Akamai’s $450 million acquisition of No Name Security marks a pivotal point in API security. Oz Golan, Noname's CEO and Akamai's vice president of API security, discusses the integration plans, technological synergies, and future growth opportunities that come with Akamai’s extensive customer base.
Illumio's Andrew Rubin explains how AI enhances zero trust security by improving labeling accuracy, which is essential for effective segmentation. Rubin discusses AI's potential to streamline security processes and covers key partnerships with firms such as Microsoft, Netskope and Wiz.
Check Point Software tapped the longtime leader of an Israeli cybersecurity incubator to be just the second CEO in the firewall behemoth's 32-year history. The company selected Team8 co-founder and Managing Partner Nadav Zafrir to replace Gil Shwed, who has led Check Point since inception in 1993.
CISA is grappling with the aftereffects of a major hacking incident that allowed threat actors to exploit multiple gateways crucial to the U.S. cyber defense agency. Thomas Pace, CEO of NetRise, said, "The hardest problem to address is the breadth of what has been compromised."
Cisco on Monday patched a zero-day vulnerability discovered months ago that allowed a China-nexus hacker to execute arbitrary commands as root on the compromised devices. The threat group, dubbed Velvet Ant, remotely connected to Cisco's NX-OS software used in switches and executed malicious code.
Juniper Networks released an out-of-band fix for a maximum-severity vulnerability that can allow hackers to bypass authentication in three Juniper products. The CVSS 10-rated bug could allow an attacker to take full control of a compromised system.
The Cybersecurity and Infrastructure Security Agency confirmed Monday that hackers attacked one of its critical tools housing private sector chemical security plans earlier this year after gaining access by exploiting vulnerabilities found in Ivanti products used by the cyber defense agency.
At the Gartner Security and Risk Management Summit, Thomas Lintemuth, vice president analyst at Gartner, discussed how network security tooling has evolved, blending technologies such as firewall, SSE, NDR and SASE. He covered VPNs, microsegmentation and the deployment of policy enforcement points.
A suspected Chinese hacking group used open-source rootkits to ensure persistence on compromised edge devices such as VMware ESXi servers for espionage campaigns, Google Mandiant said. The hacking group, which Mandiant tracks as UNC3886, is likely a Chinese threat group hacking for Beijing.
Chinese hackers breached thousands of vulnerable Fortigate network security appliances in a cyberespionage campaign "much larger than previously known," a Dutch cybersecurity agency warned Tuesday. Even fully patched FortiGate devices may still be infected.
As CISO at Arista Networks, Rahul Kashyap oversees cybersecurity operations and incubates business initiatives. If you look back to 10 years ago, it was a different monolithic enterprise network, Kashyap said, emphasizing the complexity of contemporary networks.
Organizations need to bring together IT and network teams to enhance visibility into ever-expanding networks, update security policies and ensure their networks remain free of disruption, and automation can play a major role in making these tasks quick and efficient, said Tufin CEO Raymond Brancato.
Zscaler is going all in in its investment in AI to bolster its customers' ability to stay ahead of threat actors, including the company's recent purchase of Avalor and by hiring a chief AI officer, said Jay Chaudhry, the company's founder, chairman and CEO.
Researchers identified major security vulnerabilities in F5's Next Central Manager that could allow hackers to gain a persistent, undetectable presence within any organization's network infrastructure connected to F5 assets, according to a Wednesday report.
Private equity giant Thoma Bravo agreed to buy Darktrace for $5.32 billion just 19 months after deal talks between the two sides fell apart. The take-private deal would accelerate Darktrace's organic growth and allow it to pursue acquisitions and leverage Thoma Bravo's operational best practices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.