Topic: hybrid environments

  • Teradata CEO Steve McMillan: Exclusive Interview Update

    Teradata CEO Steve McMillan: Exclusive Interview Update

    Teradata has strengthened its position in the AI market by introducing innovations like the AI Factory and collaborating with clients to develop tailored solutions, such as enhancing fraud detection and customer service. The company addresses growing demand for secure, sovereign, and cost-predict...

    Read More »
  • Corelight's AWS Flow Monitoring Ends Cloud Blind Spots

    Corelight's AWS Flow Monitoring Ends Cloud Blind Spots

    Corelight's new Flow Monitoring solution for AWS provides unified network visibility across cloud and hybrid infrastructures, reducing SIEM and storage costs by up to 90% compared to traditional methods. The solution converts high-volume AWS flow data into enriched, security-focused intelligence,...

    Read More »
  • Vectra AI: Redefining Hybrid Attack Resilience

    Vectra AI: Redefining Hybrid Attack Resilience

    Vectra AI provides a unified security platform designed to manage threats proactively, respond decisively during incidents, and validate security posture after containment, moving beyond reactive tools. The platform addresses challenges in complex hybrid environments by unifying visibility, inves...

    Read More »
  • Qilin Ransomware Exploits WSL to Deploy Linux Encryptors

    Qilin Ransomware Exploits WSL to Deploy Linux Encryptors

    The Qilin ransomware group uses the Windows Subsystem for Linux (WSL) to deploy Linux encryptors on Windows machines, evading detection by security tools designed for Windows threats. They have targeted over 700 organizations across 62 countries, employing remote access tools and BYOVD attacks to...

    Read More »
  • Uncover Insider Risks with BigID's Activity Explorer

    Uncover Insider Risks with BigID's Activity Explorer

    BigID's Activity Explorer addresses fragmented security visibility by centralizing audit logs from diverse cloud and on-premises systems into a single, searchable platform for faster incident response. The tool provides unified auditing across hybrid environments, tracking all identity types—incl...

    Read More »
  • TLS Deadline: 47 Days to Avert System Outages

    TLS Deadline: 47 Days to Avert System Outages

    Major technology providers are mandating that all public TLS certificates must have a maximum validity of 47 days by 2029, drastically reducing the current 398-day standard to enhance security. This change introduces significant operational challenges, as organizations already struggle with certi...

    Read More »
  • Master CIS Security Best Practices: Essential Webinar Guide

    Master CIS Security Best Practices: Essential Webinar Guide

    Cybersecurity professionals can address emerging threats by mastering fundamental protections like CIS Security Best Practices, rather than chasing every new vulnerability. CIS benchmarks offer layered protection by integrating across security dimensions, streamlining compliance and reducing redu...

    Read More »
  • Automate Identity Governance with Veza Access AuthZ

    Automate Identity Governance with Veza Access AuthZ

    Veza's Access AuthZ automates identity governance by streamlining access granting and revocation across enterprise systems, targeting the "last mile" of identity management with scalability and compatibility for legacy and custom platforms. The solution addresses inefficiencies in IGA deployments...

    Read More »
  • Skyhigh Security Unveils Unified Dashboard for Data Visibility & Compliance

    Skyhigh Security Unveils Unified Dashboard for Data Visibility & Compliance

    Skyhigh Security has launched a centralized dashboard within its Data Security Posture Management suite to provide a real-time, unified view of data security and compliance across hybrid and multi-cloud environments. The tool addresses new U.S. state privacy laws by using AI-driven classification...

    Read More »
  • Unify Data Security, Recovery & Identity with Commvault Cloud

    Unify Data Security, Recovery & Identity with Commvault Cloud

    Commvault Cloud Unity integrates data security, cyber recovery, and identity resilience into a single AI-powered platform for unified data protection across various IT environments. The platform addresses challenges like AI-driven data expansion, disconnected tools, and diverse infrastructures by...

    Read More »
  • Tufin R25-2 Boosts Network & Cloud Security Automation

    Tufin R25-2 Boosts Network & Cloud Security Automation

    Tufin Orchestration Suite R25-2 enhances security by providing expanded visibility, comprehensive automation, and stronger controls across hybrid networks from a unified platform. The update introduces key advancements including improved topology accuracy, streamlined SASE policy control, and enh...

    Read More »
  • Illumio and Microsoft Partner to Stop Cyber Breaches at Scale

    Illumio and Microsoft Partner to Stop Cyber Breaches at Scale

    Microsoft has fully implemented Illumio's Insights and Segmentation platform across its entire corporate IT infrastructure, marking a strategic shift toward proactive, AI-driven cybersecurity to prevent threats from spreading. The partnership was driven by Illumio's ability to meet Microsoft's im...

    Read More »
  • C-Suite's AI Obsession Fuels Critical Security Gaps

    C-Suite's AI Obsession Fuels Critical Security Gaps

    Modern organizations face significant security vulnerabilities due to a disconnect between rapid technological adoption and inadequate security practices, with 34% experiencing AI-related breaches. Many companies rely on outdated, reactive metrics like incident frequency, which only assess damage...

    Read More »
  • Netpoleon, Vectra AI Strengthen ANZ Cybersecurity Alliance

    Netpoleon, Vectra AI Strengthen ANZ Cybersecurity Alliance

    Netpoleon and Vectra AI have expanded their strategic alliance to deliver advanced AI-driven Network Detection and Response solutions across Australia and New Zealand, enhancing cybersecurity capabilities for enterprise clients and government agencies. Vectra AI has been recognized as a Leader in...

    Read More »
  • Secure Active Directory with UserLock IAM: Product Showcase

    Secure Active Directory with UserLock IAM: Product Showcase

    UserLock is a modern IAM layer for Microsoft Active Directory that enhances security with granular MFA, contextual access rules, and real-time session monitoring without requiring a disruptive identity overhaul. It provides comprehensive visibility and control by aggregating AD entities into dash...

    Read More »
  • Axoflow: Unified Security Data Pipeline, Storage & Analytics

    Axoflow: Unified Security Data Pipeline, Storage & Analytics

    Axoflow's Security Data Layer unifies data pipeline and storage solutions to address log management, SIEM optimization, and cost-effective data handling, automating collection, transformation, and tiered storage. The platform offers flexible deployment options, including temporary on-node storage...

    Read More »
  • Data Center Skills Gap Leading to Cloud Outages

    Data Center Skills Gap Leading to Cloud Outages

    The shortage of skilled data center professionals is increasing cloud outages, with understaffed operations posing significant risks, often overshadowed by AI talent gaps. Recent outages, like Microsoft 365's, reveal vulnerabilities linked to staffing shortages in critical roles such as data cent...

    Read More »
  • OpenText AI Boosts Enterprise Security for Identity, Data & Apps

    OpenText AI Boosts Enterprise Security for Identity, Data & Apps

    OpenText has launched a suite of cybersecurity enhancements that integrate AI into security workflows, unifying protection across identity, data, applications, and forensics with tools like Core Threat Detection and Core Identity Foundation. The CE 25.4 release strengthens compliance with built-i...

    Read More »
  • Forescout eyeSentry: Continuous Cloud Exposure Management

    Forescout eyeSentry: Continuous Cloud Exposure Management

    Forescout launched eyeSentry, a cloud-native platform that helps enterprises identify and manage vulnerabilities across IT, IoT, and IoMT assets, addressing the limitations of traditional security measures in modern networks. A study by Forescout reveals that 65% of connected assets in organizati...

    Read More »
  • Inside Cisco: The Rebirth of Splunk with Kamal Hathi

    Inside Cisco: The Rebirth of Splunk with Kamal Hathi

    Kamal Hathi, Splunk's Senior Vice President, emphasizes that machine data is the "heartbeat of the enterprise," with Splunk serving as a vital monitor for logs and telemetry from diverse sources. The acquisition by Cisco merges Splunk's robust data platform with Cisco's infrastructure, creating a...

    Read More »
  • Strata Identity: AI Agent Security & Observability Solutions

    Strata Identity: AI Agent Security & Observability Solutions

    Strata Identity launched Identity Orchestration for AI Agents, a solution using Maverics identity fabric to provide governance for AI agents in hybrid infrastructures without limiting identity provider flexibility. Traditional IAM systems fail to manage AI agents, which operate dynamicall...

    Read More »
  • SolarWinds AI Agent Advances Autonomous Operations

    SolarWinds AI Agent Advances Autonomous Operations

    SolarWinds has introduced an AI Agent and enhanced AI capabilities to help IT departments achieve autonomous operational resilience by predicting problems, automating responses, and reducing cognitive load on human operators. The AI Agent functions as a digital team member, supporting observabili...

    Read More »
  • AI's Speed Demands Faster Data Security Now

    AI's Speed Demands Faster Data Security Now

    Generative AI is being rapidly adopted by businesses for innovation, but it introduces significant data security challenges, especially concerning data integrity and confidentiality. The reliance on high-quality data makes AI systems vulnerable to integrity-based threats, such as data tampering, ...

    Read More »
  • Ransomware Attackers Wipe Azure Data and Backups After Theft

    Ransomware Attackers Wipe Azure Data and Backups After Theft

    A new wave of cloud-focused ransomware attacks by group Storm-0501 systematically wipes primary data and backups in Microsoft Azure, leaving organizations with no recovery options. The group exploits native cloud functionalities to exfiltrate large volumes of data without on-premises hardware, ma...

    Read More »
  • The Password Problem We Still Haven't Solved

    The Password Problem We Still Haven't Solved

    Identity-related breaches persist due to basic vulnerabilities like reused passwords and insufficient verification, allowing attackers prolonged network access. Passwords remain the dominant authentication method despite intentions to go passwordless, hindered by legacy systems and diverse enviro...

    Read More »