Bringing you the lastest news from our Solutions
Solid8 Technologies Champions the Future of Women in Cyber
Solid8 Technologies, a leading cybersecurity distributor in South Africa, is proud to support the next generation of IT professionals through its corporate social responsibility initiative.
Seraphic Security Announces $29 Million Series A with Participation from the CrowdStrike Falcon Fund
San Jose, CA – January 30, 2025 – Seraphic Security, a leader in enterprise browser security, today announced that it has secured a $29 million Series A funding round led by GreatPoint Ventures (GPV), with participation from the CrowdStrike Falcon Fund and existing investors Planven, Cota Capital, Storm Ventures, Eastlink and Secure Octane. This milestone will enable the organization to accelerate its product roadmap and market expansion in North America and EMEA.
3 Lessons Learned from 2025 New Year Cyber Attacks on Education
As the New Year begins, recent cyber attacks on educational organizations remind me how important it is for Identity Security to stay ahead of bad actors.
PowerSchool is the largest provider of cloud-based education software for K-12 education in the U.S., supporting more than 50 million students. Hackers successfully breached its customer support portal, allowing further access to the company’s information systems.
A short time after, news broke of small public schools being hit with cyberattacks in Maine. The first was a breach in the internet network in the South Portland School District coming from an attacker in Bulgaria. At a different Maine school district, a student’s email address was hacked and used in a phishing scam, again by someone outside the country. They sent emails out to around 1,400 different accounts.
Organizations serving students large and small, public and private, are being targeted. Education is no longer a safe space from threat actors, and we urge leaders to take proactive steps to shore up their systems against attack. We take seriously our responsibility to help, and one way is by sharing learnings from these incidents to help take action to avoid the same outcomes.
New Skybox Butterfly Effect report on network bottlenecks illustrates need for automation
A new Skybox survey has highlighted the challenges network and infrastructure professionals face, and the tools they believe will help them overcome those challenges.
John Stevenson, Senior Product Marketing Manager Skybox Security, says the survey of over 500 network security professionals in the UK and North America examined the impact of an over-reliance on manual firewall management processes, and explored how network security misconfigurations threaten security, compliance and operational uptime.
Malicious Browser Extensions Are on The Rise
Browser extensions are software modules that can be added to web browsers to enhance their functionality. They can provide a wide range of features, such as ad-blocking, password management, and improved user interface customization.
However, not all extensions are benign; some are designed with malicious intent. Malicious browser extensions can steal sensitive data, track user behavior, inject unwanted advertisements, or even take over a user’s browser entirely. In this blog, we’ll take a deep dive into what malicious browser extensions can do and how to mitigate the risks they pose.
Building the Foundation for Effective Security and IT Operations – XM Cyber and ServiceNow
XM Cyber and ServiceNow are coming together to integrate the leading continuous exposure management platform with the leading workflow automation platform. We’re excited about this collaboration that gives organizations the ability to build and support more efficient remediation programs. In this blog, we’ll discuss how IT and Security leaders can more effectively mobilize their teams, align resources, and deliver better business outcomes with these new integrations.
Unlocking the Future of AI: NVIDIA H100 GPU Instances on Microsoft Azure with Anjuna Seaglass
Microsoft Azure recently made a major announcement: the general availability of Azure Confidential VMs with NVIDIA H100 Tensor Core GPUs. New Azure VM types and sizes are released often, but this release is especially significant: it brings groundbreaking capabilities for confidential high-performance AI and machine learning use cases.
Building Saviynt Intelligence: the World’s Best Access Recommendation Engine
On September 10, Saviynt announced Saviynt Intelligence, a new suite of capabilities bringing additional insights and clarity for identity security. Intelligent Recommendations is the first offering introduced under the Saviynt Intelligence umbrella and is not simply an incremental improvement in existing Saviynt Identity Cloud features, but a radical reimagining of how Identity Governance and Administration (IGA) is achieved.
Automate to Elevate Your Cybersecurity
How Smart Automation is Redefining Risk Management. In today's rapidly evolving threat landscape, cybersecurity teams are under immense pressure to protect their organisations from a constant barrage of attacks. The sheer volume of vulnerabilities, coupled with the increasing sophistication of cybercriminals, makes it challenging to maintain a strong security posture.
Comprehensive Security Made Simple
How MSPs Can Deliver Multi-Layered Protection to SMBs. Holistic, hassle-free security solution empowering MSPs to offer SMBs streamlined security solutions.
5 CTEM Myths – Debunked!
Continuous Threat Exposure Management framework (CTEM) is an increasingly popular proactive cybersecurity approach. CTEM’s power lies in its construct, which enables a continual assessment of how and if an organization might be impacted by cyberattacks.
Supply Chain Attacks Start with your 3rd Party Providers
How well do you know your 3rd party service providers and their level of commitment to information security controls and procedures? What do you know about their service providers? For most companies, the answer is “not much”, yes virtually all organizations provide access to those “unknowns” into their network and applications to get the job done. Securing this supply chain has always been a headache for companies and several solutions are commonly used to balance between security and “getting things done”.
Skybox Security delivers extensive automation enhancements with latest product release
New updates set the standard for task automation across the exposure management life cycle, including attack surface, security policy and vulnerability management workflows.
Why Tokenization Beats Transparent Data Encryption for PCI DSS Compliance
comforte's data-centric security platform discovers sensitive data elements and replaces them with non-sensitive placeholders meaningless to attackers while preserving their utility for processing and analytics. Their solutions help organizations mitigate the risks of data breaches, enable secure data utilization across business applications, and reduce the complexity of compliance with stringent regulations such as PCI DSS or GDPR.
Skybox Deployment with a large Telco in South Africa: A Seamless Integration Thanks to Exceptional Collaboration with Performanta, and Solid8 Technologies
The deployment of Skybox Security at a large telco has been an exemplary model of seamless integration and effective collaboration. With such exceptional internal customer support and a strong working relationship between teams, the project will deliver rapid ROI and immense value to addressing their business and technical needs.
Rethinking Ransomware Defense: BullWall’s Innovative Approach to Containment
What will you do in the first 30 seconds of a ransomware file encryption commencing?
The reality for most organisations is that they will do nothing at all. 99% of the time, they will be blissfully unaware until users start complaining that they cannot open the files.
Skybox Security report: over 30 000 new vulnerabilities published in past year
The report has uncovered major gaps with traditional vulnerability management tools, leading to increased risk.
Amid Warren Buffet’s Dire Warning: Why Cyber Insurance is Crucial for SMBs
Cyber Threats on the Rise: Small and medium businesses, are increasingly targeted by cyberattacks, making cyber insurance essential.
Widespread Underinsurance: Despite the rising risks, many SMBs remain underinsured or not insured at all against cyber threats.
Guardz’s Pioneering Solution: Guardz has launched a new offering to help secure and insure small & medium businesses against growing cybersecurity threats, making insurance accessible to previously ineligible companies.