The latest security technology and best practices to secure cloud-based data, networks, applications, and systems.

  • Google to Acquire Mandiant; EDR Acquisition Next?

    Google today announced that it has agreed to acquire Mandiant for roughly $5.4 billion to bolster its cloud security. Google noted that Google Cloud already offers a number of security services, including BeyondCorp Enterprise for Zero Trust, VirusTotal for malicious content and software vulnerabilities, Chronicle security analytics and automation and the Security Command Center risk… Read more

  • Russia, China May Be Coordinating Cyber Attacks: SaaS Security Firm

    A SaaS security company says a spike in cyber attacks from Russia and China in recent weeks suggests the two countries may be coordinating their cyber efforts. SaaS Alerts, which helps managed service providers (MSPs) manage and protect customers’ SaaS apps, mentioned the finding in conjunction with the release of its annual SaaS Application Security… Read more

  • IBM Moves Into EDR Market With ReaQta Acquisition

    IBM is moving into the endpoint detection and response (EDR) market with the acquisition of ReaQta. IBM is positioning the announcement as part of its launch of an XDR product. Extended detection and response (XDR) has emerged in recent years as a unified enterprise security platform, a way for vendors to package their offerings together… Read more

  • Twitch Breach Shows the Difficulty of Cloud Security

    Cloud security is a delicate balancing act of keeping the freedoms that make migration worthwhile while also keeping a company’s data secure. A recent breach of Twitch, an Amazon-owned company, showed businesses just how difficult cloud security really is. And it’s critically important, with the average cost of a data breach in hybrid cloud environments… Read more

  • EU to Force IoT, Wireless Device Makers to Improve Security

    The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. In an amendment to the EU’s 2014 Radio Equipment Directive (RED), the European Commission noted that as wireless devices, from mobile phones to fitness trackers to smart watches, become increasingly embedded… Read more

  • Illumio Unveils CloudSecure for Zero Trust Segmentation in the Cloud

    Illumio today announced the launch of Illumio CloudSecure, an agentless solution designed to support zero trust security in public, hybrid, and multi-cloud environments. The new offering can be deployed on its own, or in combination with the company’s agent-based Illumio Core product. In an interview with eSecurity Planet, Illumio CTO and co-founder PJ Kirner said… Read more

  • How Machine Identities Can Imperil Enterprise Security

    Managing machine identities has never been more critical to an enterprise’s cybersecurity. Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO of Cloudentity. Without thorough visibility and proper management of machine-to-machine communications, all those machines can become a huge security issue. Gartner’s list of the top security risks and trends… Read more

  • Microsoft Azure Attack Illustrates Ongoing DDoS Threats

    Officials with Microsoft’s Azure public cloud said the company in late August was able to stave off a record distributed denial-of-service (DDoS) attack against a European customer that originated in the Asia-Pacific region. The attack, which hit 2.4 terabits per second, was 140 percent higher than a 1 Tbps attack last year and higher than… Read more

  • Google Sending Security Keys to 10,000 Users at High Risk of Attack

    Google is giving out 10,000 free security keys to high-risks users, an announcement that came a day after the company warned 14,000 of its high-profile users that they could be targeted by the notorious Russia-based APT28 hacking group. The moves were part of a larger push by Google in recent months to make cybersecurity a… Read more

  • Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes

    Cybercriminals are targeting Linux-based servers running Microsoft’s Azure public cloud environment that are vulnerable to flaws after Microsoft didn’t automatically apply a patch on affected clients in its infrastructure. According to cybersecurity firm Recorded Future, the attacks began the night of Sept. 16 after a proof-of-concept exploit was published earlier in the day on GitHub.… Read more

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis