Bringing you the lastest news from our Solutions
Seraphic Security Announces $29 Million Series A with Participation from the CrowdStrike Falcon Fund
San Jose, CA – January 30, 2025 – Seraphic Security, a leader in enterprise browser security, today announced that it has secured a $29 million Series A funding round led by GreatPoint Ventures (GPV), with participation from the CrowdStrike Falcon Fund and existing investors Planven, Cota Capital, Storm Ventures, Eastlink and Secure Octane. This milestone will enable the organization to accelerate its product roadmap and market expansion in North America and EMEA.
3 Lessons Learned from 2025 New Year Cyber Attacks on Education
As the New Year begins, recent cyber attacks on educational organizations remind me how important it is for Identity Security to stay ahead of bad actors.
PowerSchool is the largest provider of cloud-based education software for K-12 education in the U.S., supporting more than 50 million students. Hackers successfully breached its customer support portal, allowing further access to the company’s information systems.
A short time after, news broke of small public schools being hit with cyberattacks in Maine. The first was a breach in the internet network in the South Portland School District coming from an attacker in Bulgaria. At a different Maine school district, a student’s email address was hacked and used in a phishing scam, again by someone outside the country. They sent emails out to around 1,400 different accounts.
Organizations serving students large and small, public and private, are being targeted. Education is no longer a safe space from threat actors, and we urge leaders to take proactive steps to shore up their systems against attack. We take seriously our responsibility to help, and one way is by sharing learnings from these incidents to help take action to avoid the same outcomes.
Malicious Browser Extensions Are on The Rise
Browser extensions are software modules that can be added to web browsers to enhance their functionality. They can provide a wide range of features, such as ad-blocking, password management, and improved user interface customization.
However, not all extensions are benign; some are designed with malicious intent. Malicious browser extensions can steal sensitive data, track user behavior, inject unwanted advertisements, or even take over a user’s browser entirely. In this blog, we’ll take a deep dive into what malicious browser extensions can do and how to mitigate the risks they pose.
Building the Foundation for Effective Security and IT Operations – XM Cyber and ServiceNow
XM Cyber and ServiceNow are coming together to integrate the leading continuous exposure management platform with the leading workflow automation platform. We’re excited about this collaboration that gives organizations the ability to build and support more efficient remediation programs. In this blog, we’ll discuss how IT and Security leaders can more effectively mobilize their teams, align resources, and deliver better business outcomes with these new integrations.
Unlocking the Future of AI: NVIDIA H100 GPU Instances on Microsoft Azure with Anjuna Seaglass
Microsoft Azure recently made a major announcement: the general availability of Azure Confidential VMs with NVIDIA H100 Tensor Core GPUs. New Azure VM types and sizes are released often, but this release is especially significant: it brings groundbreaking capabilities for confidential high-performance AI and machine learning use cases.
Building Saviynt Intelligence: the World’s Best Access Recommendation Engine
On September 10, Saviynt announced Saviynt Intelligence, a new suite of capabilities bringing additional insights and clarity for identity security. Intelligent Recommendations is the first offering introduced under the Saviynt Intelligence umbrella and is not simply an incremental improvement in existing Saviynt Identity Cloud features, but a radical reimagining of how Identity Governance and Administration (IGA) is achieved.
Comprehensive Security Made Simple
How MSPs Can Deliver Multi-Layered Protection to SMBs. Holistic, hassle-free security solution empowering MSPs to offer SMBs streamlined security solutions.
5 CTEM Myths – Debunked!
Continuous Threat Exposure Management framework (CTEM) is an increasingly popular proactive cybersecurity approach. CTEM’s power lies in its construct, which enables a continual assessment of how and if an organization might be impacted by cyberattacks.
Supply Chain Attacks Start with your 3rd Party Providers
How well do you know your 3rd party service providers and their level of commitment to information security controls and procedures? What do you know about their service providers? For most companies, the answer is “not much”, yes virtually all organizations provide access to those “unknowns” into their network and applications to get the job done. Securing this supply chain has always been a headache for companies and several solutions are commonly used to balance between security and “getting things done”.
Why Tokenization Beats Transparent Data Encryption for PCI DSS Compliance
comforte's data-centric security platform discovers sensitive data elements and replaces them with non-sensitive placeholders meaningless to attackers while preserving their utility for processing and analytics. Their solutions help organizations mitigate the risks of data breaches, enable secure data utilization across business applications, and reduce the complexity of compliance with stringent regulations such as PCI DSS or GDPR.
Rethinking Ransomware Defense: BullWall’s Innovative Approach to Containment
What will you do in the first 30 seconds of a ransomware file encryption commencing?
The reality for most organisations is that they will do nothing at all. 99% of the time, they will be blissfully unaware until users start complaining that they cannot open the files.
Amid Warren Buffet’s Dire Warning: Why Cyber Insurance is Crucial for SMBs
Cyber Threats on the Rise: Small and medium businesses, are increasingly targeted by cyberattacks, making cyber insurance essential.
Widespread Underinsurance: Despite the rising risks, many SMBs remain underinsured or not insured at all against cyber threats.
Guardz’s Pioneering Solution: Guardz has launched a new offering to help secure and insure small & medium businesses against growing cybersecurity threats, making insurance accessible to previously ineligible companies.
Why Data-Centric Security Is a Critical Foundation for AI-Powered Analytics
Data analytics have been used for decades to enhance business insight and drive efficiency, growth and innovation. But the addition of intelligent algorithms and cloud computing power offers potentially game-changing opportunities to push these benefits even further. The challenge, as ever, is to ensure the underlying data itself is kept as secure as possible. If not, business leaders may lose confidence in its accuracy and expose their organization to significant financial, reputational and compliance risk.
How to leverage SaaS for compliance – in conversation with a real-world customer of a large financial services institute
Skybox believes that technology is an enabler for achieving network and security compliance with both internal policies and industry regulations, helping organisations understand their compliance status, monitor it continuously, and manage and remediate violations.
The Chief Revenue Officer of Canadian cybersecurity company, Tehama Technologies, talks exclusively to Netweek about its recent entry in Greece
The benefits of the all-in-one solution Tehama offers to its customers, the close cooperation with Gerobo, and the significant prospects that are now opening up for pan-European expansion with a Greek touch.
Solid8 Technologies: Your Trusted Partner in Sub-Saharan Africa's Cybersecurity Landscape
Solid8 Technologies: Your Trusted Partner in Sub-Saharan Africa's Cybersecurity Landscape
Launch of the Collective Defense AI Fusion Center (CDAIC) in Ukraine
IronNet, Inc. (“IronNet”), the leading collective defense platform, is deploying its IronRadarSM early warning system as part of the CDAIC program and itsIronDome® for collective defense that enables the sharing of threat Intelligence at machine speed.
