Infosec products of the month: February 2022

Here’s a look at the most interesting products from the last month, featuring releases from: Arista Networks, Blueshift Cybersecurity, Bugcrowd, Cato Networks, Cofense, CoSoSys, Cybellum, Cymulate, Darktrace, DataStax, F5 Networks, Federal Reserv… Continue reading Infosec products of the month: February 2022

To shift to data-driven security decision making: Start with the right data

We live in the age of data-driven everything. From sales to operations, and everything in-between, today’s organizations are constantly looking for ways to leverage the data they accrue – reacting more agilely, operating more efficiently, and saf… Continue reading To shift to data-driven security decision making: Start with the right data

WAFs can’t give organizations the security they need

Cymulate reveals that web application firewalls are the least effective security solutions, making them prime target for adversaries and high risk points for organizations. Consequences of the ineffectiveness of web application firewalls Overall unique… Continue reading WAFs can’t give organizations the security they need

New infosec products of the week: February 4, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Cato Networks, Cymulate, Gretel, Juniper Networks, Mandiant, Ping Identity, Qualys, ShiftLeft, and Tenable. Qualys minimizes vulnerability risk for organizations… Continue reading New infosec products of the week: February 4, 2022

Cymulate Amplify helps companies eliminate critical security blind spots

Cymulate launched Amplify, a human powered offering designed to accelerate the implementation and optimization of their continuous security assurance. By providing an on-hand advisor, Amplify augments in-house security teams to better leverage Cymulate… Continue reading Cymulate Amplify helps companies eliminate critical security blind spots

Ransomware attacks surge, still victims are recovering quickly

Cymulate announced the results of a survey, revealing that despite the increase in the number of ransomware attacks this past year, overall victims suffered limited damage in both severity and duration. Research taken from nearly 900 enterprise profess… Continue reading Ransomware attacks surge, still victims are recovering quickly

Is offensive testing the way for enterprises to finally be ahead of adversaries?

The one principle the cyber-security industry is founded on is that defenders are always a step behind the hackers. Solutions are developed (FW, AV and onwards), technologies introduced (VMs, LB’s, microservices) practices emerge (DevSecOps anyone?) an… Continue reading Is offensive testing the way for enterprises to finally be ahead of adversaries?

Cybersecurity posture validation: Fireside chat with Arkadiy Goykhberg, CISO of DMGT

Working in cyber security is an exciting if humbling experience. It is a discipline where you can never have enough details, best practices, and lessons learned by examining mistakes made by others. Learning from peers has always been paramount. Recent… Continue reading Cybersecurity posture validation: Fireside chat with Arkadiy Goykhberg, CISO of DMGT

How do I select an automated red teaming solution for my business?

Red teaming is an essential part of an organization’s security assessment process. It is generally done manually to uncover possibile vulnerabilities and security gaps, but can automation simplify or even enhance the process? To select a suitable… Continue reading How do I select an automated red teaming solution for my business?

Cymulate nabs $45M to test and improve cybersecurity defenses via attack simulations

With cybercrime on course to be a $6 trillion problem this year, organizations are throwing ever more resources at the issue to avoid being a target. Now, a startup that’s built a platform to help them stress-test the investments that they have made into their security IT is announcing some funding on the back of […] Continue reading Cymulate nabs $45M to test and improve cybersecurity defenses via attack simulations