% of its employees, according to one report - to strengthen its balance sheet, just six months after raising $1.3 billion. The company says it restructured its business in response to a large shift in the public and private markets.
As one might suspect, low-hanging fruit is an easy target for threat actors when it comes to cloud infrastructure. Protect those vulnerable areas with an approach designed for securing cloud environments. The four key tactics are:
Enable runtime protection
Eliminate configuration errors
Leverage a...
While embracing the cloud may grant organizations newfound agility, it can also introduce new vulnerabilities. This white paper covers five critical steps organizations can take to adapt and improve their security approaches in a multi-cloud environment. Leverage these takeaways to secure your organization’s data...
Embracing the cloud is critical to achieving digital transformation initiatives, but for them to be successful, security must transform alongside the business. Keep pace in an evolving landscape of risks by learning how to:
Protect your environment from host to cloud and everywhere in between
Enable runtime...
For organizations seeking a Cloud Workload Protection Platform (CWPP) to secure cloud apps, infrastructure, and data, this buyer's guide outlines the must-have features and how to best assess their effectiveness. Download to learn:
The seven core components of a robust, adversary-focused CWPP
Details on...
Organizations are seeking new, more efficient ways to deliver secure, flexible solutions to their employees, partners and customers. This often means that the focus is no longer with the datacenter, but extends to the public cloud and edge where VPN is being replaced with a SASE approach. With the internet becoming...
The backdrop of this study is: Cloud migration. Remote work. Security at the edge. These are some of the many ways that the COVID-19 pandemic has permanently changed cybersecurity.
At the same time, data security threats continue to rise. Whether it’s new social engineering attacks or the risk of sensitive data...
Check Point is aggressively expanding its salesforce and standing up "rockets" focused on emerging technology areas to land more customer deals outside network security. The company will couple 25% growth in its salesforce with dedicated investments around cloud security, email security and MDR.
AWS has fixed "severe security issues" in hot patches it released last December to address the Log4Shell vulnerability in Java applications and containers. Palo Alto Networks' Unit 42 researchers said containers in server or cluster environments can exploit the patch to take over its underlying host.
As businesses move more of their operations to the cloud, it's essential to have a solid cloud security strategy in place. This whitepaper provides six strategies to keep your cloud-based application secure.
Lee Atchison is what one might call a Cloud Computing OG - after more than three decades building...
Whether you’re on the bleeding edge and fully cloud-native, or running a hybrid cloud environment, odds are you have some visibility gaps. And that’s a problem, because you can’t secure what you can’t see. Securing the cloud environment requires a thoughtful analytical approach to workload and infrastructure...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.