Snowflake unveils cybersecurity workload to tackle threats with its Data Cloud 

A graphic of a padlock representing cybersecurity.

Data cloud specialist Snowflake has launched a cybersecurity workload that aims to enable cybersecurity teams to better protect their enterprises with the Data Cloud.

Using Snowflake’s platform and an extensive ecosystem of partners delivering security capabilities with connected applications, cybersecurity teams can quickly gain visibility and automation at cloud-scale.

Organisations today are faced with a continuously evolving threat landscape, with 55% of security...

Debunking the top myths about cloud-based physical security

Cloud Myths

Over the years, cloud-based physical security technology has been increasing in power and popularity as many businesses have begun to favour the cloud over on-premises systems. According to cloud security company Thales, 90% of companies worldwide use the cloud. The cloud is essential to data management for most businesses and there are many reasons why. 

Cloud-based technology is sweeping the security industry because of its advanced abilities and unparalleled convenience....

UK firms ‘have limited awareness’ of cloud native security

A padlock on a shed.

Around a third of companies say that between 50-75% of their apps are cloud native, yet 20% have no cloud native security strategy in place.

This is according to a study by Aqua Security, which also found that 68.3% of respondents to its survey also admit that they are not familiar with the term CNAPP (Cloud Native Application Platform Protection), the cloud native security concept introduced by analyst firm, Gartner.

Paul Calatayud, CISO at Aqua Security, said: “As...

Andrew Egoroff, ProcessUnity: On the increased cybersecurity threat and mitigating risks

Cloud Tech caught up with Andrew Egoroff, Senior Cybersecurity Specialist at ProcessUnity, to discuss the increased threat around the Russia-Ukraine crisis and how to mitigate risks from third parties.

A business can implement excellent internal cybersecurity measures, but a slip-up from a third-party vendor can have devastating consequences. ProcessUnity specialises in helping businesses determine what vendors carry the lowest risk.

“We try and evangelise the...

Google acquires cybersecurity firm Mandiant

Thomas Kurian, CEO, Google Cloud.

Google has signed a definitive agreement to acquire Mandiant, a specialist in dynamic cyber defence and response for $23.00 per share.

The all-cash transaction is valued at approximately $5.4 billion, inclusive of Mandiant’s net cash, and will see Mandiant join Google Cloud.

Organisations are facing cybersecurity challenges that have accelerated in frequency, severity and diversity, creating a global security imperative. To address these risks, enterprises need to be...

Siemplify bought out by Google Cloud to bolster security services

Israel

Siemplify, an Israeli cybersecurity start-up, has been bought out by Google’s cloud operation for $500 million (£370m).

The company specialises in end-to-end security services and will be integrated into the Google Cloud platform, and specifically its Chronicle division.

The deal follows Google’s pledge to US President Joe Biden in August 2021 that it would invest $10 billion (£7.38bn) in cybersecurity over the next five years.

Across the industry, tech...

Stephen Boyer, CTO, BitSight: Risk quantification and ransomware

Data Breach

If 2021 stood out for one thing in the cybersecurity industry, it would have to be the rise in security breaches. From lone ransomware incidents on small, digitising businesses to US government data breaches through SolarWinds software, the pandemic instilled a before unseen vitality into cyber criminals and bad actors.

BitSight, currently celebrating its 10th year as a company, works with more than 2,100 customers to provide risk management solutions to half a million...

Ben Jenkins, ThreatLocker: Dealing with the scourge of ransomware

A padlock on a shed.

Threatlocker was founded in 2017. What was it set up to do?

Endpoint security, and we do that by following zero trust. Now, the problem is zero trust is not the best name to describe things. And it's kind of this industry buzzword or buzz term that's come out that we kind of had to stick to using because it’s what people know. But we don't like to describe things as zero trust. 

Essentially, we do it through four main pillars. So we have our application...

Breaking through the cloud security skills gap

Cloud Security

With the proliferation of remote workers over the past eighteen months, companies have had to rely on cloud-based applications to ensure they remained in business. The recent Application Security Report from Fortinet and Cybersecurity Insiders found that 48% of respondents had more than 100 unique applications running in their environment, whilst 26% reported using more than 500 unique applications. This rapid proliferation of applications has intensified current challenges that security...

Ransomware mitigation sees focus from AWS, Azure, Google Cloud

Ransomware mitigation strategies have become an increasingly important aspect of major cloud providers’ offering following the pandemic.

In recent weeks, Amazon Web Services (AWS), Microsoft Azure and Google Cloud have all published articles recommending mitigation tactics and best practice in the event of a ransomware attack.

A ransomware attack occurs when company files are encrypted and money is demanded in exchange for the decryption key and the maintained privacy...