Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

Un-break your business model: Benchmarks and tools for MSPs

For managed service providers (MSPs), staying ahead requires more than just adapting to change - it demands a strategic overhaul of your business model. In this white paper, "Un-break your business model: Benchmarks and tools for MSPs," you will learn how to navigate the complexities of the MSP market with confidence and foresight.

Aembit Announces Speaker Lineup for the Inaugural NHIcon

Aembit, the non-human identity and access management (IAM) company, unveiled the full agenda for NHIcon 2025, a virtual event dedicated to advancing non-human identity security, streaming live on Jan. 28 and headlined by industry luminary Kevin Mandia. NHIcon 2025 is co-presented by Aembit and Veza, alongside industry partners Identity Defined Security Alliance and Cloud Security Alliance.

Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to 0.04%

Sweet Security, a leader in cloud runtime detection and response, today announced the launch of its groundbreaking patent-pending Large Language Model (LLM)-powered cloud detection engine. This innovation enhances Sweet's unified detection and response solution, enabling it to reduce cloud detection noise to an unprecedented 0.04%. Sweet uses advanced AI to help security teams navigate complex and dynamic environments with improved precision and confidence.

Wultra Secures €3M to Protect Financial Institutions from Quantum Threats

Quantum computing is set to revolutionize technology, but it also presents a significant security risk for financial institutions. Czech cybersecurity startup Wultra has raised €3 million from Tensor Ventures, Elevator Ventures, and J&T Ventures to accelerate the development of its post-quantum authentication technology, safeguarding banks and fintech against the coming wave of quantum threats.

Un-break your business model: Benchmarks and tools for MSPs

For managed service providers (MSPs) facing numerous and mounting challenges, maintaining a robust and resilient business model is essential for survival and advancement. MSPs need to embrace strategies and tools that can help them achieve financial stability and operational efficiency. Fortunately, those strategies and tools are within the reach of MSPs of all sizes. The key is to understand and put into place best practices that will deliver benefits without causing a negative business disruption.

How Generative AI is Shaping the Future of Cybersecurity: Key Insights for CISOs and Enterprises

The increasing adoption of generative artificial intelligence platforms by threat actors, cyber defenders, and the average organization will present enterprises with an unprecedented number of cybersecurity issues in the coming years, according to a new Gartner report and information from Trustwave subject matter experts.

Is Your Organization Prepared for Tomorrow's Risks? Announcing Tanium Integrated Risk Management for ServiceNow

As IT infrastructures grow more complex and cyber threats escalate, CIOs are searching for a powerful new solution for risk and compliance. Tanium Integrated Risk Management (IRM) for ServiceNow addresses these challenges with an integrated platform that transforms visibility, control, and remediation with real-time, unified data for IT, security, and risk teams.

Assembling the Dream Team: Building a High-Performing Supply Chain Incident Response Team

Organizations are increasingly reliant on third-party vendors. While this enables agility and innovation, it also introduces significant security risks. Cyberattacks originating from the supply chain are on the rise, underscoring the critical need for robust security measures. This article explores the key elements of building a high-performing supply chain incident response team to effectively mitigate and respond to these threats.

Securely Deploying & Running Multiple Tenants on Kubernetes

As Kubernetes becomes the backbone of modern cloud native applications, organizations increasingly seek to consolidate workloads and resources by running multiple tenants within the same Kubernetes infrastructure. These tenants could be: While multitenancy offers cost efficiency and centralized management, it also introduces security and operational challenges: To address these concerns, practitioners have three primary options for deploying multiple tenants securely on Kubernetes.

The Critical Evolution of Cloud Detection and Response

Cloud security has reached an inflection point. Organizations have accelerated their cloud adoption and must navigate a complex threat landscape where workloads spin up and down in seconds, applications deploy continuously and identities span multiple services and providers.