Tag cloud security

Addressing Cloud Security Gaps Through Runtime Protection

The increasing adoption of cloud-native technologies among organizations has rendered traditional security measures inadequate for combating contemporary threats. While tools such as configuration management and vulnerability scanning play important roles in securing cloud environments prior to deployment, new security vulnerabilities often emerge during runtime—when applications, containers, and workloads are operational.…

Read MoreAddressing Cloud Security Gaps Through Runtime Protection

Fintech Company Marquis Blames SonicWall Security Breach for Hack

In a serious cybersecurity incident, fintech company Marquis has linked a substantial data breach to weaknesses in its security partner, SonicWall. This breach, which occurred in August 2025, reportedly involved unauthorized access to sensitive customer information, including personal details, banking records, and Social Security numbers of numerous clients in the…

Read MoreFintech Company Marquis Blames SonicWall Security Breach for Hack

Groups Caution That $32B Google-Wiz Deal Poses Risks to Cloud Competition

Cloud Security, Regulation, Security Operations Civil Society Organizations Express Concerns Over Potential Impact of Google-Wiz Deal on Cloud Security Michael Novinson (@MichaelNovinson) • January 30, 2026 A coalition of civil society organizations has voiced significant concerns regarding Google’s proposed acquisition of Wiz, arguing that it could severely diminish competition in…

Read MoreGroups Caution That $32B Google-Wiz Deal Poses Risks to Cloud Competition

Upwind Raises $250M to Enhance CNAPP with AI and Data Security Solutions

Cloud Security, Cloud-Native Application Protection Platform (CNAPP), Data Security Series B Round at $1.5B Valuation Fuels Expansion into AI, Application, and Data Security Michael Novinson (MichaelNovinson) • January 26, 2026 Amiram Shachar, co-founder and CEO, Upwind (Image: Upwind) Upwind, a cloud security startup led by a former NetApp executive, has…

Read MoreUpwind Raises $250M to Enhance CNAPP with AI and Data Security Solutions

Why Upwind Is Pursuing $250 Million in Funding with a $1.5 Billion Valuation

Cloud Security, Cloud-Native Application Protection Platform (CNAPP), Security Operations Increasing Investments Could Enhance Cloud Security Competition Against Major Players Michael Novinson (MichaelNovinson) • January 21, 2026 The cybersecurity landscape has experienced a significant shift, transitioning from a dry spell to a surge in funding for emerging companies. See Also: On-Demand…

Read MoreWhy Upwind Is Pursuing $250 Million in Funding with a $1.5 Billion Valuation

Integrating Geopolitical Risk Into Your IT Strategy

Leadership & Executive Communication, Training & Security Leadership Scenario Planning: Enhancing Cyber Resilience Amid Geopolitical Disruptions Jennifer Lawinski • January 14, 2026 CIOs and technology leaders need to understand their organizations’ responses to geopolitical disruptions, emphasizing scenario planning as a vital strategy. (Image: Shutterstock) While IT organizations have established plans…

Read MoreIntegrating Geopolitical Risk Into Your IT Strategy

Orca and Wiz Resolve Legal Disputes Over Cloud Security Patents

Cloud Security, Litigation, Security Operations Patent Board Ruling Invalidates Three Orca Patents, Resulting in Dismissal of Legal Disputes Michael Novinson (MichaelNovinson) • January 7, 2026 In a significant development within the cloud security sector, Orca Security and Wiz have mutually agreed to dismiss their competing patent infringement lawsuits, with an…

Read MoreOrca and Wiz Resolve Legal Disputes Over Cloud Security Patents

How Vulnerable Accounts Predict Incidents

In the evolving landscape of cybersecurity, identity management has become a crucial front line for defenders. According to Verizon’s 2025 report, a staggering 88% of web application attacks were initiated with compromised credentials. Over the past decade, data indicated that one-third of breaches involved such leaks, highlighting the increasing reliance…

Read MoreHow Vulnerable Accounts Predict Incidents