Press Releases

Bitdefender

Bitdefender Named a Top Player for Advanced Persistent Threat Protection by Radicati Group

Position in Radicati Group’s Market Quadrant Report Validates Bitdefender’s Leadership in Finding and Eradicating Even the Most Advanced Attacks Bitdefender, a global cybersecurity leader, has been named a “Top Player” in the Advanced Persistent Threat (APT) Protection Market Quadrant by the analyst firm Radicati Group. In its first year participating in the …

Cymulate

Cymulate Raises $45M in Series C Funding for Continuous Security Testing Led by One Peak

New capital will support Cymulate’s aggressive expansion to meet rising demand for on-demand security posture testing following the Solarwinds and Microsoft Exchange attacks New York, NYC and Rishon Letzion, Israel, May 6th, 2021 – Cymulate, the industry standard SaaS based Continuous Security Validation platform leveraging the MITRE ATT&CK® framework end-to-end, …

Okta

Okta Completes Acquisition of Auth0

Identity leaders combine developer and enterprise expertise, offering customers more flexibility San Francisco, CA — May 3, 2021 — Okta, Inc. (NASDAQ:OKTA), the leading independent identity provider, today announced the successful completion of its acquisition of Auth0, a leading identity platform for application teams. Together, Okta and Auth0 address a …

KELA

KELA Names David Carmiel New CEO

KELA is excited to officially announce that David Carmiel, former CTO and Chief Research Officer, has been appointed as Chief Executive Officer at KELA. Nir Barak, KELA’s former CEO and Founder has been promoted to Chairman of the Board. In his new role, David Carmiel will continue to guide KELA …

Bitdefender

Bitdefender Achieves Highest Detection Score in MITRE ATT&CK Evaluations for Enterprise

Independent Testing Confirms 100 Percent Detection Rate of Major Steps in Emulated Carbanak and FIN7 Attacks; Two of the Most Advanced Cybercriminal Groups   Bitdefender, a global cybersecurity leader, today announced it achieved the highest number of detections of the 29 participating cybersecurity vendors in MITRE Engenuity’s recent independent ATT&CK Evaluations for …

Thycotic

Thycotic and Centrify Merge to Become a Leading Cloud Privileged Identity Security Vendor

Combined company to deliver comprehensive cloud privileged access management solutions to meet unique demands of the market, from SMB to global enterprises Thycotic, a leading provider of privileged access management (PAM) solutions for more than 12,500 organizations worldwide, and Centrify, a leading provider of modern privileged access management solutions to …

LATEST BLOGS

Txone

We Need to Align Cybersecurity with Business in the Industrial Environment

Cybersecurity in industrial environments can no longer be viewed as an isolated domain. Protecting Operational Technology (OT) depends on a solid IT foundation that aligns technical defences with business objectives. Only through this integration can organisations ensure operational continuity, safety, and resilience against cyber threats. Today, we understand that OT …
Read more
Kela

How Threat Intelligence Uses Dark Web Marketplaces to Gather Information

What Is a Dark Web Marketplace? Dark web marketplaces are hidden online platforms where cybercriminals trade stolen data, hacking tools, and illegal services. Accessible only through specialised networks that ensure anonymity, these markets are a vital source of threat intelligence. Monitoring them provides organisations with early insights into security breaches, …
Read more
Blog SealPath_Marcas de Agua Digitales

Digital Watermarking: Protect Your Business Sensitive Data

1. Introduction to Digital Watermarking Digital watermarking is a technique used to embed identifiers into digital files, such as documents, images, videos… These identifiers, or “watermarks,” can be visible (e.g., logos on images) or invisible, and they function as a layer of metadata tied directly to content. For instance, if …
Read more