Networking and security have traditionally been separate solutions layered into complex architectures. While some vendors attempted to combine security into their networking gear, this often meant throwing more boxes at customers or stitching basic filtering into their gear. This further complicated corporate infrastructures by deploying multiple tools from multiple vendors, and none of them seamlessly worked well together or shared context. Realizing this chaos required a better solution. Several vendors pursued efforts to bring networking and security together in a single solution, to varying degrees of success. And in 2019, Gartner defined these efforts as SASE, or Secure Access Service Edge.
- By Demetris Booth
- Jan 18, 2024
Third Wave Innovations, an integrated risk solutions provider for network and security operations, today announced a strategic partnership with Precision Computer Services (PCS), a nationally recognized IT systems integrator.
Cyber incidents such as ransomware attacks, data breaches, and IT disruptions are the biggest worry for companies globally in 2024, according to the Allianz Risk Barometer. The closely interlinked peril of Business interruption ranks second. Natural catastrophes (up from #6 to #3 year-on-year), Fire, explosion (up from #9 to #6), and Political risks and violence (up from #10 to #8) are the biggest risers in the latest compilation of the top global business risks, based on the insights of more than 3,000 risk management professionals.
Netwrix, a cybersecurity vendor that makes data security easy, recently revealed additional findings for the financial, banking and accounting sector from its survey of 1,610 IT and security professionals from more than 100 countries. According to the report, within the last 12 months, 77% of financial organizations detected a cyberattack, compared to 68% among other industries. Phishing and ransomware were the most common types of attacks across all sectors.
Axiad, a provider of organization-wide passwordless orchestration, today announced the results of its 2023 State of Authentication Survey. The survey investigated the types of cyberattacks respondents were most afraid of and prepared for, how their organizations held up against password-based attacks, if and why companies are still using passwords, and what cybersecurity technologies companies plan to use in 2024.
Security Today is pleased to announce the 2023 CyberSecured Awards winners. Fifteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today.
Cybersixgill, a cyber threat intelligence data provider, announced today new features and capabilities that take security teams’ threat detection and mitigation efforts to new levels, helping them identify and mitigate vulnerabilities and detect and stop threats more quickly and effectively than ever before.
Panther Labs, a cybersecurity innovator for detection and response at scale, today announced the launch of its new Security Data Lake Search and Splunk Integration capabilities. These offerings mark a critical leap forward in managing security risks in today’s cloud-first landscape.
With the growing frequency, sophistication and magnitude of cyberattacks around the world, the Texas A&M Engineering Extension Service (TEEX) has established a new cybersecurity certificate series to help the public and private sector protect their organizations and data.
Interface Systems, a managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, today announced that Sean Foley has been appointed to the role of chief revenue officer and Sunita Mani to the role of chief marketing officer.
On July 26, the US Securities & Exchange Commission (SEC) released a new rule aimed to increase consistency of how and when material cybersecurity information is disclosed to investors and the public. The rule became effective Sept 5, 2023.
According to Cybersixgill, threat research experts, AI’s evolution will continually improve both organizations’ cyber defense efforts and cybercriminal activities. At the same time, increasingly complex regulatory requirements, continued consolidation of cybersecurity tools, a widening attack surface, and heightened global geopolitical issues will all play a significant role in driving the direction of cybersecurity.
The National Security Agency (NSA) and U.S. partners have released a new report describing the latest techniques in phishing attacks and the defenses organizations can deploy against them.
SlashNext, provider of SaaS-based Integrated Cloud Messaging Security across email, web, and mobile, today released the SlashNext State of Phishing Report for 2023.
Earlier this month, MEF, a global industry association of network, cloud, security and technology providers, hosted its first annual Global Network-as-a-Service Event (GNE). The goal of GNE was to bring together top executives from the emerging NaaS (Network-as-a-Service) ecosystem to discuss the latest trends and technologies to help companies achieve their digital transformation goals.
- By Pascal Menezes
- Oct 27, 2023
Veritas Technologies, a provider of secure multi-cloud data management, recently released findings of new research that shows 45% of organizations may be miscalculating the severity of threats to their business. The study, Data Risk Management: The State of the Market—Cyber to Compliance, which polled 1,600 executives and IT practitioners across 13 global markets, provides insights into the most pressing risks, their impacts and how organizations plan to navigate them.
Many healthcare information systems (HIS) applications rely on APIs to exchange data and interact with external systems. With the increasing adoption of cloud computing, the usage of APIs has grown exponentially in healthcare
CISO Global, an industry leader as a managed cybersecurity and compliance provider, has been added to the PCI Marketplace as a PCI Quality Security Assessor (QSA).
Damaging cyber intrusions are far too common, causing harm to public and private organizations across every sector. While some of these intrusions use novel methods to gain access or move across a network, many exploit common misconfigurations. By ensuring strong configurations, we can significantly reduce the prevalence and impact of cyber-attacks.