Netskope Zero Trust Data Protection brings best-in-class Data Loss Prevention (DLP) together with innovative technologies like machine learning and User and Entity Behavior Analytics (UEBA) onto a converged Security Service Edge (SSE) platform for context-aware access to data based on zero trust principles across web,...
Get tips and tricks for transitioning to a cloud-delivered DLP
Good DLP doesn’t have to be complicated—or costly. That’s why we wrote Modern DLP for Dummies, a new book that examines important data protection techniques and provides a roadmap for your transition to fully modern, cloud-delivered DLP.
What...
In our fast-paced digital world, data is exploding in volume, variety, and speed, driving exciting new trends like AI/ML tools and an expanding SaaS/cloud footprint. Yet, these trends also bring unforeseen data security risks and code exposure.
Enter Cloudflare One: A solution designed to address these modern...
The surge in cloud services and cross-border data storage presents challenges for global law enforcement.
Service providers face complexities in handling government data requests, given the entrusted user data. Differences in global data protection standards, add intricacies to legal frameworks. These disputes...
CrowdStrike plans to purchase a data security posture management startup led by an Israeli Defense Forces team leader to safeguard information across endpoints and clouds. The proposed Flow Security deal will give CrowdStrike visibility into cloud data flows and how data interacts with applications.
Unlike identity theft, first-party fraud is harder to spot when a consumer opens an account. To guard against this growing blind spot, banks need to invest in transaction-monitoring tools and take a more holistic approach to fraud, said Ian Mitchell, co-founder of Mission Omega.
It looks as if Carbon Black's days as part of Broadcom are numbered. Broadcom CEO Hock Tan told staff at newly acquired VMware in both an email and town hall meeting that he plans to "review strategic alternatives." The move comes just four years after VMware purchased Carbon Black for $2.1 billion.
Zscaler infused generative AI features into its data protection bundles and is introducing AI-powered products that quantify risk and predict breaches, said CEO Jay Chaudhry. The cloud security firm enhanced its data protection policies for AI/ML apps and tools to lower the likelihood of data loss.
Proofpoint has agreed to purchase a cloud email security provider founded by HSBC, RBS, Santander and UBS alumni to apply artificial intelligence to evolving threats. The proposed acquisition of Boston-based Tessian will help Proofpoint address common forms of data loss including data exfiltration.
Proofpoint will have its third CEO since March 2022 after tapping recently hired CFO Remi Thomas to become its interim top leader. The company selected Thomas to replace Ashan Willy, who started as Proofpoint's CEO just 19 months ago and is exiting to pursue an opportunity outside cybersecurity.
A data security startup led by a Microsoft and Google veteran and backed by Samsung and CrowdStrike could soon be acquired by Palo Alto Networks. The company is in advanced talks to buy data security posture management startup Dig Security for between $300 million and $400 million.
A late-stage SASE startup led by a serial entrepreneur hauled in a massive equity investment to address the feature and capability needs of large enterprises. The $238 million in funding will allow Cato Networks to more tightly align CASB and DLP with SASE to safeguard cloud apps and sensitive data.
Zscaler's ability to inspect traffic in-line and secure application-to-application communications has driven massive growth in its data protection business, CEO Jay Chaudhry said. Customers have embraced Zscaler's data protection technology over incumbents such as Symantec as well as CASB tools.
In the world of malware analysis, there is sometimes confusion between the terms “artifacts” and “indicators of compromise (IOCs).” This is understandable because many malware analysis engines don’t distinguish between the two.
The issue for malware analysts is how does one find these meaningful IOCs, small...
Sophisticated cyberthreats are challenging businesses of every size. From nation-state attacks to supply chain breaches, today’s threats are stealthier, faster, and highly advanced – purposefully designed to compromise and extort your data in new ways.
In this session, we’ll explore the critical role of data...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.