Tag: gartner
-
Datenleck durch GenAI-Nutzung
by
in SecurityNews
Tags: ai, chatgpt, ciso, compliance, data-breach, gartner, LLM, risk, strategy, tool, training, vulnerabilityViele Mitarbeiter teilen sensible Unternehmensdaten, wenn sie generative KI-Apps anwenden.Laut einem aktuellen Bericht über Gen-AI-Datenlecks von Harmonic enthielten 8,5 Prozent der Mitarbeiteranfragen an beliebte LLMs sensible Daten, was zu Sicherheits-, Compliance-, Datenschutz- und rechtlichen Bedenken führte.Der Security-Spezialist hat im vierten Quartal 2024 Zehntausende von Eingabeaufforderungen an ChatGPT, Copilot, Gemini, Claude und Perplexity analysiert. Dabei stellte…
-
The Evolving Role of PAM in Cybersecurity Leadership Agendas for 2025
by
in SecurityNewsPrivileged Access Management (PAM) has emerged as a cornerstone of modern cybersecurity strategies, shifting from a technical necessity to a critical pillar in leadership agendas. With the PAM market projected to reach $42.96 billion by 2037 (according to Research Nester), organizations invest heavily in PAM solutions.Why is PAM climbing the ranks of leadership priorities? While…
-
It pays to know how your cybersecurity stacks up
by
in SecurityNewsLike all other business leaders, chief information security officers (CISOs) could find themselves on the unemployment line if something on their watch goes seriously sideways.But what if CISOs simply aren’t demonstrating enough business value?With companies cutting costs, proving cybersecurity programs are good for the business has become vital to protecting budgets and jobs. That’s why…
-
7 tips for improving cybersecurity ROI
by
in SecurityNews
Tags: advisory, ai, attack, business, ciso, compliance, control, corporate, cyber, cybersecurity, data, defense, detection, exploit, finance, gartner, group, incident response, infrastructure, intelligence, metric, monitoring, network, privacy, resilience, risk, risk-assessment, risk-management, service, siem, software, strategy, technology, threat, tool, vulnerability, wafWhen it comes to cybersecurity investments, smart money is directed toward initiatives that deliver the greatest protection at the lowest possible cost. But what appears to be a straightforward calculation can often be anything but.CISOs perennially face challenges securing adequate funding to safeguard the enterprise, placing them often in difficult positions attempting to stretch resources…
-
First Proactive Cloud Native Remediation Platform
by
in SecurityNewsAutomate misconfiguration and vulnerability remediation proactively across on-prem and cloud. Executive Summary Cloud environments have become the backbone of modern organizations, the complexity and volume of misconfigurations and vulnerabilities have emerged as the leading causes of breaches. According to Gartner, cloud misconfigurations account for 65% of cloud breaches. Traditional CNAPPs (Cloud Native Application Protection Platforms)……
-
5 ways boards can improve their cybersecurity governance
by
in SecurityNews
Tags: attack, breach, business, ciso, cloud, cyber, cybersecurity, data, election, endpoint, finance, gartner, governance, government, group, identity, incident, india, infrastructure, jobs, middle-east, network, ransomware, regulation, risk, skills, technology, threat, trainingAs chairman of the board for Cinturion Group, Richard Marshall is intimately involved in ensuring the security of the fiber optic network his company is constructing from India through the Middle East and on to Europe.The monumental Trans Europe Asia System (TEAS) will be difficult enough to build given it will be buried beneath thousands…
-
AI-Enhanced Attacks Accelerate the Need for Hybrid, Multi-Cloud Network Security and Observability
by
in SecurityNewsGartner forecasts generative AI will be used in 17% of cyberattacks within the next two years. This is not surprising, given that we already see examples of threat actors using AI for their operations. The initial use case involves leveraging AI to simplify access to an environment. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/ai-enhanced-attacks-accelerate-the-need-for-hybrid-multi-cloud-network-security-and-observability/
-
VMware migrations will be long, expensive, risky, Gartner warns
by
in SecurityNewsAnd possibly even more so if you don’t start planning yours soon First seen on theregister.com Jump to article: www.theregister.com/2025/01/21/vmware_migration_gartner_advice/
-
Diese Security-Technologien haben ausgedient
by
in SecurityNews
Tags: ai, authentication, bug-bounty, ciso, cloud, compliance, credentials, cyberattack, cyersecurity, firewall, gartner, Hardware, network, password, penetration-testing, risk, service, siem, strategy, tool, vpn, vulnerability, waf, zero-trust -
5 Things Government Agencies Need to Know About Zero Trust
by
in SecurityNews
Tags: access, application-security, attack, best-practice, business, cloud, control, cyber, cybersecurity, data, gartner, government, identity, incident response, infrastructure, Internet, jobs, monitoring, network, nist, risk, skills, strategy, technology, update, vulnerability, vulnerability-management, zero-trustZero trust as a concept is simple to grasp. Implementing a zero trust architecture, on the other hand, is complex because it involves addressing a unique mix of process, procedure, technology and user education. Here are some considerations to keep in mind as you begin your journey. Draft guidance on implementing a zero trust architecture,…
-
Sysdig in neuem CNAPP-Bericht von Gartner zu ‘Customers’ Choice” gekürt
by
in SecurityNewsSysdig gab heute bekannt, dass Sysdig im Gartner-Peer-Insights-Bericht ‘Voice of the Customer for Cloud-Native Application Protection Platforms ” (CNAPPs) als ‘Customers’ Choice” ausgezeichnet wurde. Dies ist das Ergebnis von mehr als 100 Bewertungen in den letzten 18 Monaten, bei denen Sysdig-Kunden 2024 durchschnittlich 4,9 von 5 möglichen Sternen und eine Weiterempfehlungsrate von 99 Prozent vergaben…
-
NDR braucht Deep Observability
by
in SecurityNewsGartner geht davon aus, dass Network-Detection-and-Response-Lösungen (NDR) in maximal fünf Jahren in der IT-Abteilung zur Standardausstattung gehören werden, da sie einen essenziellen Beitrag zur Sicherheit leisten. Dieser Meinung ist auch Helmut Scheruebel, Senior Sales Engineer von Gigamon. Doch damit sie effizient arbeiten können, darf die Sichtbarkeit nicht zu kurz kommen. Nur mit ausreichend Visibility lässt……
-
Sysdig in neuem CNAPP-Bericht von Gartner zu Customers’ Choice gekürt
by
in SecurityNews
Tags: gartnerMit einer perfekten Bewertung von 5 von 5 Punkten in der Kategorie ‘Kundensupport” ist Sysdig das einzige Unternehmen, das sowohl für seine CNAPP als für sein CSPM von Gartner Peer Insights™ die besten Kundenbewertungen erhalten hat First seen on infopoint-security.de Jump to article: www.infopoint-security.de/sysdig-in-neuem-cnapp-bericht-von-gartner-zu-customers-choice-gekuert/a39436/
-
SOAR buyer’s guide: 11 security orchestration, automation, and response products, and how to choose
by
in SecurityNews
Tags: access, ai, api, attack, automation, business, chatgpt, cisco, cloud, compliance, container, cybersecurity, data, detection, edr, endpoint, firewall, fortinet, gartner, google, group, guide, Hardware, ibm, incident response, infrastructure, intelligence, jobs, LLM, malware, mandiant, marketplace, microsoft, mitigation, monitoring, network, okta, risk, saas, security-incident, service, siem, soar, soc, software, technology, threat, tool, training, vulnerability, vulnerability-management, zero-daySecurity orchestration, automation, and response (SOAR) has undergone a major transformation in the past few years. Features in each of the words in its description that were once exclusive to SOAR have bled into other tools. For example, responses can be found now in endpoint detection and response (EDR) tools. Orchestration is now a joint…
-
Microsoft, Ping, Okta Dominate Access Management Gartner MQ
by
in SecurityNewsAccess Management Leaders Remain Unchanged as Customer Identity Cases Proliferate. Advances in customer identity around better user experience, strong authentication, and centralized identity processes have driven rapid growth in the access management market. The space by grew 17.6% to $5.85 billion in 2023 as organizations increasing look to replace homegrown CIAM solutions. First seen on…
-
Reflecting on 2024 at Balbix + Looking Ahead to 2025
by
in SecurityNews2024 has been a transformative year for Balbix. By pushing boundaries in AI and teaming up with industry leaders like NVIDIA, we’ve introduced innovations that are both powerful and easy to adopt. From groundbreaking product launches to earning recognition in key industry reports like Gartner and Forrester, we empowered global customers to reduce cyber risk……
-
Anomaly Detection for Cybersecurity
by
in SecurityNewsA long promising approach comes of age I won’t revisit the arguments for anomaly detection as a crucial piece of cybersecurity. We’ve seen waves of anomaly detection over the years”Š”, “Šand CISA, DARPA, Gartner, and others have explained the value of anomaly detection. As rules-based detections show their age and attackers adopt AI to accelerate their…
-
Check Point im ersten Gartner-Magic-Quadrant für ESecurity-Plattformen führend
by
in SecurityNewsCheck Point Software Technologies gab bekannt, dass das Unternehmen als Leader im Gartner- Magic-Quadrant für E-Mail-Sicherheitsplattformen (ESP) 2024 anerkannt wurde. Check Point bietet leistungsfähige E-Mail-Sicherheit durch , die E-Mail- und Kollaborationsanwendungen vor fortschrittlichen Bedrohungen schützt und sich nahtlos in die integriert, um einen einheitlichen Schutz zu gewährleisten. Als einziger […] First seen on netzpalaver.de Jump…
-
6 Security Vendors Named ‘Leaders’ In Gartner’s Inaugural Email Security Magic Quadrant
by
in SecurityNewsThe first-ever Gartner Magic Quadrant ranking for Email Security Platforms included six companies in the “Leaders” category and 14 companies in total. First seen on crn.com Jump to article: www.crn.com/news/security/2024/6-security-vendors-named-leaders-in-gartner-s-inaugural-email-security-magic-quadrant
-
Inaugural Gartner Magic Quadrant for Email Security Platforms Names Leading Cyber Orgs
Check Point Software Technologies Ltd. has announced that it has been named as a Leader in the 2024 Gartner® Magic Quadrant for Email Security Platforms (ESP). Check Point provides email security through Harmony Email Collaboration, protecting email and collaboration apps from advanced threats, seamlessly integrating with the Check Point Infinity Platform for unified protection. As…
-
Machine Identity Was the Focus at Gartner’s IAM Summit
by
in SecurityNewsLast week’s Gartner IAM Summit in Grapevine, Texas, was a whirlwind of insights, particularly around machine identity management (MIM). The event underscored the transformative trends and challenges shaping the domain, providing both thought leadership and actionable strategies for businesses navigating these complexities. Expanding IAM to Embrace Machine and Non-Human Identities Human identity management and machine……
-
Cloud Access Security Broker ein Kaufratgeber
by
in SecurityNews
Tags: access, ai, api, authentication, cisco, cloud, compliance, control, cyberattack, data, detection, endpoint, exploit, gartner, governance, intelligence, mail, malware, microsoft, monitoring, network, phishing, ransomware, risk, saas, service, software, startup, threat, tool, zero-day, zero-trust -
Thales and Imperva Win Big in 2024
by
in SecurityNews
Tags: access, api, application-security, attack, authentication, banking, business, ciso, cloud, communications, compliance, conference, control, cyber, cybersecurity, data, ddos, defense, encryption, firewall, gartner, group, guide, iam, identity, infosec, insurance, intelligence, malicious, mfa, microsoft, monitoring, privacy, risk, saas, service, software, strategy, threat, usaThales and Imperva Win Big in 2024 madhav Fri, 12/13/2024 – 09:36 At Thales and Imperva, we are driven by our commitment to make the world safer, and nothing brings us more satisfaction than protecting our customers from daily cybersecurity threats. But that doesn’t mean we don’t appreciate winning the occasional award. In the year…
-
SaaS Budget Planning Guide for IT Professionals
SaaS services are one of the biggest drivers of OpEx (operating expenses) for modern businesses. With Gartner projecting $247.2 billion in global SaaS spending this year, it’s no wonder SaaS budgets are a big deal in the world of finance and IT. Efficient SaaS utilization can significantly affect both the bottom line and employee productivity.…
-
The imperative for governments to leverage genAI in cyber defense
by
in SecurityNews
Tags: ai, attack, cyber, cyberattack, cybersecurity, dark-web, data, deep-fake, defense, detection, email, endpoint, gartner, government, incident response, infrastructure, intelligence, LLM, malicious, malware, microsoft, strategy, tactics, threat, tool, training, vulnerabilityIn an era where cyber threats are evolving at an unprecedented pace, the need for robust cyber defense mechanisms has never been more critical. Sixty-two percent of all cyberattacks focus on public sector organizations directly and indirectly. Nation-state actors, equipped with generative artificial intelligence (genAI) sophisticated tools and techniques, pose significant threats to national security,…