Bringing you the lastest news from our Solutions
Building the Foundation for Effective Security and IT Operations – XM Cyber and ServiceNow
XM Cyber and ServiceNow are coming together to integrate the leading continuous exposure management platform with the leading workflow automation platform. We’re excited about this collaboration that gives organizations the ability to build and support more efficient remediation programs. In this blog, we’ll discuss how IT and Security leaders can more effectively mobilize their teams, align resources, and deliver better business outcomes with these new integrations.
Unlocking the Future of AI: NVIDIA H100 GPU Instances on Microsoft Azure with Anjuna Seaglass
Microsoft Azure recently made a major announcement: the general availability of Azure Confidential VMs with NVIDIA H100 Tensor Core GPUs. New Azure VM types and sizes are released often, but this release is especially significant: it brings groundbreaking capabilities for confidential high-performance AI and machine learning use cases.
Building Saviynt Intelligence: the World’s Best Access Recommendation Engine
On September 10, Saviynt announced Saviynt Intelligence, a new suite of capabilities bringing additional insights and clarity for identity security. Intelligent Recommendations is the first offering introduced under the Saviynt Intelligence umbrella and is not simply an incremental improvement in existing Saviynt Identity Cloud features, but a radical reimagining of how Identity Governance and Administration (IGA) is achieved.
Automate to Elevate Your Cybersecurity
How Smart Automation is Redefining Risk Management. In today's rapidly evolving threat landscape, cybersecurity teams are under immense pressure to protect their organisations from a constant barrage of attacks. The sheer volume of vulnerabilities, coupled with the increasing sophistication of cybercriminals, makes it challenging to maintain a strong security posture.
Comprehensive Security Made Simple
How MSPs Can Deliver Multi-Layered Protection to SMBs. Holistic, hassle-free security solution empowering MSPs to offer SMBs streamlined security solutions.
5 CTEM Myths – Debunked!
Continuous Threat Exposure Management framework (CTEM) is an increasingly popular proactive cybersecurity approach. CTEM’s power lies in its construct, which enables a continual assessment of how and if an organization might be impacted by cyberattacks.
Supply Chain Attacks Start with your 3rd Party Providers
How well do you know your 3rd party service providers and their level of commitment to information security controls and procedures? What do you know about their service providers? For most companies, the answer is “not much”, yes virtually all organizations provide access to those “unknowns” into their network and applications to get the job done. Securing this supply chain has always been a headache for companies and several solutions are commonly used to balance between security and “getting things done”.
Skybox Security delivers extensive automation enhancements with latest product release
New updates set the standard for task automation across the exposure management life cycle, including attack surface, security policy and vulnerability management workflows.
Why Tokenization Beats Transparent Data Encryption for PCI DSS Compliance
comforte's data-centric security platform discovers sensitive data elements and replaces them with non-sensitive placeholders meaningless to attackers while preserving their utility for processing and analytics. Their solutions help organizations mitigate the risks of data breaches, enable secure data utilization across business applications, and reduce the complexity of compliance with stringent regulations such as PCI DSS or GDPR.
Skybox Deployment with a large Telco in South Africa: A Seamless Integration Thanks to Exceptional Collaboration with Performanta, and Solid8 Technologies
The deployment of Skybox Security at a large telco has been an exemplary model of seamless integration and effective collaboration. With such exceptional internal customer support and a strong working relationship between teams, the project will deliver rapid ROI and immense value to addressing their business and technical needs.
Rethinking Ransomware Defense: BullWall’s Innovative Approach to Containment
What will you do in the first 30 seconds of a ransomware file encryption commencing?
The reality for most organisations is that they will do nothing at all. 99% of the time, they will be blissfully unaware until users start complaining that they cannot open the files.
Skybox Security report: over 30 000 new vulnerabilities published in past year
The report has uncovered major gaps with traditional vulnerability management tools, leading to increased risk.
Amid Warren Buffet’s Dire Warning: Why Cyber Insurance is Crucial for SMBs
Cyber Threats on the Rise: Small and medium businesses, are increasingly targeted by cyberattacks, making cyber insurance essential.
Widespread Underinsurance: Despite the rising risks, many SMBs remain underinsured or not insured at all against cyber threats.
Guardz’s Pioneering Solution: Guardz has launched a new offering to help secure and insure small & medium businesses against growing cybersecurity threats, making insurance accessible to previously ineligible companies.
Why Data-Centric Security Is a Critical Foundation for AI-Powered Analytics
Data analytics have been used for decades to enhance business insight and drive efficiency, growth and innovation. But the addition of intelligent algorithms and cloud computing power offers potentially game-changing opportunities to push these benefits even further. The challenge, as ever, is to ensure the underlying data itself is kept as secure as possible. If not, business leaders may lose confidence in its accuracy and expose their organization to significant financial, reputational and compliance risk.
How to leverage SaaS for compliance – in conversation with a real-world customer of a large financial services institute
Skybox believes that technology is an enabler for achieving network and security compliance with both internal policies and industry regulations, helping organisations understand their compliance status, monitor it continuously, and manage and remediate violations.
Hiding in plain sight – when vulnerabilities aren’t all equal
Security expert Kris Budnik, Founder and Director of Tilt Advisory, speaks on how vulnerabilities are not all equal.
The Chief Revenue Officer of Canadian cybersecurity company, Tehama Technologies, talks exclusively to Netweek about its recent entry in Greece
The benefits of the all-in-one solution Tehama offers to its customers, the close cooperation with Gerobo, and the significant prospects that are now opening up for pan-European expansion with a Greek touch.
Solid8 Technologies: Your Trusted Partner in Sub-Saharan Africa's Cybersecurity Landscape
Solid8 Technologies: Your Trusted Partner in Sub-Saharan Africa's Cybersecurity Landscape