See our complete list of top container and Kubernetes security vendors Aqua Security: Company Description Aqua Security is a pioneer in the container security space and was founded in 2015 by a team of IT security veterans from companies such as Intel Security/McAfee, CA Technologies, and Imperva. Today it offers a mature and scalable […]
See our complete list of top container and Kubernetes security vendors Company Description Founded in 2002, Alert Logic is a privately held company headquartered in Houston, Texas, with offices in Austin, Seattle, Dallas, Cardiff, Belfast, London and Cali, Colombia. Alert Logic provides security-as-a-service (SaaS) technologies that combine cloud-based software and analytics with services to assess, […]
See our complete list of top container and Kubernetes security vendors Company Description Founded in 1999, Qualys is headquartered in Foster City, CA, and led by chairman and CEO Philippe Courtot. Qualys became publicly traded on Nasdaq with the symbol QLYS on September 28, 2012. Its initial cloud-based product was QualysGuard in December 2000, which […]
The modern cybersecurity landscape has often been compared to a battlefield, with adversaries and defenders alike using military-style strategy and tactics. With nation-states increasingly engaged in cyber attacks, the military analogy isn’t just a metaphor, it’s becoming a reality for how cybersecurity actually works. Among the most well known institutions in the U.S. for studying […]
A number of data breaches have been disclosed over the course of 2018, but none have been as big or had as much impact as the one disclosed on Nov. 30 by hotel chain Marriott International. A staggering 500 million people are at risk as a result of the breach, placing it among the largest […]
The daily challenge for many IT leaders is figuring out how to deal with a constant barrage of security risks and an ever-growing?regulatory compliance landscape. It’s a challenge Alissa Johnson has dealt with throughout her career. Johnson is currently the Chief Information Security Officer (CISO) at Xerox, a post she has held since October 2016. […]
The term “endpoint security” is often used by vendors and security professionals alike, but what is it really all about? While it might seem obvious that endpoint security by definition is all about defending endpoints, as opposed to say networks, there are many levels of nuance and technologies involved in endpoint security. In a session […]
The Equifax data breach that exposed the sensitive personal information of more than 145 million consumers was one of the worst data breaches of recent years, both for the amount of information exposed and the ease with which hackers moved about the company’s systems. The breach was publicly disclosed on Sept. 7, 2017, and details […]
While there is no shortage of data breaches and new exploits in any given year, it’s relatively rare for there to be an entirely new class of vulnerabilities to be publicly disclosed, but that’s what has happened this year with Spectre and Meltdown. The Spectre and Meltdown flaws were publicly disclosed on Jan. 3, ushering in […]
Access to applications, servers and network resources is the cornerstone of enterprise IT, which is all about enabling connectivity. Not every account should have full access to everything in an enterprise, however, which is where super user or privileged accounts come into play. With a privileged account, a user has administrative access to enterprise resources, […]
Subscribe to Cybersecurity Insider for top news, trends & analysis