In the latest weekly update, Troy Leach, CSO at Cloud Security Alliance, joined three editors at Information Security Media Group to discuss important cybersecurity issues, including the rise of agentic AI, heightened scrutiny on third-party risks and the global focus on adopting zero trust and MFA.
Proofpoint is advancing its platform to unify data security capabilities. CEO Sumit Dhawan details its October acquisition of Normalyze in addressing multi-cloud, insider threats and AI-driven challenges through data security posture management.
Salt Security CEO Roey Eliyahu highlights innovations such as Pepper, an AI-based assistant for API discovery and rapid threat response. The platform helps reduce expertise requirements and simplify API security through governance automation and advanced analytics.
The topic of AI reality versus hype, as well as what the next killer use cases might be, dominated the wrap-up "Locknote" panel at this year's annual Black Hat Europe in London, comprised of conference Review Board members detailing this year's hot topics, with AI taking top place.
With a rapidly evolving threat landscape, security teams and SOCs are always on high alert. The continuous flood of security data—logs, events, traffic, and alerts—creates an overwhelming workload that’s difficult to manage manually. This often leads to slower response times, missed threats, and analyst...
SASE has been part of the cybersecurity discussion for five years now, but are customers solving their actual problems? Nirav Shah of Fortinet discusses the past, present and future of SASE, as well as the role AI plays integrated with SASE solutions.
As cyber threats grow more sophisticated, traditional security measures struggle to keep pace, forcing Security Operations Centers (SOCs) to shift from reactive analysis to proactive prevention. Attackers now bypass conventional defenses within hours, highlighting the need for more agile, preventive strategies....
In 2023, Palo Alto Networks commissioned Forrester Consulting to examine the potential return on investment from deploying our Next-Generation Firewalls. We're committed to protecting your entire organization with the most innovative firewall solutions available, while also providing you with a quantifiable ROI on...
Palo Alto Networks has been recognized as a Leader in "The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024" report with the highest scores in the Current Offering category and the highest possible scores in the Vision, Innovation and Roadmap criteria.
As we see it, this recognition of our network security...
In 2023, Palo Alto Networks commissioned Forrester Consulting to conduct a Total Economic Impact study to examine the return on investment enterprises may realize by deploying its Cloud-Delivered Security Services.
Palo Alto Networks CDSS is a set of specialized security solutions that defend against known, unknown...
Is your security stack keeping pace with a rapidly expanding corporate network?
Over the past two decades, web proxies have become a security mainstay for organizations. As corporate networks expand, the demand for consistent, location-independent security is growing, and many organizations are adopting converged...
According to the 2024 ISG Provider Lens, SD-WAN is rapidly expanding in the U.S. as businesses shift from rigid network infrastructures to embrace digitalization and cloud migration. In 2023, the U.S. emerged as the largest SD-WAN market, accounting for nearly one-third of global demand.
Gain insights into the...
Criteria for evaluating medical device security solutions.
Our vendor-agnostic checklist helps healthcare organizations evaluate security solutions for operational and medical IoT devices. This checklist includes must-have features and capabilities that decision-makers across healthcare organizations should...
SASE adoption is gaining momentum. A Gartner survey found that 39% of respondents have deployed or plan to deploy SASE within the next 24 months.
CIOs, CISOs, and IT leaders are still coping with the complexity of hybrid workforces, rapid cloud adoption, growing micro-branches, and outdated technology to defend...
Foreign threat actors are using generative artificial intelligence to influence U.S. elections, but their impact is limited, said OpenAI. Threat actors from China, Russia, Iran, Rwanda and Vietnam maliciously used AI tools to support influence operations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.