A phishing and fraud prevention vendor has bought a startup founded by Qualys' longtime engineering leader to help organizations more effectively discover and monitor assets. Red Sift says its purchase of Hardenize will help customers assess the security of their digital asset inventory.
Compromised or stolen credentials are the most common initial cyberattack vector, averaging a cost of $4.5 million to organizations.
No matter their means of entry — brute force or dictionary attacks, credential stuffing, identifying misconfigured cloud resources, or phishing — credential-based attacks are...
Rising offensive cyber star NetSPI has received a massive follow-up investment from KKR to pursue acquisitions and expand its technological and geographic footprint. KKR's $410 million bet comes on the heels of 50% organic sales growth for NetSPI in 2021 and 61% sales growth thus far in 2022.
Financial services firms in Africa are becoming bigger cyber targets as they expand into new mobile payment and financial inclusion products. Rob Dartnall of Security Alliance explains why these firms need to invest in information sharing, training and new cybersecurity practices to avoid breaches.
Private equity firm Vector Capital invested $100 million in Malwarebytes a month after the antivirus stalwart laid off 125 employees to focus on smaller customers. The funds will help the vendor reduce clients' attack surfaces and accelerate momentum with MSPs and channel partners.
Darktrace's Cybersprint acquisition allowed the cybersecurity AI vendor to move from focusing solely on internal threats to also defending the external attack surface, Nicole Eagan says. The company says AI will give an outside-in view of the victim and simulate how the attacker will behave.
CrowdStrike has purchased external attack surface management startup Reposify to help organizations detect and eliminate risk from vulnerable and unknown assets. This deal will allow CrowdStrike to combine its insights on endpoints and IT environments with Reposify's internet-scanning capabilities.
From January 1, 2022, to March 31, 2022, Mandiant identified common high and critical severity issues that occurred in medium to large enterprises due to unpatched technologies and configuration drift in internet-facing assets.
Download this report and learn more about:
Exposed data repositories and data...
Even with custom tools, security teams cannot easily see the entirety of their rapidly expanding attack surface and address its challenges. Legacy sprawl, orphaned infrastructure and an increasingly distributed workforce are ever-present complications.
ASM generates comprehensive visibility of the extended...
As digital environments become more dispersed and diverse, it becomes more difficult to track and
monitor every asset, as well as their connections and dependences. In a recent global survey, 75% of C-suite respondents said they worry their enterprises are now too complex to secure.
Attack Surface Management...
The opportunist attacker can find potential victims by simply scanning the internet for assets or services exposed to accidents or misconfigurations. According to our data, risks and exposures are persistent because modern attack surfaces are inherently dynamic, moving, and growing. All too often, this means without...
Gartner estimates that less than 10% of organizations have adopted one or more attack surface assessment (ASA) technologies to address their attack surface. ASA provides a more comprehensive view of an organization’s asset inventory, including unknowns.
Download this report to gain more insight into:
Improving...
Tech and security leaders have no idea how many cloud services are being used to store sensitive data. Enterprises need continual enumeration of cloud weaknesses and misconfigurations to reduce the risk of data breaches and privacy failures.
Download this report and learn more about:
Platforms providing threat...
ASM vendors recognize that most organizations can’t keep up with the rapid changes within their attack surface, robust discovery is a ubiquitous feature of all ASM solutions. From the discovery phase to the reporting and alerting phase, it’s clear that this field has matured rapidly to fill in the gaps.
As...
New malware variants are being developed at breakneck speeds, each more sophisticated and devastating than the last. On top of that, successful threats are being commodified by initial access brokers (IAB) and sold as-a-service. Threats are propagating faster than ever with stealthy evasion techniques coded in,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.