Starting off on the right foot in digital defense today means having good Cloud Security Posture Management (CSPM). Although it can be challenging to adopt, this set of strategies and tools manages and orchestrates cloud security in ways other tactics don’t. It shows gaps might arise between organizations’ stated cloud defense policies, their actual posture…

As organizations prioritize digital transformation, they are moving services to the cloud at a rapid clip. Yet when making this shift, many companies fail to make the necessary updates to their security programs and solutions to protect the new cloud perimeter. Rather than redesigning their security infrastructure for the cloud, many organizations are simply wrapping…

Managed security services are undergoing a timely and significant transformation, armed with new hyperscalable technology stacks, hybrid enterprise and cross-cloud protection complexities, and a demand to evolve from 24/7 eyes-on-glass into hands-on customer-integrated early warning and response. If it wasn’t a tired industry cliché we’d probably be adding “next-generation” or NG prefixes to many of…

iboss has raised $145 million in new funding. The financing will be used to support the company’s growth as organizations increasingly recognize iboss as the leading provider of cutting-edge network security through the cloud. The new funding comes as the pandemic has accelerated the ongoing shift to cloud-based cybersecurity providers. As organizations of all sizes…

Many companies tend to jump into the cloud before thinking about security. They may think they’ve thought about security, but when moving to the cloud, the whole concept of security changes. The security model must transform as well. Moving to the cloud and staying secure Most companies maintain a “castle, moat, and drawbridge” attitude to…

Several factors are converging to exert pressure on how security operations centers (SOCs) traditionally function. Evolving information technology (IT) infrastructure, such as cloud migration, serverless services and endpoints being off-network, are straining existing SOC methodologies and tooling. The attack surface is expanding as a result of the distributed workforce and adoption of cloud-based infrastructure and…