Firewall maker Check Point Software in an earnings call touted a strong fourth quarter - and a future that won't involve co-founder Gil Shwed as company CEO. Shwed has headed the publicly traded, $19 billion Israeli pure-play cybersecurity company for three decades.
Existing security operations tools focus too much on detecting threats and creating alerts rather than stopping attacks before they happen, says Check Point CEO Gil Shwed, who claims the firm's new MPR and XPR tools will reduce the number of events security analysts handle by at least 90%.
James Foster has been swimming against the current for months, taking ZeroFox public by merging with a special-purpose acquisition company despite the worsening economic conditions. The Nasdaq Stock Exchange listing makes ZeroFox the first cybersecurity company to go public in all of 2022.
Fortinet has raised prices on products and services to address macroeconomic challenges including shipping delays, longer activation timelines and the suspension of sales in Russia. The company says price hikes have more than offset supply chain and geopolitical headwinds in recent months.
As the risks to IT and OT converge, organizations must use "zero trust" to verify user identities and build effective monitoring capabilities to track the behavior of privileged users, say Kartik Shahani of Tenable and Rohan Vaidya of CyberArk.
If your solution is out at sea, it’s time to learn more about improving integration. Microsegmentation can allow security architects to divide data centers into unique security segments (as far down as individual workload levels) but requires integration.
Join us in this webinar where Illumio’s Field CTO...
A hacker breached a Florida city's water treatment network, increasing the amount of lye that would be added to the water to a dangerous level. Officials say they caught the change immediately and reversed it. Reuters reports that the system was accessed via the city's TeamViewer remote access software.
Kubernetes brings some specific security requirements to the table. For a managed Kubernetes service like GKE, users have three main layers that require action: the workloads running on the cluster, the cluster and its components, and the underlying GCP services on which the cluster depends, and more.
Lack of...
The increasing use of internet-connected devices in manufacturing facilities is opening up new ways for hackers to target so-called "smart" factories with unconventional attack methods, according to an analysis by security firm Trend Micro and the Polytechnic University of Milan.
Security experts and law enforcement officials have long argued that paying ransoms doesn't pay. For starters, it directly funds the cybercrime ecosystem and makes it attractive for criminals to keep launching ransomware attacks.
Time for a fresh edition of "learn from how others get breached" focusing on Equifax. The goal is not blame, but rather to highlight specific missteps so others can avoid making the same mistakes. The Equifax breach offers a plethora of takeaways to help organizations better repel attackers.
Proof-of-concept code has been released to exploit a severe Citrix vulnerability present in tens of thousands of enterprises. Citrix says it's developing permanent patches but that enterprises should use its mitigation guidance. In the meantime, attackers are hunting for vulnerable machines.
The Cyber Security Agency of Singapore has come up with an operational technology and cybersecurity master plan aimed at building a secure and resilience ecosystem to protect critical infrastructure. But will implementation prove feasible?
Building a public/private partnership for cybersecurity is time consuming and resource-intensive, but such a model can play a key role in protecting critical infrastructure, says Ravikishor Mundada, CEO of the Center of Cybersecurity Excellence, Government of Karnataka.
With the volume of data breaches and cyberattacks continuing to rise, organizations are increasingly relying on breach and attack simulation tools to provide more consistent and automated validation of controls, says Cymulate's Tim Ager.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.