Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

#1 Best Pitch for Smoking Hot Tech

On July 21st, Vonahi Security won 1st place against 7 other innovative companies in Channel Program’s monthly Pitch Event. Each company had exactly 7-minutes to pitch their product or service to the channel. Over 450 MSP attendees feasted their eyes on some hot new tech. At the end of each pitch, attendees had about two minutes to fill out a survey and vote for their favorite pitch.

Why MSPs need to Reconsider SIEM for Office 365 Security

In 2005, a new market emerged when Gartner coined the term "SIEM" OR Security and Information Event Management. Back then, it was a legacy system aggregating event data produced by security devices, systems, network infrastructures and applications. However, it lacked monitoring functionality and was limited to vertical scalability.

Rubrik Ranked #31 on the 2022 Forbes Cloud 100

Rubrik is honored to again be named to the Forbes Cloud 100, the annual ranking of the top private cloud companies in the world. This list is comprised of some of the most respected and fastest-growing companies globally. We’re humbled to be alongside these innovative brands and to make this prestigious list for the sixth year in a row! As the pioneer in Zero Trust Data Security™, this recognition underscores Rubrik’s continued cybersecurity momentum.

Keeper Security in the 2022 Gartner Magic Quadrant for Privileged Access Management

We are proud to share that Keeper Security is highlighted in the 2022 Gartner Magic Quadrant for Privileged Access Management (PAM).1 Gartner evaluated eleven PAM vendors for 2022. Keeper’s inclusion acknowledges the team’s success since launching key PAM components such as Connection Manager, Secrets Manager and Password Manager, elevating our platform beyond a password manager.

Say hello to 1Password 8 for iOS and Android

Sometimes I forget to marvel at what we, as an industry, have built in the past 30 years. I have this little device in my pocket, and a slightly larger version on my nightstand. With either one, I can video chat with a friend in the UK, access my medical records, or check in for a vet appointment. I can track my workouts or reserve a table at my favorite restaurant.

Synopsys and ESG report points to prevalence of software supply chain risks

New research shows organizations are significantly increasing efforts to secure their supply chains in response to software supply chain attacks like Log4Shell, SolarWinds, and Kaseya. Today, the Enterprise Strategy Group (ESG) released “Walking the Line: GitOps and Shift Left Security,” a multiclient developer security research report examining the current state of application security.

AV-TEST Results Show Netskope Threat Protection Efficacy

We measure and test things that are important in our lives, from credit scores to blood pressure. For cybersecurity, testing threat protection defenses is an expected benchmark. Netskope recently completed a set of anti-malware tests with AV-TEST, an independent anti-malware testing lab based in Germany with one of the world’s largest databases of malware samples. Every second, AV-TEST discovers four to five new malware variants.

Are SASE and Zero Trust the key for manufacturers grappling with IoT cyber risks?

As manufacturers dash headlong into smart factory initiatives, the number of IoT devices operating in factories, warehouses, and across supply chain infrastructure is exploding. Manufacturers seek to utilize IoT in a range of places, be it video camera inspection devices on the assembly line, temperature sensors on refrigeration units, or maintenance telemetry sensors on factory equipment.

Automation in Cybersecurity: Overcoming Barriers to Adoption

“Automation” has become a buzzword in cybersecurity circles. That’s not surprising in an environment where security specialists are in short supply and under intense pressure to defend the business against a huge variety of threats from innumerable different sources. Using technology to do at least some of the work seems like a no-brainer. Nevertheless, it seems that organizations are finding it hard to get the right approach to cybersecurity automation.