article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

Security Boulevard

Cyber threats have steadily intensified each year since I began writing about privacy and cybersecurity for USA TODAY in 2004.

article thumbnail

NEW TECH SNAPSHOT: The role of ‘MSSPs’ in helping businesses manage cybersecurity

The Last Watchdog

They must take into account a widely scattered workforce and somehow comprehensively mitigate new and evolving cyber threats. MSSPs have since broadened and advanced their services, a trend that continues as cloud migration gained momentum in the 2010s — and then accelerated with the onset of Covid 19.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BrandPost: Four Reasons to Use Hardened VMs for Your Cloud Migration

CSO Magazine

Migrating to the cloud can help address these challenges in unique ways. For example, CIS Hardened Images – virtual machine (VM) images built to defend against cyber threats – can help. Ensuring that your organization’s IT environment is not only secure but also patched regularly can be challenging.

article thumbnail

SHARED INTEL Q&A: Everything the Cisco-Splunk merger tells us about the rise of SIEMs

The Last Watchdog

Cisco’s recent move to acquire SIEM stalwart Splunk for a cool $28 billion aligns with the rising urgency among companies in all sectors to better protect data — even as cyber threats intensify and disruptive advancements in AI add a wild card to this challenge. Related: Will Cisco flub Splunk?

Marketing 306
article thumbnail

These Six Security Capabilities Will Keep Applications, Hybrid Environments Secure

CyberSecurity Insiders

As such, according to Radware’s The State of Web Application and API Protection report, 70% of production web applications now run in cloud environments. Keeping these hybrid environments safe from cyber threats requires a new way of thinking about application and cloud security. Complexity is the Enemy of Security.

article thumbnail

Menlo Security Finds Cloud Migration and Remote Work Gives Rise to New Era of Malware, Highly Evasive Adaptive Threats (HEAT)

CyberSecurity Insiders

.–( BUSINESS WIRE )– Menlo Security , a leader in cloud security, today announced it has identified a surge in cyberthreats, termed Highly Evasive Adaptive Threats (HEAT), that bypass traditional security defenses. Cyber Threats are a mainstream problem and a boardroom issue that should be on everyone’s agenda.

article thumbnail

Do customers really care about SASE? Absolutely, and here’s why

CyberSecurity Insiders

This involves myriad updates to the business’ IT systems, and in some cases, a comprehensive overhaul for network modernization, cloud migration, and edge design and deployment — all tightly wrapped with security.