Bringing you the lastest news from our Solutions

Linden Pieterse Linden Pieterse

Seraphic Security Announces $29 Million Series A with Participation from the CrowdStrike Falcon Fund

San Jose, CA – January 30, 2025Seraphic Security, a leader in enterprise browser security, today announced that it has secured a $29 million Series A funding round led by GreatPoint Ventures (GPV), with participation from the CrowdStrike Falcon Fund and existing investors Planven, Cota Capital, Storm Ventures, Eastlink and Secure Octane. This milestone will enable the organization to accelerate its product roadmap and market expansion in North America and EMEA.

Read More
Linden Pieterse Linden Pieterse

3 Lessons Learned from 2025 New Year Cyber Attacks on Education

As the New Year begins, recent cyber attacks on educational organizations remind me how important it is for Identity Security to stay ahead of bad actors.

PowerSchool is the largest provider of cloud-based education software for K-12 education in the U.S., supporting more than 50 million students. Hackers successfully breached its customer support portal, allowing further access to the company’s information systems. 

A short time after, news broke of small public schools being hit with cyberattacks in Maine. The first was a breach in the internet network in the South Portland School District coming from an attacker in Bulgaria. At a different Maine school district, a student’s email address was hacked and used in a phishing scam, again by someone outside the country. They sent emails out to around 1,400 different accounts. 

Organizations serving students large and small, public and private, are being targeted.  Education is no longer a safe space from threat actors, and we urge leaders to take proactive steps to shore up their systems against attack. We take seriously our responsibility to help, and one way is by sharing learnings from these incidents to help take action to avoid the same outcomes.

Read More
Linden Pieterse Linden Pieterse

New Skybox Butterfly Effect report on network bottlenecks illustrates need for automation

A new Skybox survey has highlighted the challenges network and infrastructure professionals face, and the tools they believe will help them overcome those challenges.

John Stevenson, Senior Product Marketing Manager Skybox Security, says the survey of over 500 network security professionals in the UK and North America examined the impact of an over-reliance on manual firewall management processes, and explored how network security misconfigurations threaten security, compliance and operational uptime. 

Read More
Linden Pieterse Linden Pieterse

Malicious Browser Extensions Are on The Rise

Browser extensions are software modules that can be added to web browsers to enhance their functionality. They can provide a wide range of features, such as ad-blocking, password management, and improved user interface customization.

However, not all extensions are benign; some are designed with malicious intent. Malicious browser extensions can steal sensitive data, track user behavior, inject unwanted advertisements, or even take over a user’s browser entirely. In this blog, we’ll take a deep dive into what malicious browser extensions can do and how to mitigate the risks they pose.

Read More
Linden Pieterse Linden Pieterse

Building the Foundation for Effective Security and IT Operations – XM Cyber and ServiceNow

XM Cyber and ServiceNow are coming together to integrate the leading continuous exposure management platform with the leading workflow automation platform. We’re excited about this collaboration that gives organizations the ability to build and support more efficient remediation programs. In this blog, we’ll discuss how IT and Security leaders can more effectively mobilize their teams, align resources, and deliver better business outcomes with these new integrations. 

Read More
Linden Pieterse Linden Pieterse

Building Saviynt Intelligence: the World’s Best Access Recommendation Engine

On September 10, Saviynt announced Saviynt Intelligence, a new suite of capabilities bringing additional insights and clarity for identity security. Intelligent Recommendations is the first offering introduced under the Saviynt Intelligence umbrella and is not simply an incremental improvement in existing Saviynt Identity Cloud features, but a radical reimagining of how Identity Governance and Administration (IGA) is achieved.

Read More
Linden Pieterse Linden Pieterse

Automate to Elevate Your Cybersecurity

How Smart Automation is Redefining Risk Management. In today's rapidly evolving threat landscape, cybersecurity teams are under immense pressure to protect their organisations from a constant barrage of attacks. The sheer volume of vulnerabilities, coupled with the increasing sophistication of cybercriminals, makes it challenging to maintain a strong security posture.

Read More
Linden Pieterse Linden Pieterse

Comprehensive Security Made Simple

How MSPs Can Deliver Multi-Layered Protection to SMBs. Holistic, hassle-free security solution empowering MSPs to offer SMBs streamlined security solutions.

Read More
Linden Pieterse Linden Pieterse

5 CTEM Myths – Debunked!

Continuous Threat Exposure Management framework (CTEM) is an increasingly popular proactive cybersecurity approach. CTEM’s power lies in its construct, which enables a continual assessment of how and if an organization might be impacted by cyberattacks. 

Read More
Linden Pieterse Linden Pieterse

Supply Chain Attacks Start with your 3rd Party Providers

How well do you know your 3rd party service providers and their level of commitment to information security controls and procedures? What do you know about their service providers? For most companies, the answer is “not much”, yes virtually all organizations provide access to those “unknowns” into their network and applications to get the job done. Securing this supply chain has always been a headache for companies and several solutions are commonly used to balance between security and “getting things done”.

Read More
Linden Pieterse Linden Pieterse

Why Tokenization Beats Transparent Data Encryption for PCI DSS Compliance

comforte's data-centric security platform discovers sensitive data elements and replaces them with non-sensitive placeholders meaningless to attackers while preserving their utility for processing and analytics. Their solutions help organizations mitigate the risks of data breaches, enable secure data utilization across business applications, and reduce the complexity of compliance with stringent regulations such as PCI DSS or GDPR.

Read More
Linden Pieterse Linden Pieterse

Skybox Deployment with a large Telco in South Africa: A Seamless Integration Thanks to Exceptional Collaboration with Performanta, and Solid8 Technologies

The deployment of Skybox Security at a large telco has been an exemplary model of seamless integration and effective collaboration. With such exceptional internal customer support and a strong working relationship between teams, the project will deliver rapid ROI and immense value to addressing their business and technical needs.

Read More
Linden Pieterse Linden Pieterse

Amid Warren Buffet’s Dire Warning: Why Cyber Insurance is Crucial for SMBs

Cyber Threats on the Rise: Small and medium businesses, are increasingly targeted by cyberattacks, making cyber insurance essential.

Widespread Underinsurance: Despite the rising risks, many SMBs remain underinsured or not insured at all against cyber threats.

Guardz’s Pioneering Solution: Guardz has launched a new offering to help secure and insure small & medium businesses against growing cybersecurity threats, making insurance accessible to previously ineligible companies.

Read More