Zscaler Acquires Trustdome for Cloud Security Posture Management Boost
Zscaler acquires Trustdome for cloud security posture management (CSPM) across Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP) & more.
Palo Alto Networks Acquires Cloud Security Posture Management Startup Bridgecrew
Palo Alto Networks acquires Bridgecrew for cloud security posture management (CSPM) & DevOps-related security capabilities.
Sophos Furthers Cloud Security Posture Management (CSPM)
Sophos Intercept X for Server Advanced with EDR (Endpoint Detection and Response) gains Cloud Security Posture Management (CSPM) capabilities across AWS, Microsoft Azure & Google Cloud Platform (GCP).
What Are Cloud Security Posture Management Tools?
What are Cloud Security Posture Management (CSPM) software solutions, and how might they mitigate risk for MSSPs & customers? KuppingerCole offers perspectives.
Cyera, Wiz Announce Cloud Data Security Posture Management Integration
Cyera adds its Data Security Graph to the Wiz cloud platform to help organizations secure data across IaaS, PaaS and SaaS environments.
Application Security Posture Management Acquisition: Snyk Buys Enso Security
The Enso acquisition is part of SnykLaunch June 2023, which consists of new innovations to bolster Snyk’s Developer Security Platform.
CrowdStrike’s 1-Click XDR Elevates Falcon Cloud Attack Path Platform
Cases involving threat actors specifically targeting cloud environments have nearly tripled, says CrowdStrike.
Safe Security Unveils AI-Fueled Cyber Risk Cloud of Clouds Platform with SafeGPT
Safe’s predictive AI data model is co-developed with the Massachusetts Institute of Technology (MIT).
Cloud Security Tops CISOs’ Concerns in EC-Council’s Hall of Fame Report
“As industry leaders, they have been instrumental in driving innovation, enhancing security practices, and protecting organizations from ever-evolving threats.”
OccamSec Offers MSSPs Cyber Threat Exposure Management for APIs, Cloud and Mobile Environments
“By taking a continuous and consolidated approach to threat exposure management, we reduce a complicated problem into the simplest solution.”