Rising offensive cyber star NetSPI has received a massive follow-up investment from KKR to pursue acquisitions and expand its technological and geographic footprint. KKR's $410 million bet comes on the heels of 50% organic sales growth for NetSPI in 2021 and 61% sales growth thus far in 2022.
Financial services firms in Africa are becoming bigger cyber targets as they expand into new mobile payment and financial inclusion products. Rob Dartnall of Security Alliance explains why these firms need to invest in information sharing, training and new cybersecurity practices to avoid breaches.
Private equity firm Vector Capital invested $100 million in Malwarebytes a month after the antivirus stalwart laid off 125 employees to focus on smaller customers. The funds will help the vendor reduce clients' attack surfaces and accelerate momentum with MSPs and channel partners.
Darktrace's Cybersprint acquisition allowed the cybersecurity AI vendor to move from focusing solely on internal threats to also defending the external attack surface, Nicole Eagan says. The company says AI will give an outside-in view of the victim and simulate how the attacker will behave.
CrowdStrike has purchased external attack surface management startup Reposify to help organizations detect and eliminate risk from vulnerable and unknown assets. This deal will allow CrowdStrike to combine its insights on endpoints and IT environments with Reposify's internet-scanning capabilities.
From January 1, 2022, to March 31, 2022, Mandiant identified common high and critical severity issues that occurred in medium to large enterprises due to unpatched technologies and configuration drift in internet-facing assets.
Download this report and learn more about:
Exposed data repositories and data...
As digital environments become more dispersed and diverse, it becomes more difficult to track and
monitor every asset, as well as their connections and dependences. In a recent global survey, 75% of C-suite respondents said they worry their enterprises are now too complex to secure.
Attack Surface Management...
Even with custom tools, security teams cannot easily see the entirety of their rapidly expanding attack surface and address its challenges. Legacy sprawl, orphaned infrastructure and an increasingly distributed workforce are ever-present complications.
ASM generates comprehensive visibility of the extended...
Gartner estimates that less than 10% of organizations have adopted one or more attack surface assessment (ASA) technologies to address their attack surface. ASA provides a more comprehensive view of an organization’s asset inventory, including unknowns.
Download this report to gain more insight into:
Improving...
Tech and security leaders have no idea how many cloud services are being used to store sensitive data. Enterprises need continual enumeration of cloud weaknesses and misconfigurations to reduce the risk of data breaches and privacy failures.
Download this report and learn more about:
Platforms providing threat...
ASM vendors recognize that most organizations can’t keep up with the rapid changes within their attack surface, robust discovery is a ubiquitous feature of all ASM solutions. From the discovery phase to the reporting and alerting phase, it’s clear that this field has matured rapidly to fill in the gaps.
As...
The opportunist attacker can find potential victims by simply scanning the internet for assets or services exposed to accidents or misconfigurations. According to our data, risks and exposures are persistent because modern attack surfaces are inherently dynamic, moving, and growing. All too often, this means without...
New malware variants are being developed at breakneck speeds, each more sophisticated and devastating than the last. On top of that, successful threats are being commodified by initial access brokers (IAB) and sold as-a-service. Threats are propagating faster than ever with stealthy evasion techniques coded in,...
Existing ASM processes and technologies are a complete mismatch for today’s threat landscape. As part of attack campaigns, cyber-adversaries use automated attack surface scanning tools and work around the clock to find vulnerable systems on enterprise networks.
Download this research report and learn about:
The...
The traditional security monitoring architecture has been troubling security teams with data silos, performance issues, and delays in retrieving archived data for years. Many analysts who continue to operate with the antiquated SIEM architecture stack also experience a high volume of alerts—with many false...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.