AT&T CSO Bill O’Hern warns the cybersecurity threat landscape is extremely intense now while “vulnerability scanning, credential harvesting is at an all-time high.”
“My primary goal is to be the XDR platform of choice, period, full stop,” said Thomas, who took the reins earlier this month following Michael Cote’s retirement.
“Allow developers to continue to build at a rapid pace. Keep developer productivity increasing, but also being secure at the same time,” Snyk's Peter McKay said.
“We see a lot of weak credentials and unpatched systems. It's the combination of those things that really drive susceptibility,” Black Kite CSO Bob Maley said.
“What we’re hearing from the customers is that they feel like the cybersecurity industry has failed them. And quite frankly, we agree,” Arctic Wolf CEO Nick Schneider said.
New threat reports from Trend Micro, McAfee, and Menlo Security put mobile security in sharp focus and indicate that IoT devices and industrial systems are increasingly at risk.
“The interesting thing about those attacks, is they’re exactly what I was warning my board about three and a half years ago,” Armis CISO Curtis Simpson said.
“The bottom line is that without automation, sudden increases in cloud workloads leads to a dramatic growth in security incidents,” Palo Alto Networks’ Matthew Chiodi said.
The application security startup ended 2020 with more than $350 million in new funding, which pushed its valuation to $2.6 billion, and recorded a 200% year-over-year revenue increase.
A growing number of cybersecurity vendors are realizing that open source can be a powerful tool for protecting customers and staying ahead of attackers.
“It’s natural that the security factors become critical because now they're suddenly very large production loads ... and the world's starting to depend more and more on cloud native,"
McAfee seucrity researcher Doug McKee is paid to hack, using his skills to improve IT security. Here's his advice for aspiring cybersecurity engineers.
Neutron networking open-source options are expanding for OpenStack, but users are still relying heavily on proprietary network virtualization solutions.
F5 veteran Karl Triebes gives a wide-ranging interview on the biggest network security threats of the moment, and the evolving approaches to combatting them.
Every day we read about a massive new data breach. Today it's AT&T and Yahoo. This comes after huge security incidents at Target, Home Depot, and JP Morgan in
The Heartbleed vulnerability has implications for some foundational SDN components. More importantly, it reminds us of the risks behind the big-picture re-imagining that comes with SDN.