Ben Jenkins, ThreatLocker: Dealing with the scourge of ransomware

A padlock on a shed.

Threatlocker was founded in 2017. What was it set up to do?

Endpoint security, and we do that by following zero trust. Now, the problem is zero trust is not the best name to describe things. And it's kind of this industry buzzword or buzz term that's come out that we kind of had to stick to using because it’s what people know. But we don't like to describe things as zero trust. 

Essentially, we do it through four main pillars. So we have our application...

Head in the clouds: Securing a path to the cloud for your business

A mountain pathway through clouds.

The International Data Corporation (IDC) has dubbed 2021 The Year of the Multicloud, and with good reason.

Even prior to the pandemic, the market for cloud tools was broadening and becoming increasingly complex, giving businesses a lot to think about as they started to ramp up their digital transformation efforts. For small to medium-sized businesses in particular, the path to the cloud can often seem like a series of daunting hurdles with difficult questions to answer at...

Breaking through the cloud security skills gap

Cloud Security

With the proliferation of remote workers over the past eighteen months, companies have had to rely on cloud-based applications to ensure they remained in business. The recent Application Security Report from Fortinet and Cybersecurity Insiders found that 48% of respondents had more than 100 unique applications running in their environment, whilst 26% reported using more than 500 unique applications. This rapid proliferation of applications has intensified current challenges that security...

Most businesses are not protecting their sensitive data in the cloud

A padlock on a keyboard.

As many as 40% of organisations have experienced a cloud-based data breach in the past 12 months. 

Despite increasing cyber-attacks targeting data in the cloud, the vast majority (83%) of businesses are still failing to encrypt half of the sensitive data they store in the cloud, raising even greater concerns as to the impact cyber criminals can have.

These details have been unveiled in the 2021 Thales Global Cloud Security Study, commissioned by Thales and conducted...

Forcepoint acquires Bitglass to bolster its SASE architecture

Forcepoint CEO - Manny Revilo

Cloud cybersecurity leader Forcepoint is continuing its M&A spree this year with its latest acquisition of Silicon Valley startup, Bitglass.

Bitglass delivers a cloud-native security service edge (SSE) platform that secures access to and usage of information as organisations undergo transitioning to the cloud.

Forcepoint plans to use the platform to complement its data-first secure access service edge (SASE) architecture.

The expectation is that this move...

5 ways cloud-based technology is changing the game for enterprise security

A security camera.

Today’s enterprise organisations are having to play by a new set of cyber and physical security rules. Hackers are getting more advanced, and finding new and faster ways to breach security protocols. The traditional models, in which cybersecurity and physical security teams operate as separate entities, can no longer ensure companies stay protected from the latest threats. Even with converged cyber and physical security teams, a key piece of a successful security strategy is having the...

Todd Boehler, ProcessUnity: Risk management, digital transformation and the role of the CISO 

Could you tell us a little bit about ProcessUnity and what it does? 

We're a cloud provider of risk management program automation. 

We help organisations make risk management activities more effective and efficient in their businesses. We have a core concentration around third-party risk and cybersecurity program management, but we also help customers across the entire GRC (governance, risk...

Ransomware mitigation sees focus from AWS, Azure, Google Cloud

Ransomware mitigation strategies have become an increasingly important aspect of major cloud providers’ offering following the pandemic.

In recent weeks, Amazon Web Services (AWS), Microsoft Azure and Google Cloud have all published articles recommending mitigation tactics and best practice in the event of a ransomware attack.

A ransomware attack occurs when company files are encrypted and money is demanded in exchange for the decryption key and the maintained privacy...

Cloud and Cyber Security Expo 2021: COVID-19, development security, and risk vs. reward

A graphic of a padlock representing cybersecurity.

An Allied Market Research (AMR) forecast has shown that the global cloud services market will rake in $555 billion in revenues this year. 

This indicates a 17.5% overall growth rate for the cloud computing industry from the previous year. There’s no doubt that the COVID-19 pandemic has accelerated cloud adoption around the globe and, with it, organisations’ cybersecurity risks have also been ramped up.

The Cloud and Cyber Security Expo 2021, hosted this week in...

Greg Day, Palo Alto Networks: On protecting our way of life in the digital age

Security threats have evolved considerably over the years and Palo Alto Networks knows more than most that “protecting our way of life” also requires a digital approach in the modern world.

Historically, nations would protect their way of life by having the sharpest swords, the biggest guns, the sturdiest tanks, or the fastest planes. Nowadays, it’s as much – if not more – about who has the most secure networks and systems.

CloudTech spoke with Greg Day, VP...