Cloud security uncertainty: Do you know where your data is?

How well are security leaders sleeping at night? According to a recent Gigamon report, it appears that many cyber professionals are restless and worried. In the report, 50% of IT and security leaders surveyed lack confidence in knowing where their most sensitive data is stored and how it’s secured. Meanwhile, another 56% of respondents say […]

The post Cloud security uncertainty: Do you know where your data is? appeared first on Security Intelligence.

Continue reading Cloud security uncertainty: Do you know where your data is?

Axonius Banks $200 Million in Late-Stage Funding 

Axonius has raised approximately $600 million since 2017 and is considered one of cybersecurity’s so-called unicorns with a valuation of $2.6 billion.
The post Axonius Banks $200 Million in Late-Stage Funding  appeared first on SecurityWeek.
Continue reading Axonius Banks $200 Million in Late-Stage Funding 

Censys Banks $75M for Attack Surface Management Technology

Michigan startup raises $75 million in new funding as venture capital investors bet big on attack surface management technologies.
The post Censys Banks $75M for Attack Surface Management Technology appeared first on SecurityWeek.
Continue reading Censys Banks $75M for Attack Surface Management Technology

How I got started: Attack surface management

As the threat landscape multiplies in sophistication and complexity, new roles in cybersecurity are presenting themselves more frequently than ever before. For example, attack surface management. These cybersecurity professionals are responsible for identifying, mapping and securing all external digital assets an organization owns or is connected to. This includes servers, domains, cloud assets and any […]

The post How I got started: Attack surface management appeared first on Security Intelligence.

Continue reading How I got started: Attack surface management

Moving beyond vulnerability scanning to strengthen your attack surface

Staying one step ahead of potential breaches is a top priority for security teams within organizations of all sizes. Vulnerability scanning has long been a foundation of these efforts, allowing businesses to identify weaknesses in their security posture. However, as cyberattacks grow in sophistication and scale and with a large number of Common Vulnerabilities and […]

The post Moving beyond vulnerability scanning to strengthen your attack surface appeared first on Security Intelligence.

Continue reading Moving beyond vulnerability scanning to strengthen your attack surface

How to Manage Cyber Risk During Mergers and Acquisitions

By attracting attention from threat actors, merger and acquisition (M&A) events are a significant source of cyber crime risk. So much so that, according to a 2020 IBM Institute of Business Value study, more than one in three executives said they experienced data breaches that can be attributed to M&A activity during integration. Security ratings, […]

The post How to Manage Cyber Risk During Mergers and Acquisitions appeared first on Security Intelligence.

Continue reading How to Manage Cyber Risk During Mergers and Acquisitions

HEAT and EASM: What to Know About the Top Acronyms at RSA

The cybersecurity industry is littered with acronyms. SIEM. EDR. APT. CISO. CISA. The list goes on and on. So it wasn’t surprising that there were a lot of acronyms in RSAC 2023’s sessions and keynotes, as well as in the dozens of news items and studies released during the conference. The hottest acronym, by far, […]

The post HEAT and EASM: What to Know About the Top Acronyms at RSA appeared first on Security Intelligence.

Continue reading HEAT and EASM: What to Know About the Top Acronyms at RSA

Four Ways to Harden Your Network Perimeter

With the threat of cyberattacks on the rise worldwide, hardening your organization’s network perimeter has never been more critical. Many organizations have begun to focus more on actively securing and monitoring their externally facing assets to fend off cyberattacks from enemy nation-state actors and cyber criminals. By implementing the four best practices listed below, you […]

The post Four Ways to Harden Your Network Perimeter appeared first on Security Intelligence.

Continue reading Four Ways to Harden Your Network Perimeter