{"id":5095,"date":"2023-07-10T10:19:50","date_gmt":"2023-07-10T15:19:50","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/?p=5095"},"modified":"2023-07-10T10:28:52","modified_gmt":"2023-07-10T15:28:52","slug":"it-security-industry-news-june","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2023\/07\/10\/it-security-industry-news-june\/","title":{"rendered":"IT Security Industry News &#8211; June 2023"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><a>Table of Contents<\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sophos Promotes Joe Levy to President of Sophos Technology Group<\/li>\n\n\n\n<li>CyberDisti Partners with Malwarebytes to Distribute Malwarebytes Award-Winning Technology in the Indian Market<\/li>\n\n\n\n<li>Cybersecurity Funding Drops 58% From Q1 2022<\/li>\n\n\n\n<li>Trellix promotes Mahipal Nair to Managing Director of Trellix India<\/li>\n\n\n\n<li>Cymulate \u2013 Extended Security Posture Management<\/li>\n\n\n\n<li>What Solutions Are There To Help Process PCI Compliance In Fintech Businesses?<\/li>\n\n\n\n<li>Tel Aviv Stock Exchange Selects CardinalOps to Reduce Risk of Breaches Due to Undetected Attacks &#8230;.<\/li>\n\n\n\n<li>Global Wireless Network Security Market is estimated to reach US $ 58.14 Billion, rising at a CAG&#8230;.<\/li>\n\n\n\n<li>Kaspersky introduces new cloud-based product for SMBs<\/li>\n\n\n\n<li>Cyber Security Corporate \u2013 The Powerhouses of Cybersecurity: Discovering the Biggest Names in the&#8230;.<\/li>\n\n\n\n<li>Commvault Redefines Data Protection with Advanced Security and Ecosystem Integrations<\/li>\n\n\n\n<li>Interview with Anand Ramanathan, CPO of Skyhigh Security<\/li>\n\n\n\n<li>Cyware Announces Technology Partnership with Mimecast to Extend Cyber Fusion with Advanced Email &#8230;.<\/li>\n\n\n\n<li>Vision One Now Has Generative AI Thanks to Trend Micro, Improving XDR &#8211; TechVersions<\/li>\n\n\n\n<li>Reco Partners with Blink to Automatically Remediate SaaS Data Security Exposure Events<\/li>\n\n\n\n<li>Exabeam Announces Outcomes Navigator for Threat Detection Coverage Across All Common Security Use&#8230;.<\/li>\n\n\n\n<li>Vast Data and Commvault Bolster Partnership<\/li>\n\n\n\n<li>Betacom AirGap Protection strengthens security for private 4G\/5G networks<\/li>\n\n\n\n<li>Critical Insight Introduces PartnerFirst Program to Accelerate Partner Business Growth<\/li>\n\n\n\n<li>Cyware lands $30M to modernize cybersecurity operations | TechCrunch<\/li>\n\n\n\n<li>Tanium recognised as winner of the 2023 Microsoft US Rising Azure Technology Partner of the Year &#8230;.<\/li>\n<\/ul>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/www.cxoinsightme.com\/images\/android-icon-192x192.png\">&nbsp;<strong>Sophos Promotes Joe Levy to President of Sophos Technology Group<\/strong><br>As president, Levy will continue expanding Sophos as a leading global cybersecurity as a service provider, driven by its fast-growing Sophos Managed Detection and Response (MDR) and Incident Response (IR) services and a more than $1 billion product portfolio that spans endpoint, network, email, and cloud security.\u201cOur product strategy, our technology delivery execution and our future technology roadmaps have never been stronger as a result of Joe\u2019s ambition, vision and guidance as a leader at Sophos.\u201d<br>As head of worldwide field operations, Robbins will oversee all aspects of global sales with a continued priority on the channel ecosystem, including helping partners grow their business with Sophos\u2019 MDR and IR services and security product solutions.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.cxoinsightme.com\/news\/sophos-promotes-joe-levy-to-president-of-sophos-technology-group\/\">https:\/\/www.cxoinsightme.com\/news\/sophos-promotes-joe-levy-to-president-of-sophos-technology-group\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/press.malwarebytes.com\/wp-content\/themes\/mb-press-theme\/images\/favicon\/favicon-196x196.png\">&nbsp;<strong>CyberDisti Partners with Malwarebytes to Distribute Malwarebytes Award-Winning Technology in the Indian Market<\/strong><br>April 12, 2023<br>CyberDisti Partners with Malwarebytes to Distribute Malwarebytes Award-Winning Technology in the Indian Market<br>CyberDisti to offer the Malwarebytes for Business suite of solutions to their channel partner network to help their customers detect threats earlier and respond faster<br>Kerala, India \u2013 12 April 2023 \u2013 CyberDisti, a cybersecurity focused Value-Added Distributor (VAD) with offices in India and Dubai, today announced a new partnership with<br>Malwarebytes, a global leader in real-time cyber protection.CyberDisti can bolster its customers\u2019 cybersecurity capabilities by leveraging the Malwarebytes cloud-based platform to provide streamlined, effective endpoint protection (EP), incident response (IR) and endpoint detection and response (EDR) in one centralized management portal.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/press.malwarebytes.com\/2023\/04\/12\/cyberdisti-partners-with-malwarebytes-to-distribute-malwarebytes-award-winning-technology-in-the-indian-market\/\">https:\/\/press.malwarebytes.com\/2023\/04\/12\/cyberdisti-partners-with-malwarebytes-to-distribute-malwarebytes-award-winning-technology-in-the-indian-market\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/news.crunchbase.com\/wp-content\/uploads\/fbrfg\/apple-touch-icon.png\">&nbsp;<strong>Cybersecurity Funding Drops 58% From Q1 2022<\/strong><br>Although venture funding struggled mightily in the first quarter , funding to cybersecurity startups specifically remained relatively even quarter to quarter \u2014 although well below the highs of the past few years.Venture-backed startups in cybersecurity saw nearly $2.7 billion in the first quarter of the year, per Crunchbase data .The first quarter of the year was propped up by AI and quantum computing startup SandboxAQ raising a $500 million round in February , as well as two other rounds of more than a quarter-billion dollars raised by Santa Clara, California-based Netskope and New York-based Wiz .In comparison, the last two quarters of 2022 \u2014 which saw a similar total venture dollar value when compared to Q1 \u2014 saw only one such round (a $401 million convertible note raise by Arctic Wolf ).If this year continues the pace of the first quarter, it will surpass 2020 \u2014 which saw less than $10 billion go to cyber startups \u2014 in total dollars raised.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/news.crunchbase.com\/cybersecurity\/funding-drops-ai-quantum-q1-2023\/\">https:\/\/news.crunchbase.com\/cybersecurity\/funding-drops-ai-quantum-q1-2023\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/cdn1.expresscomputer.in\/wp-content\/uploads\/2018\/11\/20124908\/ecfavicon144.ico\">&nbsp;<strong>Trellix promotes Mahipal Nair to Managing Director of Trellix India<\/strong><br><em>Express Computer<\/em><br>Trellix has promoted Mahipal Nair to the role of Managing Director, Trellix India, where he will lead the company&#8217;s India business operations.<br>Key takeaways:<br>Mahi Nair has 25 years of work experience across international markets.<br>He is adept at leading multicultural teams and delivering results through organizational transformation.<br>Aparna Rayasam, Chief Product Officer, Trellix, is confident that Mahi will be able to nurture the best talent and deliver high quality solutions to customers.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.expresscomputer.in\/news\/trellix-promotes-mahipal-nair-to-managing-director-of-trellix-india\/96683\/\">https:\/\/www.expresscomputer.in\/news\/trellix-promotes-mahipal-nair-to-managing-director-of-trellix-india\/96683\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/www.itweb.co.za\/_nuxt\/icons\/icon_512x512.158742.png\">&nbsp;<strong>Cymulate \u2013 Extended Security Posture Management<\/strong><br>Cymulate \u2013 Extended Security Posture Management<br>ITWeb Security Summit sponsor,<br>Cymulate, offers quantified risk assessment that bridges the reporting gap between business leaders and tech teams \u2013 a gap that too often results from the lack of real, reliable and accurate cyber security performance metrics.The Cymulate Platform \u2013 named 2022 FROST RADAR Breach and Attack Simulation Report Innovation Leader \u2013 automatically validates that implemented security programs are effective, remediation efforts are contextualised and risk levels are baselined, rationalising requests for additional budget or headcount.The Cymulate Platform provides:<br>&#8211; Breach and attack simulation (BAS)<br>Leverages simulated cyber attacks for security control validation, SIEM\/SOAR optimisation, security validation of cloud environments and SOC and incident response optimisation.Cifarelli highlights the business benefits of the Cymulate platform:<br>&#8211; It measures the effectiveness of existing tools, identifies security gaps and provides actionable remediation recommendations, which enables Cymulate to gain visibility into an organisation&#8217;s cyber security stack to eliminate overlapping capabilities and locate gaps.It has achieved these accolades because the platform goes beyond BAS to provide a flexible and expandable platform for security control validation that meets any organisation\u2019s technical and business needs, not only for today but also over time, as cyber security resilience and maturity needs evolve.Complete reporting for both technical teams and business decision-makers provides the rationalisation of both remediation efforts and cyber security spending where one or more controls do need to be upgraded or replaced,\u201d Cifarelli concludes.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.itweb.co.za\/content\/mQwkoq6YAReM3r9A\">https:\/\/www.itweb.co.za\/content\/mQwkoq6YAReM3r9A<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"http:\/\/www.securitysa.com\/favicon.ico\">&nbsp;<strong>What Solutions Are There To Help Process PCI Compliance In Fintech Businesses?<\/strong><br><em>John O&#8217;Shea<\/em><br>Fintech businesses should provide comprehensive training programs to educate employees about the importance of PCI compliance, security best practices, and the handling of sensitive cardholder data.By implementing robust encryption and tokenization, securing network infrastructure, conducting regular audits and assessments, providing comprehensive employee training, outsourcing to PCI-compliant service providers, leveraging compliance management software, planning for incident response, and prioritising compliance training and education, businesses can enhance their security posture, minimise the risk of data breaches, and ensure ongoing compliance with PCI standards.As the threat landscape evolves, businesses must remain vigilant, adapt to new challenges, and continuously improve their security measures to protect sensitive cardholder data and maintain the trust of their customers.Quantanite can help manage and maintain your PCI compliance to find out more about how we can help please contact us now.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/quantanite.com\/blog\/what-solutions-are-there-to-help-process-pci-compliance-in-fintech-businesses\/\">https:\/\/quantanite.com\/blog\/what-solutions-are-there-to-help-process-pci-compliance-in-fintech-businesses\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/ciso2ciso.com\/wp-content\/uploads\/2022\/07\/cropped-CISO2CISO-huella-digital-sola-270x270.jpg\">&nbsp;<strong>Tel Aviv Stock Exchange Selects CardinalOps to Reduce Risk of Breaches Due to Undetected Attacks &#8230;.<\/strong><br>Source: www.darkreading.com \u2013 Author: 1<br>TEL-AVIV, Israel and BOSTON, June 1, 2023 \/PRNewswire\/ \u2014<br>CardinalOps, the detection posture management company, today announced that the Tel Aviv Stock Exchange (TASE) has deployed the CardinalOps platform to continuously audit and remediate detection coverage gaps in its Splunk Enterprise Security (ES) instance, thereby reducing the risk of undetected attacks in its Security Operations Center (SOC).<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/ciso2ciso.com\/tel-aviv-stock-exchange-selects-cardinalops-to-reduce-risk-of-breaches-due-to-undetected-attacks-source-www-darkreading-com\/\">https:\/\/ciso2ciso.com\/tel-aviv-stock-exchange-selects-cardinalops-to-reduce-risk-of-breaches-due-to-undetected-attacks-source-www-darkreading-com\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"http:\/\/blank.ico\/\">&nbsp;<strong>Global Wireless Network Security Market is estimated to reach US $ 58.14 Billion, rising at a CAG&#8230;.<\/strong><br><em>Jennifer Muse<\/em><br>).<br>\u00a7\u00a7 1011<br>+- Global Wireless Network Security Market is Estimated to Reach US$ 58.14 Billion, Rising at a CAGR of 12.67% by 2029 \u2013 Data by Exactitude Consultancy (https:\/\/themarketpublicist.com\/news\/global-wireless-network-security-market-is-estimated-to-reach-us-58-14-billion-rising-at-a-cagr-of-12-67-by-2029-data-by-exactitude-consultancy\/105326\/).<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/themarketpublicist.com\/news\/global-wireless-network-security-market-is-estimated-to-reach-us-58-14-billion-rising-at-a-cagr-of-12-67-by-2029-data-by-exactitude-consultancy\/105326\/\">https:\/\/themarketpublicist.com\/news\/global-wireless-network-security-market-is-estimated-to-reach-us-58-14-billion-rising-at-a-cagr-of-12-67-by-2029-data-by-exactitude-consultancy\/105326\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/www.tahawultech.com\/wp-content\/uploads\/2015\/09\/cropped-tahawultech-512x512-270x270.png\">&nbsp;<strong>Kaspersky introduces new cloud-based product for SMBs<\/strong><br><em>Daniel Shepherd<\/em><br>Kaspersky Endpoint Security Cloud Pro\u2019s features include root-cause analysis, cloud discovery and blocking, data discovery and integrated cybersecurity training for IT administrators.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.tahawultech.com\/news\/kaspersky-introduces-new-cloud-based-product-for-smbs\/\">https:\/\/www.tahawultech.com\/news\/kaspersky-introduces-new-cloud-based-product-for-smbs\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/cdn2.hubspot.net\/hubfs\/5278376\/fav-fpt-soft.png\">&nbsp;<strong>Cyber Security Corporate \u2013 The Powerhouses of Cybersecurity: Discovering the Biggest Names in the&#8230;.<\/strong><br><em>admin<\/em><br>The top names in cyber security are some of the largest corporate players in the technology sector.<br>These corporate giants offer a wide range of services and products for defending against online threats.<br>They are the powerhouses of cyber security and a look into them reveals the power and reach they have over the modern digital world.<br>One of the biggest names in the cyber security industry is Symantec.<br>Symantec offers a complete portfolio of products and services that protect and secure organizations from malicious online threats.<br>This includes end-user security solutions as well as enterprise security solutions and managed security services.<br>Symantec is also the developer of popular consumer security products such as Norton Antivirus and Norton Internet Security.<br>Another major player in cyber security is Intel Security.<br>Formerly known as McAfee, Intel Security has a portfolio of security products and solutions designed to protect individual computers, enterprise networks, mobile devices, and the cloud.<br>It also provides enterprise risk and compliance solutions.<br>IBM Security is yet another powerhouse in cyber security.<br>IBM has a full suite of security solutions for protecting networks, endpoints, data, and applications.<br>Its analytics solutions allow for increased visibility into network activities to help organizations detect, protect, and respond to security threats.<br>Other<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/cybersecurityhub.me\/cyber-security-corporate-the-powerhouses-of-cybersecurity-discovering-the-biggest-names-in-the-industry\/\">https:\/\/cybersecurityhub.me\/cyber-security-corporate-the-powerhouses-of-cybersecurity-discovering-the-biggest-names-in-the-industry\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/1382778335.rsc.cdn77.org\/wp-content\/uploads\/2017\/09\/cropped-AITHORITY-300-x-70-LOGO-1-270x270.png\">&nbsp;<strong>Commvault Redefines Data Protection with Advanced Security and Ecosystem Integrations<\/strong><br><em>AIT News Desk<\/em><br>Commvault Redefines Data Protection with Advanced Security and Ecosystem Integrations<br>Latest Innovations Automatically and Intelligently Spot and Engage Cyberthreats, Minimizing Production Data Risks and Eliminating Costly Interruptions Within Five Minutes<br>Commvault, an enterprise data protection leader for global businesses and the first data protection vendor to introduce cyber deception, announced new security capabilities across its entire portfolio.Latest Insights:<br>How to Get Started with Prompt Engineering in Generative AI Projects<br>\u201cToday we advance on our vision of enhanced data protection that establishes a seamless relationship between threat events and backups \u2013 resulting in a rapid and reliable solution for data recovery in the event of a cyber incident,\u201d said<br>Rajiv Kottomtharayil, Chief Product Officer, Commvault.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/aithority.com\/machine-learning\/commvault-redefines-data-protection-with-advanced-security-and-ecosystem-integrations\/\">https:\/\/aithority.com\/machine-learning\/commvault-redefines-data-protection-with-advanced-security-and-ecosystem-integrations\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/www.safetydetectives.com\/favicon.ico\">&nbsp;<strong>Interview with Anand Ramanathan, CPO of Skyhigh Security<\/strong><br><em>Shauli Zacks<\/em><br>Anand Ramanathan is the Chief Security Officer (CSO) at Skyhigh Networks.<br>He is responsible for the security of the company\u2019s cloud security and compliance solutions.<br>Anand has over two decades of experience in information security, with in-depth experience in enterprise security, cloud security, and compliance.<br>Prior to joining Skyhigh, he was the VP of Security &amp; Compliance at Box and was the CISO at Adobe.<br>Anand has also held various leadership and engineering roles at Juniper Networks and Oracle.<br>He has a Masters in Computer Science from the University of Wisconsin-Madison and an MBA from the Indian Institute of Management in Kozhikode.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.safetydetectives.com\/blog\/anand-ramanathan-skyhigh-security\/\">https:\/\/www.safetydetectives.com\/blog\/anand-ramanathan-skyhigh-security\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/vmblog.com\/archive\/2023\/06\/20\/favicon.ico\">&nbsp;<strong>Cyware Announces Technology Partnership with Mimecast to Extend Cyber Fusion with Advanced Email &#8230;.<\/strong><br><em>David Marshall<\/em><br>Cyware&#8217;s technology partnership with Mimecast provides joint customers with:<br>Proactive Threat Detection: The technology integration of Cyware&#8217;s threat intelligence management with Mimecast&#8217;s email security solutions enables organizations to detect and block sophisticated threats such as malware, ransomware, and phishing in real-time, reducing the risk of successful cyberattacks.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/vmblog.com\/archive\/2023\/06\/20\/cyware-announces-technology-partnership-with-mimecast-to-extend-cyber-fusion-with-advanced-email-security.aspx\">https:\/\/vmblog.com\/archive\/2023\/06\/20\/cyware-announces-technology-partnership-with-mimecast-to-extend-cyber-fusion-with-advanced-email-security.aspx<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/miro.medium.com\/v2\/resize:fill:152:152\/1*sHhtYhaCe2Uc3IU0IgKwIQ.png\">&nbsp;<strong>Vision One Now Has Generative AI Thanks to Trend Micro, Improving XDR &#8211; TechVersions<\/strong><br><em>@tech_versions<\/em><br>Trend Micro, a leader in cloud security solutions, has announced the launch of Vision One \u2013 a new and improved Extended Detection and Response (XDR) product.<br>The product isTrend Micro\u2019s next generation XDR solution that is designed to break down security silos, defend organizations across app, data, email, network, and user layers, and provide an integrated view of the security posture of customers.<br>The product features the newly introduced generative AI technology to help customers detect and respond to advanced threats and reduce the time from detection to resolution.<br>The combination of machine learning and generative AI allows Vision One to rapidly identify unique and complex threats that traditional security solutions might not detect.<br>This is because generative AI algorithms allow Vision One to generate thousands of combinations of data and then quickly identify hidden patterns.<br>Generative AI gives customers the ability to identify threats in their environment before malicious activity occurs.<br>The product also utilizes advanced Behavioral Analytics to detect suspicious behavior in real-time and allows for automatic response processes to help organizations mitigate threats.<br>Vision One also features Cross-Domain Visibility (CDV), which allows customers to have a unified view of their security posture across multiple cloud systems, applications, and networked devices.<br>This helps customers to streamline their<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/techversions.com\/news\/vision-one-now-has-generative-ai-thanks-to-trend-micro-improving-xdr\/\">https:\/\/techversions.com\/news\/vision-one-now-has-generative-ai-thanks-to-trend-micro-improving-xdr\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/mma.prnewswire.com\/media\/2019240\/Reco_Logo.jpg?p=facebook\">&nbsp;<strong>Reco Partners with Blink to Automatically Remediate SaaS Data Security Exposure Events<\/strong><br><em>Reco<\/em><br>Reco, a SaaS security auto-remediation platform, has announced a partnership with Blink, an AI-driven IT security service provider, to automatically remediate security exposure events.<br>Through the partnership, Reco&#8217;s platform will integrate with Blink to detect, analyze, and respond to potential security exposures.<br>This partnership will enable security teams to quickly and automatically identify, address, and recover from subtle and complex SaaS security exposures.<br>The combined platform helps address common security challenges, enabling cloud security teams to manage risk levels in SaaS applications and secure data more effectively.<br>Security teams will have greater visibility and control over their online cloud security so they can take proactive steps to prevent security risks.<br>The automated platform is designed to help enterprises secure and protect their data in the cloud and maintain compliance with industry standards.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.prnewswire.com\/news-releases\/reco-partners-with-blink-to-automatically-remediate-saas-data-security-exposure-events-301856224.html\">https:\/\/www.prnewswire.com\/news-releases\/reco-partners-with-blink-to-automatically-remediate-saas-data-security-exposure-events-301856224.html<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/mma.prnewswire.com\/media\/2019240\/Reco_Logo.jpg?p=facebook\">&nbsp;<strong>Exabeam Announces Outcomes Navigator for Threat Detection Coverage Across All Common Security Use&#8230;.<\/strong><br><em>businesswire.com<\/em><br>FOSTER CITY, Calif. &amp; LONDON&#8211;( BUSINESS WIRE )&#8211; Exabeam , a global cybersecurity leader and creator of New-Scale SIEM for advancing security operations, today announced the general availability of Outcomes Navigator, an advanced visualization feature within the New-Scale SIEM product portfolio.\u201cOutcomes Navigator lets companies get a comprehensive and accurate score of true detection coverage across their business,\u201d said Ash Hunt, Global CISO, Apex Group Ltd. \u201cIt gives CISOs a real way to show their executive team and the board exactly how well they are doing with detection coverage across all security use cases, and what further investments may or may not be needed.In Exabeam\u2019s experience, the disconnect can largely be attributed to the lack of visibility and context security operations center (SOC) teams have on adversary behavior and the direct relationship between the choice and quality of security logs they absorb and parse for the most successful outcomes across use cases.\u201cOutcomes Navigator is a game changer for cybersecurity teams who, until now, have had to blindly trust that their SIEM is ingesting the right logs and then also extracting the right fields inside those logs to best protect their organizations,\u201d said Andy Skrei, Senior Director, Product Management, Exabeam.Outcomes Navigator fixes this SIEM industry problem once and for all with the deepest cross examination of logs and detection logic.\u201d<br>Built on the cloud-native Exabeam Security Operations Platform , the New-Scale SIEM product portfolio with Outcomes Navigator uses a behavior-based approach to threat detection, investigation, and response (TDIR) that makes it easier for organizations to detect security threats and more quickly respond to them.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.businesswire.com\/news\/home\/20230621174568\/en\/Exabeam-Announces-Outcomes-Navigator-for-Threat-Detection-Coverage-Across-All-Common-Security-Use-Cases\">https:\/\/www.businesswire.com\/news\/home\/20230621174568\/en\/Exabeam-Announces-Outcomes-Navigator-for-Threat-Detection-Coverage-Across-All-Common-Security-Use-Cases<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/www.storagenewsletter.com\/apple-touch-icon.png\">&nbsp;<strong>Vast Data and Commvault Bolster Partnership<\/strong><br><em>Richard Gruet<\/em><br>\u201cThrough these partnerships, we\u2019re improving the performance, reliability, and scalability for our customers, resulting in a higher service level, improved recovery time and ultimately better business outcomes for the short and long term.\u201d<br>\u201cThis is a great step in our continued partnership with Commvault, bringing organizations a joint solution that provides protection and recovery from ransomware and cyber-attacks while optimizing performance, cost, and efficiency,\u201d said Michael Wing, president, Vast Data.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.storagenewsletter.com\/2023\/06\/27\/vast-data-and-commvault-bolster-partnership\/\">https:\/\/www.storagenewsletter.com\/2023\/06\/27\/vast-data-and-commvault-bolster-partnership\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/img.helpnetsecurity.com\/wp-content\/uploads\/2019\/09\/09093400\/cropped-hns2-270x270.png\">&nbsp;<strong>Betacom AirGap Protection strengthens security for private 4G\/5G networks<\/strong><br><em>Industry News<\/em><br>With more visibility and control over network security, enterprises can confidently deploy new services that automate their operations and eliminate the insecurity of Wi-Fi systems and the high cost of carrier networks.\u201d<br>The AirGap framework will be first deployed in Betacom\u2019s private 5G networks at MxD, which is designated the National Center for Cybersecurity in Manufacturing by the U.S.<br>Defense Department.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.helpnetsecurity.com\/2023\/06\/28\/betacom-airgap-protection\/\">https:\/\/www.helpnetsecurity.com\/2023\/06\/28\/betacom-airgap-protection\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/www.mobilevillage.com\/wp-content\/uploads\/2016\/02\/cropped-MV-favicon-300x300.png\">&nbsp;<strong>Critical Insight Introduces PartnerFirst Program to Accelerate Partner Business Growth<\/strong><br><em>Wire Service<\/em><br>New Features for MSP, Channel Partners to Secure Customers and Defend Critical Services<br>SEATTLE\u2013(BUSINESS WIRE)\u2013Critical Insight, the Cybersecurity-as-a-Service provider specializing in helping critical organizations Prepare, Detect, and Respond in today\u2019s threat environment, announced today the Critical Insight PartnerFirst Program, which has evolved with new features and significant enhancements to recognize and reward partners\u2019 expertise ensuring partners feel supported and invested at each level of the program.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.mobilevillage.com\/critical-insight-introduces-partnerfirst-program-to-accelerate-partner-business-growth\/\">https:\/\/www.mobilevillage.com\/critical-insight-introduces-partnerfirst-program-to-accelerate-partner-business-growth\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/i0.wp.com\/tylergarrett.com\/wp-content\/uploads\/2020\/10\/cropped-1500x500-1.jpg?fit=180%2C180&amp;ssl=1\">&nbsp;<strong>Cyware lands $30M to modernize cybersecurity operations | TechCrunch<\/strong><br><em>tyler<\/em><br>Cyware, a cybersecurity operations startup, announced today that it has raised a $30 million Series B round led by Accel and Insight Partners.<br>This latest investment brings the company\u2019s total funding to date to $45 million.<br>The funding will be used to accelerate product innovation, expand engineering and customer success teams and enhance Cyware\u2019s go-to-market capabilities.<br>The startup has already made several key hires on the executive, technology and marketing teams in the last year.<br>Cyware has been working on a suite of products to streamline cybersecurity operations.<br>All of Cyware\u2019s products are built on a unified platform and offered through a single user interface.<br>This allows organizations to streamline threat detection, response and mitigation in one streamlined application.<br>This latest funding will also be used to upgrade Cyware\u2019s portfolio, adding new support for the cloud, IoT, and application security.<br>The company also plans to launch several new features in the coming months, including incident response automation, AI-powered alerting, and adaptive risk mitigation.<br>Cyware is headquartered in New Jersey and has plans to expand to Israel.<br>The company\u2019s co-founder and CEO, Yabir Ibnb<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/tylergarrett.com\/tech\/2023\/06\/cyware-lands-30m-to-modernize-cybersecurity-operations-techcrunch\/\">https:\/\/tylergarrett.com\/tech\/2023\/06\/cyware-lands-30m-to-modernize-cybersecurity-operations-techcrunch\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/technologyreseller.uk\/wp-content\/uploads\/2020\/05\/cropped-Screenshot-2020-05-08-at-17.32.39-270x270.png\">&nbsp;<strong>Tanium recognised as winner of the 2023 Microsoft US Rising Azure Technology Partner of the Year &#8230;.<\/strong><br><em>Neil Trim<\/em><br>Tanium, the industry\u2019s only provider of converged endpoint management (XEM), today announced it has been awarded the Rising Azure Technology Partner of the Year Award as part of the 2023 Microsoft US Partner of the Year programme that recognises vendors for outstanding achievements and innovations.\u201cThe winners and finalists of the 2023 Microsoft Partner of the Year Awards have demonstrated the best of what\u2019s possible with the Microsoft Cloud by providing innovative new solutions and services that positively impact customers and enable digital transformation.\u201d<br>A member of the<br>Microsoft Intelligent Security Association (MISA), Tanium and Microsoft provide customers the benefits of solutions that include:<br>&#8211; Leveraging Azure Active Directory, customers can utilise Tanium technology to determine the security posture of user devices, helping to ensure their software and policy configuration are up to date before allowing access to resources on the network.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/technologyreseller.uk\/tanium-recognised-as-winner-of-the-2023-microsoft-us-rising-azure-technology-partner-of-the-year-award\/\">https:\/\/technologyreseller.uk\/tanium-recognised-as-winner-of-the-2023-microsoft-us-rising-azure-technology-partner-of-the-year-award\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Table of Contents &nbsp;Sophos Promotes Joe Levy to President of Sophos Technology GroupAs president, Levy will continue expanding Sophos as a leading global cybersecurity as a service provider, driven by its fast-growing Sophos Managed Detection and Response (MDR) and Incident Response (IR) services and a more than $1 billion product&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[42],"tags":[],"class_list":["post-5095","post","type-post","status-publish","format-standard","hentry","category-security-industry-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/5095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=5095"}],"version-history":[{"count":2,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/5095\/revisions"}],"predecessor-version":[{"id":5110,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/5095\/revisions\/5110"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=5095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=5095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=5095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}