Computer network security

Infinipoint Appoints Dave Burton Chief Marketing Officer

Retrieved on: 
Wednesday, August 4, 2021

TEL AVIV, Israel, Aug. 4, 2021 /PRNewswire/ -- Infinipoint, provider of the first Device-Identity-as-a-Service (DIaaS)--a comprehensive device identity and security solution that is a critical part of a Zero Trust approach to secure device access--today announced that Dave Burton has been named Chief Marketing Officer.

Key Points: 
  • TEL AVIV, Israel, Aug. 4, 2021 /PRNewswire/ -- Infinipoint, provider of the first Device-Identity-as-a-Service (DIaaS)--a comprehensive device identity and security solution that is a critical part of a Zero Trust approach to secure device access--today announced that Dave Burton has been named Chief Marketing Officer.
  • Burton brings more than 30 years of software and technology marketing experience to the team, including two decades focused on information security.
  • "Dave's track record of driving demand and revenue for disruptive cybersecurity products makes him an excellent addition to the Infinipoint team," said Ran Lampert, co-founder and CEO, Infinipoint.
  • Burton joins Infinipoint from Guardicore, a leading microsegmentation and Zero Trust platform security provider, where he served as Vice President of Marketing, building its global marketing organization and operations from the ground up.

Tugboat Logic Empowers BentoBox to Improve Security for Over 12,000 Restaurant Customers

Retrieved on: 
Wednesday, August 4, 2021

BURLINGAME, Calif., Aug. 4, 2021 /PRNewswire/ -- Tugboat Logic, the leading security assurance company, today announced that its customer, BentoBox, launched its first infosec program to provide security assurance to more than 12,000 restaurant locations worldwide.   

Key Points: 
  • BURLINGAME, Calif., Aug. 4, 2021 /PRNewswire/ -- Tugboat Logic, the leading security assurance company, today announced that its customer, BentoBox , launched its first infosec program to provide security assurance to more than 12,000 restaurant locations worldwide.
  • With Tugboat Logic's Security Assurance Platform, BentoBox gained:
    A cost-effective security program:With Tugboat Logic, BentoBox scoped out a security program designed to fit their immediate needs without breaking the bank including automated cybersecurity training for their team of 100+ employees.
  • Having a best-in-class solution like Tugboat Logic on our side enables us to be a stronger partner to the restaurant industry."
  • BentoBox's customers need them to be experts at security, and that's where Tugboat Logic comes in.

Cybersecurity Executive Search Firm Pinpoint Search Group Expands Operations Globally

Retrieved on: 
Wednesday, August 4, 2021

GRAND JUNCTION, Colo., Aug. 4, 2021 /PRNewswire-PRWeb/ --Pinpoint Search Group, a U.S.-based boutique executive search firm dedicated to placing tier one talent for cybersecurity vendors, has expanded its operations globally through a strategic partnership with FiveSix Partners, a U.K.-based specialist cybersecurity recruitment company.

Key Points: 
  • GRAND JUNCTION, Colo., Aug. 4, 2021 /PRNewswire-PRWeb/ --Pinpoint Search Group, a U.S.-based boutique executive search firm dedicated to placing tier one talent for cybersecurity vendors, has expanded its operations globally through a strategic partnership with FiveSix Partners, a U.K.-based specialist cybersecurity recruitment company.
  • Pinpoint tasked FiveSix with leading its recruitment efforts in Europe, the Middle East and Africa (EMEA).
  • Pinpoint Search Group is a boutique search firm dedicated to filling VP, Director and Sr.
  • CJ Arlotta, CJ Media Solutions for Pinpoint Search Group, +1 631-235-9126, [email protected]

Security Vendors' Financial and Operational Metrics Trends and Analysis Report 2021 - ResearchAndMarkets.com

Retrieved on: 
Wednesday, August 4, 2021

The "Security Vendors' Financial and Operational Metrics: Trends and Analysis" report has been added to ResearchAndMarkets.com's offering.

Key Points: 
  • The "Security Vendors' Financial and Operational Metrics: Trends and Analysis" report has been added to ResearchAndMarkets.com's offering.
  • This report is based on these data sets and highlights some of the key trends and developments in the cyber-security market in 2020 and 1H 2021.
  • Cyber-security vendors revenue tracker and Cyber-security-related tracker provide details of security vendors financial and operational metrics and activity, respectively.
  • An overview of the recent financial performance of major publicly traded security vendors (with a focus on revenue, revenue growth and operating profitability)
    An analysis of the current market capitalisations of selected major publicly traded security vendors.

U.K. Firms Seek Cybersecurity Service Providers as Digital Transformations Increase Risk of Attacks

Retrieved on: 
Wednesday, August 4, 2021

Cloud migrations, mergers and acquisitions and the growth of application estates have added to the cybersecurity challenges British firms are facing, said Roger Albrecht, co-leader of ISG Cybersecurity.

Key Points: 
  • Cloud migrations, mergers and acquisitions and the growth of application estates have added to the cybersecurity challenges British firms are facing, said Roger Albrecht, co-leader of ISG Cybersecurity.
  • Companies consider risk management central to enterprise leadership and want experienced partners for security solutions and services.
  • Enterprises are also implementing zero-trust architectures, which focus on continuous authentication, to maintain security amid the growth of remote work.
  • The WannaCry ransomware attack against the National Health Service in 2017 revealed the potential risks of cybercrime to organizational reputations.

Sophos Acquires Refactr to Optimize Managed Threat Response (MTR) and Extended Detection and Response (XDR) with Security Orchestration Automation and Response (SOAR) Capabilities

Retrieved on: 
Tuesday, August 3, 2021

Refactr has leading customers in both the private and government/public sectors, including the Center for Internet Security and the U.S. Air Forces Platform One .

Key Points: 
  • Refactr has leading customers in both the private and government/public sectors, including the Center for Internet Security and the U.S. Air Forces Platform One .
  • Sophos is optimizing Refactrs DevSecOps automation platform to add Security Orchestration Automation and Response (SOAR) capabilities to its Managed Threat Response (MTR) and Extended Detection and Response (XDR) solutions.
  • The SOAR capabilities will also help automate Sophos Adaptive Cybersecurity Ecosystem , which underpins all of Sophos product solutions, services, threat intelligence, and data lake.
  • In addition to the continued offering of the Refactr platform, Sophos plans to begin offering SOAR options by early 2022.

Rochester Institute of Technology Eaton Cybersecurity SAFE Lab Testing Shows CloudCover’s® CC/B1 CyberSafety PlatformTM Provides “Significant Security Protection” Against Cyberattacks

Retrieved on: 
Tuesday, August 3, 2021

CloudCover, an automated intelligence (AI)-driven cybersecurity platform, today announces the results of the recent testing of its CC/B1 CyberSafetyPlatformTM, conducted by the Rochester Institute of Technologys (RIT) Eaton Cybersecurity SAFE (Security Assessment and Forensic Examination) Lab.

Key Points: 
  • CloudCover, an automated intelligence (AI)-driven cybersecurity platform, today announces the results of the recent testing of its CC/B1 CyberSafetyPlatformTM, conducted by the Rochester Institute of Technologys (RIT) Eaton Cybersecurity SAFE (Security Assessment and Forensic Examination) Lab.
  • The labs assessment shows that the CC/B1 platform provides significant defensive capabilities and successfully defended vulnerable systems against many common cyber threats and attack scenarios.
  • CloudCover engaged RITs SAFE Lab with the primary objective of evaluating the effectiveness of the CC/B1 Platform in stopping cyber criminals from successfully completing cyberattacks.
  • RITs Global Cybersecurity Institute and its Eaton Cybersecurity SAFE Lab are world-class facilities devoted to the education, training, and testing for the next generation of cybersecurity professionals and technologies.

Code42 and Rapid7 Partner to Deliver Enhanced Detection and Investigation of Insider Threat Events

Retrieved on: 
Tuesday, August 3, 2021

Today, Code42 , the Insider Risk Management leader, announced it has integrated the Code42 Incydr product with Rapid7 InsightIDR .

Key Points: 
  • Today, Code42 , the Insider Risk Management leader, announced it has integrated the Code42 Incydr product with Rapid7 InsightIDR .
  • Code42 Incydr is the first data source dedicated to insider threat events to be accessible to InsightIDR users.
  • One-click access to the Code42 Incydr console directly from InsightIDR enables analysts to execute fast, contextualized insider threat investigations and strengthens compliance and file integrity monitoring (FIM).
  • Code42, the Code42 logo and Incydr are registered trademarks or trademarks of Code42 Software, Inc. in the United States and/or other countries.

Cado Security Unveils Cloud Memory Forensics For Enhanced Visibility and Context Across Data Breaches

Retrieved on: 
Tuesday, August 3, 2021

Many of today’s sophisticated hackers leverage techniques that run in memory only -- such as fileless malware, rootkits and process hollowing -- which leave no traces when data logs and host information are analyzed. If security teams aren’t able to capture evidence in memory, these attacks are extremely challenging to investigate. The Cado Response platform empowers security teams to investigate such attacks by automating memory capture and processing as soon as malicious activity is detected. Further, the Cado Response platform allows forensics experts to analyze memory alongside other critical data sources including disk information and cloud logs in a single pane of glass so they can easily grasp the full extent of what happened.

Key Points: 
  • With Memory Forensics, security teams gain enhanced visibility and context to identify the root cause of incidents and respond to data breaches faster.
  • By incorporating memory acquisition and processing capabilities directly in our Cado Response platform, security experts gain additional context and visibility into an attackers activities, further empowering them to investigate and respond to breaches at cloud speed.
  • The Cado approach provides security teams with 100% of the data and information they need to respond to breaches faster.
  • By automating data capture and processing across cloud and container environments, Cado Response enables security teams to effectively investigate and respond to cyber incidents at cloud speed.

Leading Security Companies Join the Arctic Wolf Alliance Ecosystem to Strengthen Security Operations for Customers Worldwide

Retrieved on: 
Tuesday, August 3, 2021

Arctic Wolf , a leader in security operations, today announced the expansion of strategic partnerships with leading security vendors to easily extend the power of the Arctic Wolf Platform across the entire security stack and to advance attack detection capabilities for all use cases, with the ease of use and simplicity that Arctic Wolf customers are accustomed to.

Key Points: 
  • Arctic Wolf , a leader in security operations, today announced the expansion of strategic partnerships with leading security vendors to easily extend the power of the Arctic Wolf Platform across the entire security stack and to advance attack detection capabilities for all use cases, with the ease of use and simplicity that Arctic Wolf customers are accustomed to.
  • With its cloud-native security operations platform, Arctic Wolf integrates security applications and tools across vendors into a single platform approach with no additional customization or coding requiredallowing customers to gain visibility and control over historically disparate security solutions.
  • Arctic Wolf continues to strengthen integrations and partnerships with leading software vendors, including:
    Mimecastallowing the Arctic Wolf Platform immediate visibility and response to malicious URLs, attachments, and behaviors identified by the Mimecast platform.
  • Arctic Wolf is a member of The Cisco Secure Technology Alliance, a security ecosystem that facilitates open, multivendor product integrations to improve security effectiveness through automation and operational simplicity.