A startup founded by longtime Israeli Military Intelligence leaders landed Series B funding to support the cloud and on-premises data protection needs of hybrid organizations. The $100 million will help Cyera expand and broaden its offering to cover more pain points enterprises are experiencing.
IBM has bought a startup founded by a longtime security leader in the Israeli Prime Minister's Office to ensure personal identifiable information isn't left unprotected. The deal will ensure sensitive data isn't exposed in public cloud data stores or SaaS apps like Slack, SharePoint or Office 365.
A renaissance around data protection has taken advantage of artificial intelligence and machine learning to boost data classification and governance, said Forcepoint CEO Manny Rivelo. Advances in areas like generative AI allow hackers to form sophisticated attacks that evade defenses like sandboxes.
OpenText, Varonis and Forcepoint joined Google and Microsoft atop Forrester's data security rankings, while Trellix and Broadcom fell from the leaders category. Data protection historically focused on delivering security controls, but firms are increasingly looking to address adjacent use cases.
The adoption of new technologies, multi-cloud architectures and multiple data storage sites has resulted in data residing in more places than ever before. That's why enterprises need a single pane of glass to know who's touching their data and why, says Imperva CEO Pam Murphy.
Forcepoint's new Security Service Edge offering allows clients to apply access, threat or data loss protection policies across all channels as soon as they're implemented. The firm long offered DLP, SD-WAN, SWG and CASB tools, but the lack of full integration made it tough to apply unified policies.
Radiant Logic has agreed to buy Brainwave to move from an attestation-based identity governance model to one that more rigorously ensures the appropriateness of credentials. Brainwave uses data and AI to tell customers where in the organization user identities are most likely to be out of sync.
For many brands, especially large enterprises with a substantial online presence, it is important to be able to have eyes all over the internet in order to properly mitigate the effects of external elements on their brand’s reputation.
Ten state attorneys general are urging Apple to address privacy and security gaps in third-party applications available on the App Store that track, collect or store reproductive health data. The letter comes as scrutiny intensifies over how large tech firms handle sensitive health data.
CEO Yotam Segev says Cyera eschews the focus of data loss prevention tools on blocking users from pulling down data and instead embraces an approach that reduces friction. Cyera has sought to safeguard data by making preventative changes in areas like configuration, permissions and security posture.
Netskope has built out a full SASE stack and helped enterprises secure their physical devices through the recent acquisitions of Infiot and WootCloud. Buying SD-WAN provider Infiot in August will boost the convergence of networking and security and help customers quickly on-ramp users in the cloud.
Co-founder and CEO Bipul Sinha has grown Rubrik's business with existing customers by more than 40% thanks to the company's unique take on data observability. The data security vendor has emphasized data availability and resiliency in the face of crippling ransomware and extortion-based attacks.
Some experts predict cyber insurance rates will increase 40-75% in the near future, and MSPs need to take action now to protect their profits and businesses in 2022 and beyond. The panelists will explore why ransomware attacks are at the heart of these increases. This webinar features expert insights from:
Richard...
Insurance claims being filed by ransomware victims are growing as criminals continue to hit businesses with crypto-locking malware. To avoid these claims, organizations can take a number of proven steps to better protect themselves, says Payal Chakravarty of Coalition.
Today’s sophisticated cyberattacks combine multiple tactics that include social engineering, zero-day malware and 3rd party OAuth app abuse. Threat actors employ tactics across email, cloud and web that target specific people in your organization to breach your environment and access sensitive data. Hybrid work...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing fraudtoday.io, you agree to our use of cookies.