Skybox Security introduces SaaS solution for Security Policy and Vulnerability Management

Skybox Security announced the next generation of its Security Posture Management Platform – including a Software-as-a-Service (SaaS) solution for Security Policy and Vulnerability Management. Propelling its global customer base into the next era of proactive cybersecurity, major innovations advance its platform that continuously tests attack feasibility, exposure, remediation options, and compliance across hybrid environments. “Today, […]

Continue Reading

How to improve public sector’s security strategy?

With international tensions heightened as we enter month eight of the war between Russia and Ukraine, it’s clear that a new era of intensifying state-sponsored attacks is upon us, especially those targeting public sector agencies and services. The Cybersecurity and Infrastructure Security Agency (CISA) has issued a rare “Sheilds Up” warning earlier this year, highlighting […]

Continue Reading

Organizations need to change their strategy to reduce cyber risk

Traditional security approaches that rely on reactive, detect-and-respond measures and tedious manual processes can’t keep pace with the volume, variety, and velocity of current threats, according to Skybox Security. As a result, 27% of all executives and 40% of CSOs say their organizations are not well prepared for today’s rapidly shifting threat landscape. This Help […]

Continue Reading

Conventional cybersecurity approaches are falling short

Traditional security approaches that rely on reactive, detect-and-respond measures and tedious manual processes can’t keep pace with the volume, variety, and velocity of current threats, according to Skybox Security. As a result, 27% of all executives and 40% of CSOs say their organizations are not well prepared for today’s rapidly shifting threat landscape. A tipping […]

Continue Reading

Infosec products of the month: May 2022

Here’s a look at the most interesting products from the past month, featuring releases from: AuditBoard, BIO-key, Cohesity, Corelight, Data Theorem, Deepfence, ForgeRock, Fortinet, Hunters, Enpass, iDenfy, Kasten by Veeam, Kingston Digital, Microsoft, N-able, Nasuni, Netenrich, Orca Security, PIXM, Qualys, SafeGuard Cyber, SecureAge, Skybox Security, Sonatype, Trusona, and Uptycs. Qualys Custom Assessment and Remediation empowers […]

Continue Reading

New infosec products of the week: May 20, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Deepfence, Kasten by Veeam, Qualys, Skybox Security, and Trusona. Qualys Custom Assessment and Remediation empowers security teams to counter threats like zero-day attacks Qualys Custom Assessment and Remediation opens the Qualys Platform for security architects allowing the creation of custom […]

Continue Reading

Skybox Security unveils cyber risk quantification capabilities to help users prioritize critical threats

Skybox Security unveiled new automated cyber risk quantification capabilities. Leveraging its proprietary network modeling techniques, Skybox now quantifies the business impact of cyber risks into economic impact. This new financial calculation enables customers to identify and prioritize the most critical threats based on the size of financial impact, among other risk analyses. “Other industry solutions […]

Continue Reading

How fast do cybercriminals capitalize on new security weaknesses?

Threat intelligence analysts at Skybox Research Lab uncovered a 42% increase in new ransomware programs targeting known vulnerabilities in 2021. The report revealed how quickly cybercriminals capitalize on new security weaknesses – shrinking the window that organizations have to remediate vulnerabilities ahead of an attack. Record-breaking growth in new vulnerabilities With 20,175 new vulnerabilities published […]

Continue Reading

Why vulnerability scanners aren’t enough to prevent a ransomware attack on your business

Vulnerability scanners are still essential tools for defenders protecting enterprise and government networks. But given the rapidly increasing complexity of today’s cyber threat landscape, these scanners are not enough to win the fight against an increasingly overwhelming volume of vulnerability alerts. Three specific drivers have made vulnerability scanners obsolete as standalone security tools in the […]

Continue Reading