Remove category cloud-architecture
article thumbnail

BrandPost: The evolution of security service edge (SSE) and zero trust

CSO Magazine

With the recent publication of Gartner’s updated Magic Quadrant for Security Service Edge , we have been asked by several CXOs about this fast-growing solution category and how it relates to zero trust. Zero trust is a way of thinking permeating across several areas, not just new architecture or technology.

article thumbnail

STEPS FORWARD Q&A: Will ‘proactive security’ engender a shift to risk-based network protection?

The Last Watchdog

Companies are obsessed with leveraging cloud-hosted IT infrastructure and the speedy software development and deployment that goes along with that. LW: Legacy on-prem tools tend to be preventative, advanced on-prem tools are reactive and the shiny new cloud-centric solutions are proactive. Is that fair?

Risk 222
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Anitian Named a Vendor in Gartner Hype Cycle for Enterprise Architecture

Security Boulevard

Link to release via PR Newswire PORTLAND, Oregon — August 27, 2021 — Anitian, the leading cloud application security and compliance automation provider, has been identified in the latest Gartner Hype Cycle for Enterprise Architecture, 2021, cited as a Sample Vendor in the Continuous Compliance Automation (CCA) category.

article thumbnail

BrandPost: How to Stop Ransomware

CSO Magazine

Security Service Edge (SSE) is a relatively new category.

article thumbnail

Top 10 web application vulnerabilities in 2021–2023

SecureList

More than a third (39%) used the microservice architecture. Server-Side Request Forgery (SSRF) The popularity of the cloud and microservice architectures is on the rise. Server-Side Request Forgery (SSRF) The popularity of the cloud and microservice architectures is on the rise.

Passwords 100
article thumbnail

MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

The Last Watchdog

A big reason why APIs haven’t gotten the attention they deserve may be that, from a security standpoint, they fall into a category of hacking tactics known as Living off the Land, or LotL. Legacy security architectures just don’t fit this massively complex, highly dynamic environment.

article thumbnail

GUEST ESSAY: How SIEMS, UEBAs fall short in today’s turbulent threat landscape

The Last Watchdog

Over the past decade, cyber security solutions have evolved into specific categories of solutions. Grouping similar items into categories serve a particular purpose. For example, sports cars represent an entirely different category of vehicles than luxury vehicles. Categories of vehicles are somewhat easy to define.

CISO 140