Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Best Cyber Firm at The Sparkies

We are very proud to share that we took home ‘Best Cyber Firm’ at this years’ Sparkie’s Awards. The 2023 Sparkies took place during the Bath Digital Festival, organised by Tech Spark, with the awards ceremony taking place in the centre of Bath on 13th July. This annual event celebrates an array of innovative technology companies, based throughout the Southwest.

Introducing the Zenity Attack Graph: Visualize Low-Code/No-Code Risk with Full Context

On paper, applications are created to be useful tools that solve specific business needs. Think of an application that tracks all ongoing projects for a product manager, an automation that triggers emails to prospective customers when they fill out a marketing form, or a flow that sends aggregated payment information to a finance manager. While all these applications are fairly straightforward, and seemingly used for singular cases, they are anything but.

Kriptomat launches GameFi Web3 Wallet for 400,000 users, using Fireblocks

Today, Estonian crypto platform, Kriptomat, launches its new Kriptomat GameFi Web3 Wallet for over 400,000 non-crypto native users to access Web3 games. The new offering was built using Fireblocks Web3 Wallet Link. Web3 games have yet to tap into the massive $120 billion mobile gaming market due to the intimidating and complex user experience.

Outpost24 CORE delivers complete visibility of technology assets and threat exposure, with business-level mitigation guidance

Leading cyber risk platform provider Outpost24 announces release of Outpost24 CORE, a ground-breaking unified exposure management solution that gives unprecedented visibility and real-time insights into an organization's IT asset inventory and their threat exposure across the entire attack surface.

Greater Detection Accuracy and Faster Time-to-Value with Splunk IT Service Intelligence 4.17

We’re all juggling more complexity than ever before. Chances are you’re being pulled in multiple directions, working across teams and dealing with more tools than you’d like to. We know you want to keep everything running smoothly and don’t want to focus your time on setting things up, especially when you’re probably dealing with other fires.

Eliminate Manual Threat Analysis of Credential Phishing and Malware Threats With Splunk Attack Analyzer

We are extremely excited to introduce a new addition to the Splunk unified security operations experience: Splunk Attack Analyzer (formerly Twinwave), which automates threat analysis of suspected malware and credential phishing threats by identifying and extracting associated forensics to provide accurate and timely detections. SOC analysts continue to struggle to work across many security tools to help them understand and address threats targeting the organization.

Trustwave Named a Leader in ISG Provider Lens for Cybersecurity Solutions and Services

For the second consecutive year, Information Security Group (ISG) named Trustwave a Rising Star in Managed Security Services (MSS) for U.S. Large Accounts and for the first time as a Leader in MSS for U.S. Midmarket in its 2023 Provider Lens™ Quadrant Report. ISG recognized Trustwave for its holistic offering with enhanced visibility, continuous threat monitoring and hunting, and its elite partnerships.

From Resurface to Graylog API Security: The Next Chapter

When I started Resurface, my core thesis was that web and API security brought unique requirements requiring purpose-built data systems. Using Splunk at scale for API monitoring was/is prohibitively expensive. Using Hadoop or Kafka requires a nerd army to run at any scale. Few data platforms include a mature web or API monitoring model, so this has to be custom-overlaid at significant expense.