Tag: cloud
-
Tackling Cloud Security Challenges in Runtime Environments
Rinki Sethi, chief security officer for Upwind, unpacks why runtime is the new battleground for cloud defense. Sethi traces her epiphany back to 2022, when she first heard that you can’t secure what you can’t see in real time. Configuration checks and compliance scans are fine, she says, but attackers still slip through unless you’re..…
-
How to Chart an Exposure Management Leadership Path for You, Your Boss and Your Organization
Tags: access, attack, automation, breach, business, ciso, cloud, container, cybersecurity, data, defense, exploit, identity, incident response, iot, jobs, kubernetes, ransom, regulation, risk, security-incident, service, soc, threat, tool, vulnerability, vulnerability-managementEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we share some tips on how to lead the move to exposure management. You can read the entire Exposure Management Academy series here. For years, organizations poured resources into reactive…
-
Sysdig Extends AI Agent Reach Across Portfolio
Sysdig has fully integrated an artificial intelligence (AI) agent across its cloud native application protection platform (CNAPP) to both identify and explain threats, along with remediation suggestions. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/sysdig-extends-ai-agent-reach-across-portfolio/
-
Unternehmen haben Schwierigkeiten ihre wachsenden, KI-gesteuerten Cloud-Umgebungen abzusichern
Thales hat die Ergebnisse seiner
-
Unternehmen haben Schwierigkeiten ihre wachsenden, KI-gesteuerten Cloud-Umgebungen abzusichern
Die Cloud ist inzwischen ein wesentlicher Bestandteil der modernen Unternehmensinfrastruktur, aber viele Unternehmen sind noch dabei, die erforderlichen Kompetenzen und Strategien für eine effektive Absicherung aufzubauen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/unternehmen-haben-schwierigkeiten-ihre-wachsenden-ki-gesteuerten-cloud-umgebungen-abzusichern/a41263/
-
»manage it« TechTalk: Darum wird die identitätszentrische Sicherheit immer wichtiger
Mit Matt Graves durften wir auf der diesjährigen European Identity Cloud Conference über das Thema Identity Access Management sprechen. In diesem Kontext wollten wir von ihm wissen, warum die identitätszentrische Sicherheit immer wichtiger wird und wie OpenText dabei helfen kann. First seen on ap-verlag.de Jump to article: ap-verlag.de/manage-it-techtalk-darum-wird-die-identitaetszentrische-sicherheit-immer-wichtiger/97024/
-
Are we securing AI like the rest of the cloud?
In this Help Net Security interview, Chris McGranahan, Director of Security Architecture Engineering at Backblaze, discusses how AI is shaping both offensive and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/30/chris-mcgranahan-backblaze-ai-cloud-security/
-
Attacken in der Cloud und On-Premises präventiv abwehren One Single Source of Truth
Im Interview erläutert Lothar Geuenich, VP Central Europe bei Check Point Software Technologies, die Vorteile der Infinity-Plattform, den Einsatz von KI und die Anforderungen der Kunden. Durch den Hybrid-Mesh-Ansatz werden hybride Umgebungen sowohl in der Cloud als auch On-Premises abgedeckt. First seen on ap-verlag.de Jump to article: ap-verlag.de/attacken-in-der-cloud-und-on-premises-praeventiv-abwehren-one-single-source-of-truth/96780/
-
Innovating NHIs Management for Better Security
Is Your Cloud Environment as Secure as You Think? Managing Non-Human Identities (NHIs) and Secrets is a critical concern. This is especially true for organizations making use of cloud environments, where threats often lurk undetected and unrecognized. But have you considered how innovative NHI management could transform your company’s approach to security? The ingenuity of……
-
Being Proactive with Your NHIs Management
How Important Is Proactive NHI Management? Have you ever considered the significance of proactive Non-Human Identity (NHI) management in securing your cloud? With companies become more digitally reliant, managing machine identities and their secrets has evolved into an essential part of corporate strategy. This proactive approach to NHI management offers several advantages, including risk reduction,……
-
Techscape for Startups in Cloud and Application Security
First seen on scworld.com Jump to article: www.scworld.com/native/techscape-for-startups-in-cloud-and-application-security
-
Stay Ahead: Upgrading Your NHI Strategy for Cloud Security
Why Upgrade Your NHI Strategy for Cloud Security? Cybersecurity threats have been steadily increasing, requiring cybersecurity professionals to frequently reassess and upgrade their strategies. A robust Non-Human Identities (NHIs) strategy, an essential aspect of data management, is often overlooked despite its crucial role in cloud security. So, why should organizations prioritize an NHI strategy upgrade?……
-
Is Investing in NHI Security Justified?
Is NHI Security Investment Justifiable for Your Organization? Is your organization making a concerted effort towards investing in Non-Human Identities (NHIs) security? Given the increasing sophistication of cyber threats, ensuring tight security controls over machine identities is becoming vital in every industry. This is particularly significant for businesses operating in the cloud, where NHIs and……
-
CVE-2025-5777, CVE-2025-6543: Frequently Asked Questions About CitrixBleed 2 and Citrix NetScaler Exploitation
Frequently asked questions about recent Citrix NetScaler ADC and Gateway vulnerabilities that have reportedly been exploited in the wild, including CVE-2025-5777 known as CitrixBleed 2. Background Tenable’s Research Special Operations (RSO) team has compiled this blog to answer Frequently Asked Questions (FAQ) regarding CVE-2025-5777 and CVE-2025-6543, two Citrix NetScaler ADC and Gateway vulnerabilities that have…
-
From Packets to Protection: How Network Observability Powers Security and Forensics
In cybersecurity, the old maxim >>you can’t secure what you can’t see
-
Hackers exploiting critical Citrix Netscaler flaw, researchers say
After confirming exploitation of a separate zero-day flaw, Cloud Software Group promises to be transparent. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/hackers-exploiting-citrix-netscaler-flaw/751878/
-
Navigating a Heightened Cyber Threat Landscape: Military Conflict Increases Attack Risks
Tags: advisory, ai, attack, authentication, breach, business, cloud, container, control, cyber, cyberattack, cybersecurity, data, data-breach, defense, detection, exploit, finance, firmware, group, hacker, hacking, Hardware, identity, infrastructure, intelligence, Internet, iran, mfa, military, network, password, risk, russia, service, strategy, tactics, technology, terrorism, threat, tool, update, vulnerability, vulnerability-managementThe current geopolitical climate demands a proactive, comprehensive approach to cybersecurity. Here’s what you need to know, and how Tenable can help. The cybersecurity landscape is in constant flux, but rarely do we see such a rapid escalation of threats as we are currently experiencing. The U.S. Department of Homeland Security’s (DHS) National Terrorism Advisory…
-
Frequently Asked Questions About Iranian Cyber Operations
Tags: access, advisory, api, apt, attack, authentication, awareness, cisa, cloud, credentials, cve, cyber, cybersecurity, data, data-breach, defense, dos, exploit, finance, framework, government, group, Hardware, identity, infrastructure, injection, Internet, iran, ivanti, malware, mfa, microsoft, middle-east, military, mitre, monitoring, network, password, ransomware, rce, remote-code-execution, risk, service, software, supply-chain, tactics, technology, terrorism, threat, tool, update, vpn, vulnerability, windowsTenable’s Research Special Operations team focuses on some frequently asked questions about Iranian cyber operations, including the tactics, techniques and procedures employed by Iran-based threat actors. Background Tenable’s Research Special Operations (RSO) team has compiled this blog to answer Frequently Asked Questions (FAQ) regarding Iranian cyber operations in the wake of the recent conflict and…
-
How to Keep Client Data Safe in a World Full of Online Threats
Businesses, big or small, must prioritize data security not only to maintain trust but also to stay compliant with evolving regulations. This article explores practical, actionable strategies to safeguard client information, including encryption, access control, employee training, and secure cloud practices. Learn how to build a resilient security culture that protects your clients and your…
-
KI-Analyst für Cloud-Sicherheit
Sysdig, der führende Anbieter von Cloud-Sicherheit in Echtzeit, gab die vollständige Integration von Sysdig-Sage in seiner Plattform bekannt. Damit können Sicherheits- und Entwicklungsteams mit Unterstützung von Sysdigs KI-gestütztem Cloud-Sicherheitsanalysten Risiken identifizieren, untersuchen und beheben. Als erster KI-Analyst, der vollständig in eine Cloud-native Plattform zum Schutz von Anwendungen (CNAPP) integriert ist, verbessert Sysdig-Sage die Geschwindigkeit, Präzision…
-
6 key trends redefining the XDR market
Tags: access, ai, apache, attack, cloud, country, crowdstrike, cybersecurity, data, detection, edr, endpoint, framework, identity, incident response, infrastructure, intelligence, marketplace, microsoft, ml, monitoring, msp, mssp, network, office, open-source, ransomware, service, siem, soc, sophos, threat, toolXDR-as-a-service on the rise: A fully staffed SOC is out of reach for many organizations and that’s why the rise of XDR-as-a-service reflects growing demand for managed, scalable security capabilities.”With stretched teams and expanding attack surfaces, many organizations are turning to trusted providers to deliver round-the-clock detection and response,” says Santiago Pontiroli, lead security researcher…
-
Is Your Secrets Management Getting Better?
Are Your Cybersecurity Strategies Evolving Effectively? The question arises: Is your secrets management improving? These days, robust secrets management isn’t a luxury but a necessity, especially for businesses dealing with cloud technology. Transforming your cyber strategies to effectively manage Non-Human Identities (NHIs) and secrets holds the key to minimizing risks and boosting security across various……
-
Building Trust in Your NHI Security Measures
How Reliable are Your Non-Human Identity Security Measures? Have you ever questioned the trustworthiness of your Non-Human Identity (NHI) security measures? With the increasing adoption of NHIs, due to the cloud’s efficiency and scalability, it’s paramount that effective management of these identities is in place. However, striking a balance between robust security measures and the……
-
KI zwingt Unternehmen, Abstriche in Sachen HybridSicherheit zu machen Public Cloud als größtes Risiko
KI verursacht größeres Netzwerkdatenvolumen und -komplexität und folglich auch das Risiko. Zudem gefährden Kompromisse die Sicherheit der hybriden Cloud-Infrastruktur, weshalb deutsche Sicherheits- und IT-Entscheider ihre Strategie überdenken und sich zunehmend von der Public Cloud entfernen. Gleichzeitig gewinnt die Netzwerksichtbarkeit weiter an Bedeutung. First seen on ap-verlag.de Jump to article: ap-verlag.de/ki-zwingt-unternehmen-abstriche-in-sachen-hybrid-cloud-sicherheit-zu-machen-public-cloud-als-groesstes-risiko/96756/
-
Cisco warns of critical API vulnerabilities in ISE and ISE-PIC
Tags: access, ai, api, application-security, attack, authentication, automation, best-practice, business, ceo, cisco, ciso, cloud, communications, control, credentials, data, defense, email, endpoint, exploit, firewall, flaw, framework, guide, Hardware, incident response, malicious, microsoft, mobile, network, penetration-testing, programming, risk, router, saas, sans, service, software, threat, update, vpn, vulnerability, wafroot user.The fault behind both vulnerabilities: Holes in application programming interfaces (APIs).”Take this vulnerability seriously,” said Moses Frost, senior course instructor on cloud penetration testing at the SANS Institute. “In my experience assessing networks, I have found through testing that many lack essential patches and security hardening on their core network devices. I have seen Cisco…
-
Microsegmentation: The Must-Have Cyber Defense in 2025
The Perimeter Is Gone But Your”¯Attack Surface Keeps Growing Cloud workloads, SaaS apps, edge devices, third-party APIs, and a permanently remote workforce have dissolved the neat network perimeter we once relied on. Traditional firewalls, VPNs, and even best-in-class EDR only cover pieces of the puzzle. Once attackers get any foothold, they can ride flat,… First…
-
Gigamon Adds AI Visibility Tools to Deep Observability Platform for Hybrid Cloud Security
First seen on scworld.com Jump to article: www.scworld.com/news/gigamon-adds-ai-visibility-tools-to-deep-observability-platform-for-hybrid-cloud-security
-
Gigamon Adds AI Visibility and Copilot Assistant for Hybrid Cloud Security and Support MSSPs
First seen on scworld.com Jump to article: www.scworld.com/brief/gigamon-adds-ai-visibility-and-copilot-assistant-for-hybrid-cloud-security-and-support-mssps

