Thursday, August 18, 2022

Forescout acquires Cysiv to deliver automated true threat response

Forescout Technologies, an automated cybersecurity firm, announced that it has completed its acquisition of Cysiv, a cybersecurity innovator that uses its cloud platform to improve detection and response for true threats. Forescout expands its ability to provide enhanced threat detection and response through automated cybersecurity across the digital terrain.

Thales acquires OneWelcome, a dominant customer identity franchise

Continuing its cybersecurity expansion strategy, Thales announces the signature of an agreement to acquire OneWelcome, a European leader in the fast growing market of Customer Identity and Access Management, for a total consideration of €100 million. 

Haventec’s Authenticate solution on-boarded onto Auth0 Marketplace

Haventec, the multi-award-winning Australian cyber security company, announced the availability of its Authenticate solution on Auth0 Marketplace, a catalogue of trusted tech integrations to extend the functionality of Auth0’s identity management platform.

Cloudian and Vertica team up to deliver secure AI data warehousing

Cloudian announced a partnership with Vertica, a Micro Focus line of business, providing firms with a public cloud-like modern data warehousing solution, on-premises, for managing their AI/machine learning (AI/ML) and other analytics workloads securely behind their firewall.

Firmware supply chain company Binarly raises $3.6m seed funding

Binarly Inc., a cybersecurity firm building tech to address security issues, announced $3.6m in seed funding from WestWave Capital and Acrobator Ventures. Cybersecurity leaders Michael Sutton, Thomas 'Halvar Flake' Dullien, Jamie Butler, Ryan Permeh, Bryson Bort, Pedram Amini, Chris Ueland and David Mandel from Emerging Ventures also joined as investors.

Ransomware-as-a-service behind the ravaging global ransomware spike

The shift to the subscription economy has created a new norm in the as-a-service world. And it’s not just Netflix and Spotify that have adopted this business model. New research from Tenable®, the Cyber Exposure company, has found that one of the main reasons ransomware has prospered is due to the advent of ransomware-as-a-service (RaaS) which has catapulted ransomware from a fledgling threat into a force to be reckoned with.

Validity launches MailCharts SMS to enhance mobile marketing capabilities

Validity, the provider of data quality and email marketing success solutions, has introduced MailCharts SMS, a solution that powers data-driven SMS campaign planning for ecommerce marketing teams. With a library of thousands of SMS messages, marketers can gain insight and inspiration from the SMS strategies from the world’s top brands, what’s working well, how they are deployed, and which industry benchmarks matter is key to success.

Cohort of researchers develop simple tool to make websites more secure

An international team of researchers has developed a scanning tool to make websites less vulnerable to hacking and cyberattacks. The black box security assessment prototype, tested by engineers in Australia, Pakistan and the United Arab Emirates, is more effective than existing web scanners which collectively fail to detect the top 10 weaknesses in web apps.

What businesses should do to protect against state-aided cyber attacks

0
Nation state cyberthreats are growing in prevalence, persistence, and scale across the globe. As evidenced by the latest activity in Ukraine, nation state actors are emboldened to take action via cyberspace. In fact, Trellix’s most recent Threat Labs Report: April 2022 detailed an upsurge in cyber threats likely from a Russian-backed actor in the fourth quarter of 2021.

Forescout discloses OT:ICEFALL 56 exposures found in multiple devices

Forescout’s Vedere Labs, along with CISA’s vulnerability disclosure process, is disclosing OT:ICEFALL, 56 vulnerabilities affecting devices from 10 OT (operational tech) vendors. This is one of the largest vulnerability disclosures that impact OT devices and addresses insecure-by-design vulnerabilities. It has been ten years since Project Basecamp, a research project by Digital Bond, who investigated how critical OT devices and protocols were insecure by design.