Topic: hybrid environments
-
Teradata CEO Steve McMillan: Exclusive Interview Update
Teradata has strengthened its position in the AI market by introducing innovations like the AI Factory and collaborating with clients to develop tailored solutions, such as enhancing fraud detection and customer service. The company addresses growing demand for secure, sovereign, and cost-predict...
Read More » -
Corelight's AWS Flow Monitoring Ends Cloud Blind Spots
Corelight's new Flow Monitoring solution for AWS provides unified network visibility across cloud and hybrid infrastructures, reducing SIEM and storage costs by up to 90% compared to traditional methods. The solution converts high-volume AWS flow data into enriched, security-focused intelligence,...
Read More » -
Vectra AI: Redefining Hybrid Attack Resilience
Vectra AI provides a unified security platform designed to manage threats proactively, respond decisively during incidents, and validate security posture after containment, moving beyond reactive tools. The platform addresses challenges in complex hybrid environments by unifying visibility, inves...
Read More » -
Qilin Ransomware Exploits WSL to Deploy Linux Encryptors
The Qilin ransomware group uses the Windows Subsystem for Linux (WSL) to deploy Linux encryptors on Windows machines, evading detection by security tools designed for Windows threats. They have targeted over 700 organizations across 62 countries, employing remote access tools and BYOVD attacks to...
Read More » -
Uncover Insider Risks with BigID's Activity Explorer
BigID's Activity Explorer addresses fragmented security visibility by centralizing audit logs from diverse cloud and on-premises systems into a single, searchable platform for faster incident response. The tool provides unified auditing across hybrid environments, tracking all identity types—incl...
Read More » -
TLS Deadline: 47 Days to Avert System Outages
Major technology providers are mandating that all public TLS certificates must have a maximum validity of 47 days by 2029, drastically reducing the current 398-day standard to enhance security. This change introduces significant operational challenges, as organizations already struggle with certi...
Read More » -
Master CIS Security Best Practices: Essential Webinar Guide
Cybersecurity professionals can address emerging threats by mastering fundamental protections like CIS Security Best Practices, rather than chasing every new vulnerability. CIS benchmarks offer layered protection by integrating across security dimensions, streamlining compliance and reducing redu...
Read More » -
Automate Identity Governance with Veza Access AuthZ
Veza's Access AuthZ automates identity governance by streamlining access granting and revocation across enterprise systems, targeting the "last mile" of identity management with scalability and compatibility for legacy and custom platforms. The solution addresses inefficiencies in IGA deployments...
Read More » -
Skyhigh Security Unveils Unified Dashboard for Data Visibility & Compliance
Skyhigh Security has launched a centralized dashboard within its Data Security Posture Management suite to provide a real-time, unified view of data security and compliance across hybrid and multi-cloud environments. The tool addresses new U.S. state privacy laws by using AI-driven classification...
Read More » -
Unify Data Security, Recovery & Identity with Commvault Cloud
Commvault Cloud Unity integrates data security, cyber recovery, and identity resilience into a single AI-powered platform for unified data protection across various IT environments. The platform addresses challenges like AI-driven data expansion, disconnected tools, and diverse infrastructures by...
Read More » -
Tufin R25-2 Boosts Network & Cloud Security Automation
Tufin Orchestration Suite R25-2 enhances security by providing expanded visibility, comprehensive automation, and stronger controls across hybrid networks from a unified platform. The update introduces key advancements including improved topology accuracy, streamlined SASE policy control, and enh...
Read More » -
Illumio and Microsoft Partner to Stop Cyber Breaches at Scale
Microsoft has fully implemented Illumio's Insights and Segmentation platform across its entire corporate IT infrastructure, marking a strategic shift toward proactive, AI-driven cybersecurity to prevent threats from spreading. The partnership was driven by Illumio's ability to meet Microsoft's im...
Read More » -
C-Suite's AI Obsession Fuels Critical Security Gaps
Modern organizations face significant security vulnerabilities due to a disconnect between rapid technological adoption and inadequate security practices, with 34% experiencing AI-related breaches. Many companies rely on outdated, reactive metrics like incident frequency, which only assess damage...
Read More » -
Netpoleon, Vectra AI Strengthen ANZ Cybersecurity Alliance
Netpoleon and Vectra AI have expanded their strategic alliance to deliver advanced AI-driven Network Detection and Response solutions across Australia and New Zealand, enhancing cybersecurity capabilities for enterprise clients and government agencies. Vectra AI has been recognized as a Leader in...
Read More » -
Secure Active Directory with UserLock IAM: Product Showcase
UserLock is a modern IAM layer for Microsoft Active Directory that enhances security with granular MFA, contextual access rules, and real-time session monitoring without requiring a disruptive identity overhaul. It provides comprehensive visibility and control by aggregating AD entities into dash...
Read More » -
Axoflow: Unified Security Data Pipeline, Storage & Analytics
Axoflow's Security Data Layer unifies data pipeline and storage solutions to address log management, SIEM optimization, and cost-effective data handling, automating collection, transformation, and tiered storage. The platform offers flexible deployment options, including temporary on-node storage...
Read More » -
Data Center Skills Gap Leading to Cloud Outages
The shortage of skilled data center professionals is increasing cloud outages, with understaffed operations posing significant risks, often overshadowed by AI talent gaps. Recent outages, like Microsoft 365's, reveal vulnerabilities linked to staffing shortages in critical roles such as data cent...
Read More » -
OpenText AI Boosts Enterprise Security for Identity, Data & Apps
OpenText has launched a suite of cybersecurity enhancements that integrate AI into security workflows, unifying protection across identity, data, applications, and forensics with tools like Core Threat Detection and Core Identity Foundation. The CE 25.4 release strengthens compliance with built-i...
Read More » -
Forescout eyeSentry: Continuous Cloud Exposure Management
Forescout launched eyeSentry, a cloud-native platform that helps enterprises identify and manage vulnerabilities across IT, IoT, and IoMT assets, addressing the limitations of traditional security measures in modern networks. A study by Forescout reveals that 65% of connected assets in organizati...
Read More » -
Inside Cisco: The Rebirth of Splunk with Kamal Hathi
Kamal Hathi, Splunk's Senior Vice President, emphasizes that machine data is the "heartbeat of the enterprise," with Splunk serving as a vital monitor for logs and telemetry from diverse sources. The acquisition by Cisco merges Splunk's robust data platform with Cisco's infrastructure, creating a...
Read More » -
Strata Identity: AI Agent Security & Observability Solutions
Strata Identity launched Identity Orchestration for AI Agents, a solution using Maverics identity fabric to provide governance for AI agents in hybrid infrastructures without limiting identity provider flexibility. Traditional IAM systems fail to manage AI agents, which operate dynamicall...
Read More » -
SolarWinds AI Agent Advances Autonomous Operations
SolarWinds has introduced an AI Agent and enhanced AI capabilities to help IT departments achieve autonomous operational resilience by predicting problems, automating responses, and reducing cognitive load on human operators. The AI Agent functions as a digital team member, supporting observabili...
Read More » -
AI's Speed Demands Faster Data Security Now
Generative AI is being rapidly adopted by businesses for innovation, but it introduces significant data security challenges, especially concerning data integrity and confidentiality. The reliance on high-quality data makes AI systems vulnerable to integrity-based threats, such as data tampering, ...
Read More » -
Ransomware Attackers Wipe Azure Data and Backups After Theft
A new wave of cloud-focused ransomware attacks by group Storm-0501 systematically wipes primary data and backups in Microsoft Azure, leaving organizations with no recovery options. The group exploits native cloud functionalities to exfiltrate large volumes of data without on-premises hardware, ma...
Read More » -
The Password Problem We Still Haven't Solved
Identity-related breaches persist due to basic vulnerabilities like reused passwords and insufficient verification, allowing attackers prolonged network access. Passwords remain the dominant authentication method despite intentions to go passwordless, hindered by legacy systems and diverse enviro...
Read More »