After a recent prolonged AWS outage (which was followed by “aftershocks” on subsequent days), a CNBC story encapsulated one of the significant conversations stirred by the event: Can big businesses rely on a single vendor, or do they need to spread their workloads in case something like this happens again?
While this year’s Consumer Electronics Show was impacted by COVID, it didn’t stop Lenovo from announcing the first Microsoft Pluton-powered Windows 11 PCs. First announced in 2020, the Pluton is a security processor that Microsoft developed in partnership with AMD and Qualcomm to provide what they called “chip to cloud” security. Pluton is designed to eliminate opportunities for attackers to reduce the attack surface within Windows PCs.
Gr4vy recently announced it raised $15 million. These are the details. Gr4vy — the leading company for cloud-native payments orchestration — recently announced the closing of $15 million in Series A extension funding, led by March Capital with participation from Nyca Partners, Activant Capital, and Plug and Play Ventures.
African mobile games publisher Carry1st has raised $20 million in a financing round led by venture capital firm Andreessen Horowitz, with participation from such big names as Nas, Google and Riot Games.
As part of Andreessen Horowitz’s first investment in a company headquartered in Africa, partners David Haber and Jonathan Lai will join the board of Cape Town, South Africa-based Carry1st, whose games include SpongeBob: Krusty Cook-Off from studio Tilting Point.
Game developer Sky Mavis, play-to-earn gaming guild Yield Guild Games, investment firm Avenir and the founders of Chipper Cash also participated in the capital injection. “In addition, investors from Carry1st’s May...
– Dura Software, specialists in acquiring and operating hyper niche software products, announced it has acquired SecureVideo, a cloud-based software company with extensive experience developing a secure SaaS telehealth platform for the healthcare industry. Expanding the Dura portfolio, SecureVideo is the ninth acquisition for Dura Software and furthers the Dura mission of acquiring niche software companies that serve critical business needs.
Quantum computers could finally be made at large scale after a number of major breakthroughs, the scientists behind them have announced.The new research shows that it is possible to make robust and reliable silicon-based quantum computers, that would be compatible with the existing manufacturing technology we have.Three separate papers in Nature together show that such silicon-based quantum processors are dependable and efficient enough that they could be made and used in the real world.Each of the three papers show quantum computers that are more than 99.9 per cent error free, far above the 99 per cent threshold considered as the...
Gain a comprehensive understanding of the cloud threat landscape from this 2021 IBM report. It combines dark web analysis, IBM Security X-Force Red penetration testing data, IBM Security Services metrics and other data sources to create a full picture of today’s cybersecurity threats.
In the midst of historic digital transformation, not every business is taking the plunge at an equal pace — or experiencing the same level of success. While investments in digital transformation are rising at more than three times the rate of overall IT spend, an estimated 70% of change efforts will fail outright — often due to employee resistance or an overemphasis on technical performance metrics.
Read how DRT Holdings was able to eliminate its print servers and thereby eliminate the costs to purchase, deploy, license, and maintain them with no compatibility issues. Because PrinterLogic creates direct local connections between workstations and printers, print execution is faster. Jobs no longer need to travel through a server — thereby avoiding the risk of complexity and reducing both WAN traffic and the potential for error.
The Chief Security Officer (CSO) at AT&T has noteworthy insights on security and changing network traffic patterns. As businesses increasingly embrace mobile, cloud, and edge, it’s clear that organizations can no longer assume everything “inside the network” is safe. This paper reviews the benefits of using Zero Trust (ZT) principles to effectively manage access control. Learn how implementing a ZT–based program that supports strict yet dynamic management and control of access is paramount and requires networking and security teams to align more tightly. Inside this thought leadership paper, the AT&T CSO has framed Zero Trust concepts into 4 key areas, outlining several critical concepts related to access control that should be considered.
The Forrester Total Economic Impact™ (TEI) study examines the return on investment (ROI) organizations realize with the Saviynt Enterprise Identity Cloud. In this commissioned study, Forrester estimates that implementing Saviynt can save your organization $34.4M and achieve a 240% ROI over three years. How? Saviynt unifies identity governance and administration (IGA), application access governance (AAG), and privileged access management (PAM) into one intelligent solution. Using the power of the cloud, automation, and AI, your organization can efficiently reduce risk and stay in compliance, while gaining greater visibility into the IT ecosystem. Read the study to learn how an investment in Saviynt pays for itself in just three months.
Every company, regardless of size, should have an insider risk management playbook in place to address the insider threat. The human factor is always in play, mistakes will happen that inadvertently place the company at risk. The other side of the human factor are the malevolent individuals who opt to break trust and willingly push aside their NDAs and in-place IT data handling processes and procedures to knowingly abscond with sensitive data.
This Cybersecurity Benchmark report is based on comprehensive research conducted by the Enterprise Strategy Group (ESG). The goal in surveying 500 security and IT professionals was to validate and measure organizations’ alignment with best practices prescribed by the NIST CSF -- a global standard to help organizations identify and mitigate cyber-risk while providing a roadmap for cybersecurity program improvement. CISOs can use the standard to assess their current and target security profile. This report analyzes how an aggressive and mature security strategy is driving business success. Benchmark your cybersecurity maturity and see where your business fits among the survey results of the 16 questions ESG asked to measure a broad set of cybersecurity processes, policies, and controls in use.
True Cloud Confessions: In our first season you will hear from leading retailers as they reveal what it really takes to digitally transform. Get access to:. - Exclusive sit downs with top retailers as they discuss the struggles and learnings they experienced during their digital transformation. - Google insights, talking...
The financial services sector is the world’s most-attacked industry, making security a top priority. But security cannot come at the expense of network performance. How can financial services organizations solve the problem of providing tight cybersecurity and fast, seamless connectivity? A Secure Access Service Edge (SASE) framework provides built-in security, a multilayered defense visible on a single pane of glass, and centralized policy controls that support connectivity at branch locations. Inside you’ll learn how this approach enables financial services organizations to ensure security at the WAN edge with high performance that optimizes connectivity and speed.
Businesses have pivoted quickly to support work from home (WFH) employees, but have learned that legacy infrastructure isn’t up to the task. Legacy VPNs are ill-equipped to manage massive numbers of remote workers, particularly when accessing cloud-based applications. Organizations need to enable access to applications and data, wherever they reside (data center or cloud), and do so in a way that is easily scalable and secure.
It’s time to rethink network security. Traditional remote access solutions buckle under the weight of so many concurrent users, while cloud applications put further strain on network infrastructure and security issues abound. Secure access service edge (SASE) is an emerging architectural approach that combines a full suite of essential networking and security services into one cloud-delivered platform.
Uncertain times are catalysts for change. Some businesses turn inward and shy away from innovation to preserve the status quo. Others adapt and embrace cloud transformation, including operational agility and scalability as means to survive. Central to this is cloud-architected and modern Identity Governance & Administration (IGA). But while the promise of an agile new platform is attractive, the prospect of large-scale transition is daunting.