Aqua Security: 97% unaware of crucial cloud native security principles

Venture Beast

This finding indicates the difficulty and complexity of understanding key cloud native security risks, along with how to counteract them. Cloud Enterprise Security VB Home Page Aqua Security category-/Computers & Electronics/Computer Security cloud native security cloud-native reports

Improve supply chain security with intelligence


Read Tyler Logtenberg explain how companies can improve their supply chain security through threat intelligence from surface, deep and dark web on Security Intelligence : It would be comforting if the only cyber-risks organizations had to worry about were the ones that smacked up against their firewall and endpoint security solutions.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

4 Steps to Ensure Robotic Process Automation Security


If the data is not secured, it can be exposed and can cost organizations millions of dollars. “Without proper security measures in place, the sensitive data, such as RPA bot credentials or customer data that RPA handles, can be exposed to attackers. Enable secure RPA development.

Gartner Top Security Projects for 2020-2021


“Are you trying to ensure security for your remote workforce but don’t want to hinder business productivity?” ” “Are you struggling with identifying risks and gaps in security capabilities?” 1: Securing your remote workforce. Security

The Unexpected Cost of Data Copies

This paper will discuss why organizations frequently end up with multiple data copies and how a secure "no-copy" data strategy enabled by the Dremio data lake service can help reduce complexity, boost efficiency, and dramatically reduce costs.

New to Zero Trust Security? Start Here


Historically, security models depended on a “castle and moat” type of architecture, with the enterprise network and data center on the inside, and firewalls guarding the perimeter. Learn more: Gartner Security & Risk Management Summit. The post New to Zero Trust Security?

Google unveils ‘self-driving’ cloud security feature

Venture Beast

At its Security Summit, Google Cloud announced Chronicle integrations, Cloud IDS, an autonomic security operations stack, and more. Read More.

Google 112

Is the Cloud Secure?


Cloud security breaches consistently make news headlines. The ambiguity that surrounds cloud computing can make securing the enterprise seem daunting. Concerns about security have led some CIOs to limit their organizational use of public cloud services. However, the challenge exists not in the security of the cloud itself, but in the policies and technologies for security and control of the technology. to “Am I using the cloud securely?”

Securiti allies with Snowflake to manage and secure data

Venture Beast

Securiti for Snowflake provides the data governance tools required to protect data, ensure privacy, and achieve compliance. Read More.

Gartner Top Security and Risk Trends for 2021


As cybersecurity and regulatory compliance become the top two biggest concerns of corporate boards, some are adding cybersecurity experts specifically to scrutinize security and risk issues. The reality of security today is that security leaders have too many tools. IT Security

Trends 259

Elevate Security Produces Global Employee Risk Insights Report


Elevate Security has produced a first-of-its-kind analysis of more than 1.5 million anonymized employees’ security decisions. This groundbreaking research is the industry’s first global research report on employee security decisions […]. News Elevate Elevate Security

Report 225

The Next-Generation Cloud Data Lake: An Open, No-Copy Data Architecture

A next-gen cloud data lake architecture has emerged that brings together the best attributes of the data warehouse and the data lake. This new open data architecture is built to maximize data access with minimal data movement and no data copies.

How supply-chain innovation can bolster U.S. security


Read Alan Estevez, Peter Heron and Kelly Marchese analyze whether it is a good idea from a security viewpoint to let military and defense organizations invest in supply chains on Fast Company : The mandate for military and defense organizations to invest in advancing supply chains is more urgent every day. In its 2021 National […].

SolarWinds breach exposes hybrid multicloud security weaknesses

Venture Beast

The SolarWinds breach strikes at the heart of hybrid multicloud security. This dashes assumptions and pushes zero trust policy to the fore. Read More.

How to Set Practical Time Frames to Remedy Security Vulnerabilities


So what is a reasonable time frame for fixing security vulnerabilities ? Learn more: Gartner Security & Risk Management Summit. This requires that organizations take a more structured risk- and fact-based approach to vulnerability management as part of an overall security program.

Fortifying supply chain security by tackling endpoint exposure


Read why Joe Devanesan says that companies can secure their supply chains only by tackling the endpoint exposure on Tech HQ : Supply chain efficiencies were pushed to the brink during the height of the COVID-19 pandemic, and the security posture of many a supply chain experienced cracks on an unprecedented level.

Scale Venture Partners: Security software buying trends in 2021

Venture Beast

In a CSO survey, 63% said they increased IT budgets to defend against security threats after the events of 2020 (pandemic, SolarWinds hack). Read More.

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

Kaseya Ransomware Attack: What to Know About Supply Chain Security


and around the world are dealing with the fallout of yet another attack that took advantage of security weaknesses in these IT ecosystems.

How To Deal With Employees As The New Security Perimeter


Read Robert Fly, Co-founder and CEO, Elevate Security explain how organizations should deal with employees as a new cybersecurity risk perimeter on Forbes : Let’s look back in time about a year when security executives woke up and realized it was about to get (even more) real.

Centralized supply chain security programs yield efficiency


Read Kirsten Provence argument for a centralized supply chain program on Security Magazine : Finding efficiencies in supply chain security is as simple as enveloping more of your supply chain.

Transform 2021: Security’s key themes

Venture Beast

Join security leaders at Transform 2021, the industry’s premier AI digital event, hosted July 12-16.

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

Shifting security left to the earliest part of development is currently in the spotlight in the developer world. What teams are now discovering is, this approach results in misdirected ownership for developers and a frustrated security team. In the current climate, we cannot afford to let security implementations falter. It's time to manage your team's energies to maximize DevOps efficiency, all the while maintaining top security standards. Join Shlomo Bielak, and learn how to keep your DevSecOps team focused and connected without creating silos.

Develop a Security Strategy for Cyber-Physical Systems


These cyber-physical systems introduce a new set of risks that few security and risk leaders have had to consider. Download eBook: 2021 Top Priorities for Security and Risk Management Leaders. Plan for cyber-physical systems security. IT Security

Software Supply Chain Security – How Not To Get Attacked


Read Bernadine Racoma explain how small and medium businesses can protect their software supply chains from cyber threats on MarTech Series : According to the National Cyber Security Centre (NCSC), there are many challenges that organizations face on a day-to-day basis.

Silicon Valley Defense Group: Securing Democracy Through Innovation


The Silicon Valley Defense Group (SVDG) seeks to align and connect the people, capital and ideas that will ensure allied democracies retain a durable techno-security advantage.

Groups 309

Gartner Top 9 Security and Risk Trends for 2020


The shortage of technical security staff, the rapid migration to cloud computing, regulatory compliance requirements and the unrelenting evolution of threats continue to be the most significant ongoing major security challenges. Security

Trends 312

Your Team's Pragmatic Guide to Security

Speaker: Naresh Soni, CTO, Tsunami XR

The pandemic has led to new data vulnerabilities, and therefore new cybersecurity threats. As technology leaders, it's time to rethink some of your product security strategies. Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered.

Public cloud security ‘just barely adequate,’ experts say

Venture Beast

Fully 98% of security experts said using multiple cloud providers creates additional security challenges and that providers should do more. Read More.

How can a business ensure the security of their supply chain?


Read Kevin Reed analyze how businesses can ensure the security of their supply chains on Help Net Security : Since the SolarWinds’ supply chain attack, there has been an increased focus on how organizations of all sizes ensure the security of their suppliers.

.Net 339

Elevate Security Launches World’s First Cybersecurity Human Attack Surface Management Platform


-Elevate Security, a leader in human attack surface management, today launched a groundbreaking new platform that addresses one of cybersecurity’s biggest unsolved problems – human error – with an intelligent, customized and automated response to employee risk across an organization.

The Power of Anonymity in Supply Chain Security


Read Adrien Gendre’s analytical article about why anonymity is an important aspect of supply chain security on Infosec Magazine : The SolarWinds breach of 2020 was widely considered the biggest cyber-attack in history.

How to Measure DevSecOps Progress and Ensure Success

Speaker: Shannon Lietz, Director of DevSecOps Team, Intuit

The new DevSecOps team is up and running, and you feel ready to take on rising security threats while delivering quality software updates. But that leaves just one question: how do you monitor your new program as effectively and efficiently as possible? Join Shannon Lietz, Director of DevsecOps at Intuit, and award-winning innovator, to learn the answers to these questions so you can lead your DevSecOps team to the top!

Contrast Security


Contrast security seeks to usher in a new era of self-protecting software. From their website: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches, defeat hackers and secure the entire enterprise from development, to operations, to production. Research Team.

Safe Security raises $33M to manage and mitigate cyber risk

Venture Beast

Safe Security, a cyber risk analysis and mitigation firm, has raised $33 million in venture funding from U.K.-based based telecom BT. Read More.

The Problem with Artificial Intelligence in Security


Read Dr. Leila Powell take a look at the security issues associated with artificial intelligence on Dark Reading: If you believed everything you read, artificial intelligence (AI) is the savior […].

Interview: Tom Davison, Technical Director EMEA, Lookout Mobile Security


According to recent statistics from Lookout Mobile Security, drawing on analysis of nearly 200 million mobile devices running Lookout’s security software, as many as 50% of Android users globally are […]. News Lookout Lookout Mobile Security

Mobile 225

Building Like Amazon

Speaker: Leo Zhadanovsky, Principal Solutions Architect, Amazon Web Services

Amazon's journey to its current modern architecture and processes provides insights for all software development leaders. To get there, Amazon focused on decomposing for agility, making critical cultural and operational changes, and creating tools for software delivery. The result was enabling developers to rapidly release and iterate software while maintaining industry-leading standards on security, reliability, and performance. Whether you're developing for a small startup or a large corporation, learning the tools for CI/CD will make your good DevOps team great. We are excited to be joined by Leo Zhadanovsky, a Principal Solutions Architect at Amazon Web Services.

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Traditional perimeter-based security tools do little to protect cloud workloads. Securing data and applications that reside in the cloud is increasingly critical as more mission-critical apps and high-value data and intellectual property move to the cloud. Cloud Security. cloud access security brokers.

The Security Yearbook by Richard Stiennon


I am so excited to now have an autographed copy of The Security Yearbook by Richard Stiennon. Cyber Security News BooksRichard is a prolific writer, a fantastic speaker, and is known the world over as perhaps the most savvy of all analysts in the cybersecurity field.

A Security Perspective Post-COVID-19


I look forward to discussing the topic of the continuing complex dynamics around cybersecurity in this 11 November online panel hosted by ISRM and TinyG. Please join us and help […]. CTO Events OODA

Fugue Cloud Security Adds Support for Container Runtimes


Fugue today announced it has extended its eponymous platform for securing cloud environments to include container runtime environments. News Fugue Fugue Cloud Security

The Product Dev Conundrum: To Build or Buy in a Digital World?

Speaker: Mark Ridley, Owner and Founder, Ridley Industries

Any PM or technical leader who’s led the charge of building a digital product knows that product engineering is one of the most expensive elements of business. In most cases, actually building software should be the last avenue that companies explore to deliver great products, as software engineering, data science and product development are complex, uncertain and hard to manage.