Zscaler Copilot, Advanced by NVIDIA AI Enterprise, Delivers Security Controls to Proactively Defend Against New Cyber Threats
COMPANY NEWS: Zscaler, Inc. (NASDAQ: ZS), a leader in cloud security, today announced a collaboration with NVIDIA to accelerate AI-powered copilot technologies. Zscaler will leverage NVIDIA AI technologies to deliver new user experience and security-centric copilot services to the enterprise. The introduction of new AI capabilities, leveraging NVIDIA NIM inference microservices, NVIDIA NeMo Guardrails, and the NVIDIA Morpheus framework, will dramatically increase the ability to process data from the Zero Trust Exchange™ platform, further enhancing Zscaler copilot’s ability to proactively defend enterprises against cyber threats and simplify IT and network operations.
Collaboration advances zero trust strategies with Chrome Enterprise, Google Workspace and Google Security Operations without the need for legacy VPNs
COMPANY NEWS: Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, has doubled down on their partnership with Google to help organisations simplify and strengthen their approach to Zero Trust. The integration with Chrome Enterprise will provide hundreds of millions of enterprise users with advanced threat and data protection without the need for legacy VPNs or requiring additional browsers. In addition, the integration of Zscaler with Google Workspace helps prevent the exfiltration of sensitive enterprise data from apps like Gmail and Drive. And the sharing of Zscaler’s rich security telemetry with Google Security Operations enables organisations to strengthen their security operations, all from the cloud. This work with Google further strengthens Zscaler’s Zero Trust Exchange platform.
There has been an increase in AI-driven phishing attacks in Australia with research revealing that Australia is within the top 10 countries alongside US, UK, India and Germany targeted by phishing scams.
COMPANY NEWS: Company launches revolutionary CNAPP with unique Offensive Security Engine that thinks like a hacker to move beyond the theoretical and deliver Verified Exploit Paths
With Cisco Secure Application on the Cisco Observability Platform, customers have more flexibility and choice when it comes to tackling their most difficult security challenges.
GUEST INTERVIEW: iTWire caught up with Jussi Wäre who runs Salesforce cloud protection for WithSecure. He told us about the company's heritage, its new, Australian-based security cloud and the state of the industry.
GUEST RESEARCH: New research released by cybersecurity company Illumio has found that in the last year, nearly half of all local data breaches originated in the cloud, and more than 60% of local security workers believe cloud security is lacking and poses a severe risk to their business operations.
GUEST INTERVIEW: iTWire met with Illumio's Head of Industry Solutions, Raghu Nandakumara, to discuss how Zero Trust Segmentation is the best solution to cloud security.
COMPANY NEWS:
GUEST OPINION by Tim O’Neill, BitTitan Cybersecurity threats continue to evolve, with bad actors engaged in a perpetual mission to exploit network vulnerabilities. When we think we are doing enough, there’s always more to be done.
Global cloud security and content delivery network Akamai Technologies has completed 20 years of operations in the Asia-Pacific region and Japan,and says it it bullish about the future as customer demand continues to grow.
GUEST RESEARCH: Cado Security, provider of the first cloud forensics and incident response platform, today announced the release of Cado Security Labs 2023 Cloud Threat Findings Report. The report reveals noteworthy discoveries about the evolving cloud threat landscape, shedding light on the heightened risk of cyberattacks due to the rapid adoption of cloud-focused services.
COMPANY NEWS: Check Point Software Technologies, a leading provider of cyber security solutions globally, continues to deliver on its promise to provide the best security to organisations of all sizes around the world.
GUEST RESEARCH: Gigamon, the leader in deep observability, today announced its Hybrid Cloud Security trends report, emphasising a significant gap between the perception and reality of how secure organisations truly are from cyberthreats.
GUEST OPINION: It's humbling to see customers adopt cloud security vision technology. It's humbling to see predictions come true, doubly so when competitors start to follow the leader.
A survey of 501 C-suite to IT professionals in the US, UK and Germany, to gauge industry trends, has found that 88% experienced at least one cloud security incident in the last 12 months.
COMPANY NEWS: Aqua Security, the pioneer in cloud native security, today announced the launch of Real-Time CSPM, a next-gen cloud security posture management (CSPM) solution, offering the best visibility and context in the industry.
GUEST OPINION: For those wondering, “What is data localization?” it is essentially the imposition of geographic, geopolitical, and legal constraints on data. It is about compelling organizations to store the data they obtain or generate from residents in a specific country within that country before it is transferred overseas. More importantly, it entails the need to subject such data to local laws and regulations.
Cloud security is the greatest concern for cybersecurity professionals according to an online survey by Privileged Access Management (PAM) solutions provider Delinea.
According to the Secureworks Counter Threat Unit, business email compromise has doubled, and has surpassed ransomware as the most common type of financially motivated cyber threat to organisations.
Everyone got a bit of what they wanted. No one got everything, that sounds like the basis for a good[…]
Is this article ironic?
The safest way not to get snared is to avoid anything financial on your devices plus do not participate in[…]
Who do we trust here? A professional cloud provider with many customers or a monopolistic ticketing agency that can never[…]
I knew this scam was full of shit because it didn't present any actual evidence of the supposed hacker having[…]