Magazine Button

More News

Didier Levesten, COO, Wallix


Attivo Networks launches CIEM Solution to deliver visibility

Attivo Networks, a leader in identity detection and response, has announced a new Cloud Infrastructure Entitlement Management (CIEM) solution, IDEntitleX, designed to deliver visibility and reduce the attack surface for identities and entitlements in the cloud. IDEntitleX expands the company’s leadership position in providing unprecedented visibility and prevention of identity privilege escalation and lateral movement […]


Tecala and eSentire partner to protect enterprises from cyberattacks

Tecala,Australia’s award-winningtechnology services and IT consulting provider, has announced it has chosen eSentire, a global authority in Managed Detection and Response (MDR) cybersecurity services, as its exclusive MDR solution provider in Australia and New Zealand. This partnership will enable Tecala to augment its cybersecurity practice and offer enterprises a powerful, all-in-one cybersecurity service which detects, disrupts […]


Veeam launches new US federal government-focused subsidiary

Veeam Software, a leader in backup solutions that delivers modern data protection, has launched a new, federal government-focused subsidiary, Veeam Government Solutions (VGS). As recent ransomware and cyberattacks are highlighting the potential impact of data loss to critical infrastructure, Veeam is strengthening its commitment to deliver modern data protection to the US government with additional industry […]


Managed Security Service Provider appoints Matt Gyde as chairman and CEO

Former CEO of NTT Security to invest in ProVision, Foresite’s proprietary cybersecurity platform. Foresite, a SaaS cybersecurity solutions provider, has announced that Matt Gyde has been named Chairman and Chief Executive Officer. Gyde brings more than 25 years of leadership experience to Foresite and has led some of the largest companies in the cybersecurity industry. […]


WatchGuard integrates endpoint security within WatchGuard Cloud

WatchGuard Technologies has announced it has integrated the WatchGuard Endpoint Security product family into WatchGuard Cloud. As a result, partners and customers can now deploy and manage endpoint security, network security and MFA services via WatchGuard Cloud, enabling them to streamline security delivery, simplify operations, consolidate vendors, and bolster business growth and profitability. “WatchGuard’s driving […]


Talend achieves ISO certification for information security and data privacy

Talend, a global leader in data integration and integrity, has announced it is the first integration provider to achieve both the information security management standard ISO/IEC 27001:2013 and the new data privacy controls standard ISO/IEC 27701:2019 certifications. This follows an extensive independent external audit and these certifications provide assurance in the company’s commitment to protecting […]


More than half of US companies hit with privileged credential theft and insider threats

ThycoticCentrify, a leading provider of cloud identity security solutions, has announced new research that reveals more than half of organizations have been grappling with the theft of legitimate, privileged credentials (53%) and insider threat attacks (52%) in the last 12 months. In 85% of the privileged credential theft instances, cybercriminals were able to access critical […]


Barracuda launches platform to defend web apps from evolving attack vectors

Barracuda Networks, a leading provider of cloud-enabled security solutions, has announced significant new capabilities for its Cloud Application Protection platform to deliver an additional level of protection and make it easier for organizations to secure their applications in a digitally transformed world. These new services and features include client-side protection, the ability to deploy containerized […]


67% of enterprise environments still run protocol exploited by WannaCry and NotPetya

Four years after devastating ransomware attacks, SMBv1 and other vulnerable protocols are still running in IT environments around the world. ExtraHop, a leader in cloud-native network detection and response, has released a security advisory about the prevalence of insecure protocols in enterprise IT environments. The report details the on-going use of deprecated and insecure protocols, […]


Browse our latest issue

Magazine Cover

View Magazine Archive