Bomgar announces acquisition of BeyondTrust to expand PAM offerings

Bomgar announced it has signed a definitive agreement to acquire BeyondTrust from an affiliate of Veritas Capital. The combined company, which will be called BeyondTrust, brings together innovators with a shared mission of securing privileged access and helping customers to defend themselves from cyber-attacks while increasing productivity. Bomgar secures privileged credentials, remote access sessions, and endpoints, while empowering users to be more efficient and effective. BeyondTrust offers the PAM platform that enables organizations to scale … More

Exabeam adds updated Case Management module to behavioral analytics product

Exabeam announced the addition of case management functionality into Exabeam Advanced Analytics and Exabeam Entity Analytics, its user and entity behavior analytics (UEBA) solutions. The case management offering helps security teams organize and streamline their response efforts to boost security operation center (SOC) productivity. Exabeam Case Management is a module that provides a user interface designed for the workflows of security teams, and that adds intelligence to help analysts resolve incidents. Machine learning helps make … More

Gurucul introduces managed security analytics service

Gurucul announced Gurucul Labs, a managed security analytics service based on the Gurucul Risk Analytics (GRA) platform which provides the data science expertise many organizations lack to operationalize their investments in behavior based security analytics. Gurucul Labs combines people, processes and technology to help organizations discover threats in real-time and expedite responses to malicious insiders, unusual usage activity, compromised accounts or hosts, network intrusions, data exfiltration and more. The service provides machine learning algorithms and … More

Trustwave opens cybersecurity command center

Trustwave unveiled the Trustwave SpiderLabs Fusion Center, a cybersecurity command center that employs threat intelligence to track threat actors, detect them with their clients, and kill those threats inside an organization down to individual endpoints. Located in Chicago, the 6,000 square foot facility serves as the central hub for Trustwave’s global network of ten Advanced Security Operation Centers (ASOCs), edifices that identify, track, and collect cybersecurity threat intelligence while serving as the delivery framework for … More

Sysdig closes $68.5 million in series D funding

Sysdig announced it raised $68.5 million in series D funding, led by Insight Venture Partners, with participation from previous investors, Bain Capital Ventures and Accel. This round of funding brings Sysdig’s total funding to date to $121.5 million. Sysdig will use the funds to enable enterprises to operate containerized infrastructure and cloud-native applications. Sysdig offers enterprises the unified approach to container security, monitoring, and forensics. Unlike traditional approaches, the Sysdig Cloud-Native Intelligence Platform was built … More

Secure Code Warrior raises $3.5M in funding

Secure Code Warrior announced that it has gained US$3.5 million in funding from two strategic venture capital firms. The financing was led by Washington DC-based Paladin Capital Group, with participation from Sydney-based AirTree Ventures. The initial funding round will allow the company to expand its sales, marketing and customer success footprint in the United States, while continuing to innovate through engineering hubs in Belgium and Australia. Secure Code Warrior has offices in Sydney, Boston, London … More

Corelight secures $25 million in Series B funding led by General Catalyst

Corelight announced it has secured an additional $25 million in Series B financing led by General Catalyst. With this additional round of capital, the company will accelerate investments in product development, research, sales, and marketing with the aim of delivering new capabilities for network defense. “The question today isn’t if the bad guys have access to your network – they do – but instead, what they’ve done once they’ve gotten in,” said Steve Herrod, managing … More

Indegy extends its active device-based threat detection with Suricata

Indegy announced an integration partnership with the Open Information Security Foundation (OISF). The integration will combine Indegy’s patent-pending active device-based threat detection with Suricata’s open source network threat intelligence to provide end-to-end protection for operational technology (OT) environments. The companies will collaborate to make attack signatures and rules gathered from industrial networks available and actionable to the broader OT security community. Recent attacks such as TRITON, Dragonfly 2.0, and CrashOverride/Industroyer have demonstrated that today’s Industrial … More

MapR introduces 6 new data science offerings to help organizations with their AI journey

MapR announced six new data science service offerings to help customers gain immediate value from Machine Learning (ML) and Artificial Intelligence (AI) and expand their competitive edge over competitors, no matter where the customer is in their data science journey. Because AI and ML can be complex, organizations don’t always have the capacity to execute on AI and ML ideas.Those that do, may not be able to bring those ideas to production. According to McKinsey … More

Cybersecurity veteran Richard Bejtlich joins Corelight as principal security strategist

Corelight welcomed Richard Bejtlich, former chief security strategist at FireEye, author and cybersecurity expert, to the team as principal security strategist. Bejtlich, a proponent of the open source Bro Network Security Monitor (aka “Bro”) – the technology at the heart of the Corelight Sensor – will work with the company’s executive team to help align product development with enterprise needs. He will also communicate the value of Bro data and network security monitoring for countering … More

Cypaw: Risk management and data compromise prevention tool

Cypaw is a risk management tool, bringing visibility and control to organisation’s digital footprint while reducing the likelihood of successful phishing attacks. Cyber-attacks remain a daily occurrence and the increasing sophistication of attackers makes the threat of a data breach for all enterprises, whether public or private, omnipresent. 95% of all cyber-attacks begin with a successful Phish. However, rather than sending out a bulk email in hopes of a bite, hackers will target an organisation … More

iStorage devices pass FIPS 140-2 Level 3 certification

The iStorage diskAshur PRO² portable HDD/SSD and diskAshur DT² desktop HDD are now FIPS 140-2 Level 3 certified. This is in addition to recent news announced only a few months ago that both products were certified to NCSC CPA, NLNCSA BSPA & NATO Restricted Level, making iStorage the world’s first and only company to have all these certifications. “This a fantastic accolade and testament to the many years of research and development that iStorage has … More