Search results for: software

security platform

Rezilion provides real-time visibility to all software components with Dynamic SBOM

Rezilion released the company’s Dynamic Software Bill of Materials (SBOM), to help organizations actively manage security across the Software Development Life Cycle (SDLC). Rezilion’s Dynamic SBOM seamlessly plugs to all software environments, from development to production, and provides real-time visibility to all software components. Unlike static SBOMs, Rezilion’s Dynamic SBOM does more than just uncover what software components are there: it reveals if and how they’re being executed in runtime, providing organizations with an unparalleled … More

security platform

Tromzo Security Guardrails improves security posture for developers

Tromzo announced the expansion of the product to provide pre-built, contextual, and real-time security policies and controls in CI/CD through security guardrails. The adoption of cloud-native applications and infrastructure has propelled DevOps and a self-service culture where developers go from code-to-cloud in a matter of hours. Meanwhile legacy AppSec systems and processes have impeded security teams from being able to scale at the speed of DevOps with very little visibility or control over security risks. … More

security platform

Jetstack launches software supply chain toolkit for development and security teams

Jetstack released an easy-to-use, interactive and comprehensive toolkit for securing modern software supply chains. The visual, web-based resource is available to everyone and is designed to help organizations evaluate and plan the crucial steps they need to tackle effective software supply chain security. Software supply chain security has become an increasingly critical issue for all organizations. After the attack against SolarWinds at the end of 2020 that affected over 1800 companies, software supply chain attacks … More

Handshake

Nozomi Networks extends partnership with Siemens to bring scalable cybersecurity to industrial automation

Nozomi Networks and Siemens have extended their partnership by embedding Nozomi Networks’ Guardian Remote Collector software into the Siemens Scalance LPE local processing engine, a hardware platform designed for data processing for edge and cloud applications in manufacturing environments. Customers can now easily deploy the leading OT & IoT continuous monitoring solution to their industrial networks leveraging the power and simplicity of the Siemens Scalance LPE hardware. “This is a significant milestone for the Siemens … More

Handshake

TorchLight announces its MDR Sentinel service as part of a security partnership with Microsoft

TorchLight announced MDR Sentinel, a scalable, cloud-native turnkey security information and event management (SIEM) and security orchestration, automation, and response (SOAR) service. The new service is powered by enterprise-grade Microsoft Sentinel security tools combined with TorchLight’s nationwide virtual security operations center (vSOC) capabilities. TorchLight is a Complete Security Solutions Provider (CSSP) that offers turnkey MDR services in addition to its own SIEM/SOAR MDR service that works with all leading cybersecurity products and environments to manage … More

Acquisitions

Sonae IM signs agreement with Thales to sell Maxive Cybersecurity

Sonae IM signed an agreement to sell Maxive Cybersecurity, a holding company that aggregates S21sec and Excellium, two of the major pure players in cybersecurity consulting, integration, and managed security services in Europe. Formed in 2020 by the merger between the independent companies S21Sec and Excellium, led by Sonae IM, Maxive Cybersecurity provides cybersecurity incident detection and response services (Security Operations Centre – SOC) as well as consulting, audit, and integration services for IT, OT … More

Money

Pangea raises $25 million to deliver API-based security services for application builders

Pangea Cyber Corporation emerged from stealth to announce $25M in Series A funding to offer application builders a comprehensive portfolio of API-based security services through a single platform. The Series A is led by Ballistic Ventures with participation from SYN Ventures, Godfrey Sullivan (Former Chairman & CEO, Splunk), George Kurtz (Founder & CEO, CrowdStrike) and Dan Plastina (Former VP AWS Security Products). Pangea plans to use the funding primarily for product development. Before Pangea, a … More

Appointments

Kevin Thompson joins SonarSource Board of Directors

SonarSource announced Kevin Thompson, chairman and CEO of Tricentis and former president and CEO of SolarWinds, has joined its board of directors. As a seasoned business and finance leader, Thompson brings more than two decades of C-suite experience, at some of the world’s leading enterprise software companies, to the SonarSource board. With experience leading both large public corporations and high-growth scaleups, he is uniquely suited to help SonarSource scale its growth, compete in new markets … More

Appointments

Twilio hires Joyce Kim as CMO

Twilio announced Joyce Kim will be joining the company as Chief Marketing Officer, reporting to President of Revenue, Elena Donio. As Chief Marketing Officer, Kim will lead global marketing as the company executes its vision of becoming the leader in the emerging customer engagement category. “It’s a crucial time for Twilio as we look to scale and embrace the unique opportunity to define a new category in technology,” said Elena Donio, President of Revenue. “With … More

Bluetooth

BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones

A Bluetooth Low Energy (BLE) vulnerability discovered by NCC Group researchers may be used by attackers to unlock Teslas (or other cars with automotive keyless entry), residential smart locks, building access systems, mobile phones, laptops, and many other devices. About the BLE vulnerability Bluetooth Low Energy (BLE) is a data sharing protocol developed by the Bluetooth Special Interest Group (Bluetooth SIG) and is widely used for proximity authentication in critical applications. The discovered vulnerability is … More

ransomware

Cardiologist charged for use and sale of ransomware

The US Attorney’s Office is charging a Venezuelan cardiologist with attempted computer intrusions and conspiracy to commit computer intrusions. The charges stem from his use and sale of ransomware, as well as his extensive support of, and profit sharing arrangements with, the cybercriminals who used his ransomware programs. “As alleged, the multi-tasking doctor treated patients, created and named his cyber tool after death, profited from a global ransomware ecosystem in which he sold the tools … More

stop

Why cyber security can’t just say “no“

There was a time, not long ago, when there were only so many ways of accomplishing an information technology task. Whether you were building a website, setting up a new computer, or installing a piece of software, your options were limited — if there were any options at all. That time is over. Now, any kind of product or service can be acquired easily and with minimal effort, and usually for a very low or … More