Dell launched new services and solutions to strengthen their security portfolio and to protect its customers from cyber threats and malicious attacks. The company released its Dell Technologies Managed Detection and Response Pro Plus fully managed security operations solution with capabilities that block routes to cyber-attacks and accelerate the recovery process if an attack occurs. … continue reading
The autonomous cybersecurity platform SentinelOne announced integrations with Revelstoke, Fletch, Code42, and KnowBe4 to offer new use cases in the Singularity Marketplace. Organizations can optimize their security workflows by integrating SentinelOne Singularity Platform with Revelstoke‘s Security Orchestration, Automation, and Response (SOAR) capabilities, allowing for the automation of alert triage and incident remediation. SentinelOne alert triage … continue reading
The newly launched Lumos App Governance Platform automates access requests, enforces least privilege, speeds up user access reviews, and eliminates extra SaaS app spending. Lumos is dedicated to bridging the gap between IT, security, compliance, and finance by providing support for the most important functions for businesses in this economic climate, namely, cost management and … continue reading
Tenable today announced the release of Tenable One, an Exposure Management Platform to unify discovery and visibility into all assets to assess their exposures and vulnerabilities across an entire attack surface. The platform brings the organization’s entire attack surface (both on-premises and cloud-based) into a single view. It aggregates vulnerability data across the IT infrastructure, … continue reading
The autonomous cybersecurity platform SentinelOne announced a new integration with Armis, a unified asset intelligence platform. The collaboration will help protect organizations by providing unified and unparalleled visibility across endpoints, cloud, mobile, IoT, OT devices, and more. “With every piece of new technology, the challenge of IT orchestration grows, particularly from a security perspective,” said … continue reading
Qualys announced that it is adding External Attack Surface Management (EASM) capabilities to the Qualys cloud platform to enable security and IT teams to automatically assess their risk posture. Many factors such as digital transformation, the increased adoption of cloud and IoT, a growing remote workforce and talent shortage have led to a rise in … continue reading
The Cloud Security Alliance (CSA) issued best practices for healthcare organizations to mitigate supply chain cyber risks in the Healthcare Supply Chain Cybersecurity Risk Management paper. “The move to the cloud and edge computing has expanded HDOs’ electronic perimeters, not only making it harder for them to secure their infrastructure but also making them more … continue reading
IT infrastructure provider Kyndryl announced an expansion of its global alliance with Dell Technologies that focuses on helping customers use data optimization, infrastructure management services, and a cyber resilience solution to protect their critical business assets. Kyndryl provides Cyber Incident Recovery with Dell Technologies to accelerate cyber resilience for customers using Dell’s high-performance storage, servers, … continue reading
An average employee of a small business with less than 100 employees will receive 350% more social engineering attacks than an employee of a larger enterprise. The most commonly impersonated brand is Microsoft, used by cybercriminals in 57% of phishing attacks – the most prevalent social engineering attack of 2021. These findings are from the … continue reading
The potential for cyberattacks has placed many organizations beyond Ukraine on high alert for any threats, and has left them wondering what they can do to bolster their security posture. “Unlike traditional warfare, which generally only has impacts in and around a specific conflict zone, cyberattacks can have far-reaching impacts beyond the initial target that … continue reading
Cloudflare, CrowdStrike, and Ping Identity partnered up to strengthen U.S. cybersecurity in light of increased cyber threats. The new Critical Infrastructure Defense Project will provide free cybersecurity services to vulnerable industries. Eligible organizations will have access to the full suite of Cloudflare Zero Trust solutions, endpoint protection, and intelligence services from CrowdStrike. The project will … continue reading
IBM announced that it is bringing advanced data protection capabilities to the IBM FlashSystem family of all flash arrays to help companies plan for and recover quickly from ransomware and cyberattacks. IBM Safeguarded Copy, which automatically creates data copies in “immutable snapshots,” will now be integrated into the IBM FlashSystem family. In the event of … continue reading