Confluera | February 19, 2022
Confluera, the leading provider of next-generation cloud cyber attack detection and response, today released the findings of their latest research report, which explores how IT leaders detect, evaluate, and act against cybersecurity threats in today's cloud environment. The study, 2022 Cloud Cybersecurity Survey Report, showcases the perspective of 200 U.S. IT leaders at medium to large sized organizations and how they are tackling the increasingly complex remote, cloud-centric IT security landscape.
The majority of organizations are accelerating their cloud adoption with 97% of IT leaders surveyed stating that their strategy includes the expansion of cloud deployments. The strategy includes expansion in scale and in many cases, the adoption of multiple platforms such as AWS, Google Cloud and Azure. This strategy is not without its challenges, however. Approximately, 63% of IT professionals identified cyberthreats designed to target cloud services as the top obstacle to their cloud strategy.
Cloud and multi-cloud adoption has greatly increased the workload of already burdened IT teams. Of the 200 IT leaders surveyed, only about half of the respondents said that they are adequately staffed to manage the frequency of alerts they receive. IT teams spend 54% of their time investigating security alerts, with over half of those alerts turning out to be false or benign alarms. As threats within the cloud proliferate, IT leaders are looking for solutions to help them quickly separate the signal from the noise so they can act on the real threats promptly. Some key findings of the survey as it relates to cloud deployments are below.
More than 65% of IT leaders said cloud IaaS adoption (AWS, Azure, Google Cloud, etc.) was the primary contributor to their increased workload in 2021
When asked what challenges were associated with adopting multiple cloud platforms,
69% said maintaining consistent cybersecurity coverage across all cloud infrastructures
Nearly 50% said securing the resources to manage different cloud infrastructures
Nearly 45% identified the difficulty detecting threats progressing from one cloud infrastructure to another
"While accelerated cloud adoption continues to be a critical element in adapting to the new way of doing business, it has strained IT leader's ability to manage their workload, Organizations need to ensure proper people, processes, and tools are in place for the team to expand the complex cloud environments without sacrificing their attention to security."
John Morgan, CEO of Confluera
Morgan continued, "To make matters worse, the Great Resignation has demonstrated the burnout that workers across the U.S. economy are feeling, and nowhere is this burnout more obvious than in the cybersecurity teams. Organizations must ensure frequent conversations between executives and cybersecurity managers to ensure they are well equipped to adequately manage alerts, maintain systems, and avoid burnout within their teams.
Other key findings include the following:
85% of IT leaders said that they experienced increased workload due to shift in work model including remote workers
Nearly 70% of IT leaders said that the change in work model has made it more difficult to keep company resources secure
Nearly 59% of all alert investigations turn out to be false alarms or benign activities
90% of IT leaders said they create threat storyboards but close to 60% rely on third-party services to create storyboards after the incident
Not all findings in the report were so glum, however. In a positive sign, 84% of IT leaders were optimistic about their cybersecurity readiness for 2022. The majority of respondents note the availability of new cybersecurity tools as the reason for their positive outlook, with 59% saying that a Detection and Response solution for the cloud, or CxDR, is the innovation they are most excited about for future deployment.
"2021 was a tough year for many IT leaders, but the market is now providing organizations with the tools they need to effectively manage the infrastructures they have and even expand them further," added Morgan. "Given proper resources and effective communication, IT leaders have every right to be positive as we move into the new year."
About the Study
Confluera commissioned an independent research firm to survey U.S. IT leaders using a national network of verified panel providers. A total of 200 respondents completed the survey, which was conducted between December 3-7, 2021. Those surveyed included those with senior titles, including Manager, Director, and VP/C-level. The margin of error for this study is +/-5.9% at the 95% confidence level.
Confluera is the leading provider of next-generation Cloud eXtended Detection and Response (CxDR) solutions. Recognized by Forbes as one of the Top 20 Cybersecurity Startups to Watch in 2021, Confluera's storyboard technology automates cyber attack analysis making small and large security teams more efficient. The solution has unprecedented visibility of attacks in the cloud and modern application architectures, reveals threats in real-time, and will shut down advanced multistage attacks.
SlashData | September 19, 2020
For immediate release
London, United Kingdom
Media contact at SlashData Ltd.
Viktorija Ignataviciute firstname.lastname@example.org
Best practises engaging Open Source and DevOps developers Developer trends; Tracking Covid effect on the industry
While industries, businesses and individuals are being challenged significantly, the Future Developer Summit is determined to turn this into an enhanced learning opportunity, open to all Developer Relations, Marketing and Advocacy community members.
Traditionally hosted in the Bay Area, CA, the 5th Future Developer Summit invites its guests to join the event remotely on 29-30 Sep & 6-7 Oct, ensuring the safety of all stakeholders. For the first time this year, the Summit offers 2 tracks: Open Source and DevOps.
Thought leaders at the Future Developer Summit
Industry leaders are coming together to discuss the future of developer marketing and developer relations. Director and VP level representatives from CNCF, Google, Microsoft, Comcast, HashiCorp, Intel, Salesforce, Facebook, MongoDB, Futurewei, Eclipse Foundation, Indeed.com, Expedia, Nutanix, and more.
Jono Bacon - author of “People Powered” and Mary Thengvall - Director of Developer Relations at Camunda are joining as event’s co-hosts. Follow new announcementsat futuredeveloper.io/
• Mike Milinkovich, Executive Director at Eclipse Foundation
• Nithya Ruff, Executive Director, OSPO at Comcast
• Stormy Peters, Director of Open Source Programs Office at Microsoft
• Adam FitzGerald, VP, Developer Relations at HashiCorp
Lightning talks - hear about successes and failures from:
• Melissa Evers-Hood - VP, Intel Architecture, Graphics and Software at Intel
• Priyanka Sharma - General Manager at CNCF
• Chris Kelly - Director, Open Source and Engineering Engagement at Salesforce
• Grace Francisco - VP, Global Developer Relations & Education at MongoDB
• Anni Lai - Head of Open Source Operations and Marketing, Cloud at Futurewei
• Duane O'Brien - Head of Open Source at Indeed.com
• Tobie Langel - Principal and founder, UnlockOpen
• Satya Singh - Principal Product Manager - Platform & Marketplaces at Expedia
• Mark Lavi - DevOps and Automation Solutions Architect at Nutanix
• Tamao Nakahara - Head of Developer Experience at Weaveworks
• Amr Awadallah - VP, Developer Relations at Google
• On 29-30 Sep & 6-7 Oct. Full agenda at futuredeveloper.io/
• The highest rated industry event with a Net Promoter Score - 94!
- Jono Bacon - author of “People Powered”
- Mary Thengvall - Director of Developer Relations at Camunda
• Remote friendly event for the global tech leaders community
• Summit offers 2 tracks: Open Source and DevOps
• 2 networks to join: Community and Exclusive
• Registration is free for all attendees. We do invite you to voluntarily contribute to Black Girls Code
• This year’s Summit coincides with SlashData’s 10-year anniversary of developer research. Join us to celebrate together!
▶ Reporters can redeem the Media Pass here.
▶ General Admission is available here.
*Senior audience only
Exclusive edition - announcement
The Future Developer Summit is opening its doors in 2 weeks! Don’t miss a chance to join an outstanding crew of industry thought leaders bringing the best learning experience for Developer Relations, Marketing and Advocacy community members.
Exclusive edition on 6-7 October
Your Unique Executive Networking Opportunity in a remote-first world
Two industry panels
How do industry leaders approach contribution to open source?
• Sam Ramji - Chief Strategy Officer at DataStax
• Chris DiBona - Director of Open Source at Google
• Nithya Ruff - Executive Director, OSPO at Comcast
• Stormy Peters - Director of Open Source Programs Office at Microsoft
The diversity of DevOps approaches and how customers are adopting it?
• Kelsey Hightower - Staff Developer Advocate, Google Cloud Platform at Google
• Greg Wilson - Director of Cloud Developer Relations at Google
• Nicole Forsgren - VP, Research and Strategy at GitHub
• TBA very soon!
Two fireside chats with:
• Jono Bacon - author of “People Powered”
• Kathy Kam - Head of Open Source & Developer Advocacy at Facebook
Two Master Classes
Using practical examples, and a lot of data as usual, we will be demonstrating how you can increase your DevRel ROI by taking data-backed decisions and what are the key reasons for using data in your decision making process.
Availability is limited → Secure Your Executive Seat
Palo Alto Networks | April 22, 2022
Palo Alto Networks , the global cybersecurity leader, today announced that its IoT Security solution has achieved Federal Risk and Authorization Management Program (FedRAMP) Moderate Authorization. The company's sponsoring agency is the United States Department of Veterans Affairs (VA).
U.S. federal agencies are increasingly focused on adopting a Zero Trust architecture to ensure their IoT devices meet federal security compliance requirements. With this authorization, Palo Alto Networks IoT Security can help federal agencies protect their unmanaged IoT devices with ML-powered visibility, threat prevention and Zero Trust enforcement with a single platform.
"As cyberattacks become more frequent and sophisticated, the IoT Security solution helps automate Zero Trust security with quick, accurate discovery and best-in-class protection. We are committed to protecting the U.S. government and its federal agencies from all security threats with reliable solutions."
Dana Barnes, senior vice president of Public Sector, Palo Alto Networks
Digital transformation across all industries is driving massive growth in the use of IoT devices. Palo Alto Networks Unit 42 IoT Threat Report found that 30% of all devices on enterprise networks fall in the IoT category.
Unfortunately, IoT devices and their inherent vulnerabilities are often overlooked, which can lead to enterprise-wide exposure to unseen cyber risk. Federal officials have adopted several provisions in recent years to increase overall protection and awareness of IoT device security vulnerabilities, including the Internet of Things Cybersecurity Improvement Act and the National Institute of Standards and Technology's (NIST) IoT Device Cybersecurity Guidance for the Federal Government.
The IoT Security solution's Moderate Authorization extends the offerings Palo Alto Networks provides its U.S. government customers. This authorization adds to the portfolio of other authorized products already being deployed today.
The IoT Security solution helps U.S. agencies leverage their current Palo Alto Networks Next-Generation Firewalls (NGFWs) to secure all unmanaged IoT devices at scale. Some of the key benefits for government agencies include:
Quick and accurate discovery and insights into all devices, even those never seen before
Best-in-class protection with behavior analysis to detect risk, compliance, and anomalous activity, and prevention of known and unknown threats
Automated Zero Trust security with automated discovery, least-privileged access policies, and 1-click enforcement
Workflow automation across existing IT and security solutions and simplified agentless and sensorless deployment
About Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.
S2W | January 03, 2022
Data Intelligence company S2W announced that INTERPOL has recently signed a contribution agreement introducing S2W's cyber threat intelligence (CTI) solution "S2-XARVIS ENTERPRISE" to strengthen its ability to analyze new cyber threats such as dark web and ransomware.
S2W has been supporting INTERPOL to identify and prevent "third-world dark web crimes" as part of its "binding the gap among member countries for a safer world," and recently conducted international ransomware organization arrest operation such as Revil, Cl0p, and GandCrab.
"INTERPOL is strengthening the use of advanced information and communication technologies such as artificial intelligence and big data and expects that the introduction of S2W's cyber threat intelligence (CTI) solution – S2 XARVIS Enterprise will directly help to prevent nationwide cybercrime through real-time threat detection and dark web/deep web coverage,"
Robert Han, Head of Global Business of S2W
Sangduk Suh, CEO of S2W said "We are focusing on providing services to institutions and companies so that we can build a strong security environment using threat intelligence (TI) information, and through this, we will contribute to eradicating international cybercrime."
S2W is a Data Intelligence company, established in 2018, that extracts and provides actionable intelligences optimized for each client's needs from numerous data.
Specialized intelligence provided by S2W can cover multiple industries with its unique data collection and big data analysis for the Dark Web and Deep Web.
S2W solutions protect clients from various cyber threats and data leakage, such as personal information, financial information, confidential information within organizations through top-notch data collection and detection technologies.