Intruder joins Google Cloud Partner Advantage

Someone using Google search on a laptop.

Intruder, the vulnerability scanning and attack surface management platform, today announced it has joined the Google Cloud Partner Advantage program as a technology partner, giving organisations the ability to easily monitor their cloud systems for potential security breaches and vulnerabilities.

As part of the collaboration, customers are able to connect Intruder to Google Cloud to synchronise assets.

With the integration and as a Google Cloud partner, Intruder offers...

Cost-of-living crisis fuelling a rise in cybercrime

A graphic of a padlock.

More than a third (34%) of organisations across UK critical national infrastructure (CNI) anticipate a rise in cybercrime as a direct result of the current economic crisis, according to new research by leading cyber security services firm Bridewell.

The ‘Cyber Security in CNI: 2023’ research report, which surveyed 500 cyber security decision makers in the UK, in the transport and aviation, utilities, finance, government, and communications sectors, found concern is...

Why cyber resilience remains an underrated element of the security strategy

A padlock.

A curious article from February 1’s issue of the Borneo Post shone a light on the gap between expectation and reality when it comes to cyber recovery.

Professional services provider KPMG surveyed Asia-Pacific organisations and found almost three quarters (73%) of CISOs did not have the influence to protect their companies fully. Moreover, while progress has been made on prevention and response programmes, businesses are still underestimating impacts on operations and recovery...

Encryption demand soars as 60% of business data kept on the cloud

The demand for cloud encryption is estimated to increase at a CAGR of 30.9% from 2022-2032. The market valuation is projected to increase by US$ 2.4 Bn by 2022 & US$ 34.8 Bn by 2032.

This is according to Future Markets Insight (FMI), which says organisations are investing in the modernisation of data storage strategy with the adoption of cloud technologies for digital transformation. This is expected to drive growth in the cloud encryption market.

The growing need to...

98.6% of companies have misconfigurations in their cloud environments

An unlocked padlock among jumbled up keys from a computer keyboard.

While the convenience and ease of public cloud technology has had a major impact on enabling scalable business operations to work from anywhere and increase productivity everywhere, the risks around using cloud technology are still slowly being realised and calculated by many organisations as they experience related attacks.

That is according to the Cloud (In)Security research from Zscaler Threatlabz, which analyses cloud workload statistics from over 260 billion daily...

Radware launches a spinoff of its cloud security business

A graphic of a padlock.

Radware, a provider of cyber security and application delivery solutions, has revealed the spinoff of its Cloud Native Protector (CNP) business to form a new company called SkyHawk Security.

To accelerate Skyhawk Security’s development and growth opportunities, an affiliate of Tiger Global Management will make a $35 million strategic external investment, resulting in a valuation of $180 million. Tiger Global Management is a leading global technology investment firm focused on...

F5 launches distributed cloud app infrastructure protection

F5 has launched the F5 Distributed Cloud App Infrastructure Protection (AIP), a cloud workload protection solution that expands application observability and protection to cloud-native infrastructures.

Powered by technology acquired with Threat Stack, AIP is the newest addition to the F5 Distributed Cloud Services portfolio of cloud-native SaaS-based application security and delivery services.

Organisations of all sizes across industries are in the midst of efforts...

Malware-delivering cloud apps almost tripled in 2022

A skull symbol within computer code.

More than 400 distinct cloud applications delivered malware in 2022, nearly triple the amount seen in the prior year, according to research conducted by Netskope, a specialist in Secure Access Service Edge (SASE).

The company's researchers also found that 30% of all cloud malware downloads in 2022 originated from Microsoft OneDrive.

Cloud apps are widely used by businesses, a fact not lost on attackers, which view these apps as an ideal home for hosting malware and...

Views from the field: Shifting left in enterprise cloud security  

A field on a sunny day.

Stuart Green, cloud security architect at Check Point Software, explains how businesses can mitigate cybersecurity risks.  

As of 2022, 94% of enterprises use cloud services. Confidence in the cloud has grown over the last 12 to 18 months, with 35% of organizations having more than 50% of their workloads in the cloud. While businesses are quick to deploy cloud solutions at scale, we’re not seeing the same rapid adoption of preventative cybersecurity measures to keep this...

90% of global enterprises are adopting zero trust

Scrabble tiles spelling 'trust'

Cloud security firm Zscaler has found that more than 90% of IT leaders, who have started their migration to the cloud have implemented, are implementing, or are planning to implement a zero trust security architecture.

Supporting the mass migration to zero trust to secure users and the cloud, more than two thirds (68%) believe that secure cloud transformation is impossible with legacy network security infrastructures or that ZTNA has clear advantages over traditional firewalls...