Cybersecurity
Search documents
Palo Alto Networks Completes Acquisition of Protect AI
Prnewswire· 2025-07-22 13:15
Core Viewpoint - Palo Alto Networks has completed the acquisition of Protect AI, enhancing its capabilities in securing AI applications and models, thereby establishing itself as a leader in comprehensive AI security solutions [1][2][3]. Group 1: Acquisition Details - The acquisition of Protect AI is aimed at integrating its advanced technology and expertise into Palo Alto Networks' Prisma® AIRS™, which is described as the industry's most comprehensive AI security platform [2][4]. - Protect AI's technology will enable Palo Alto Networks to address the evolving security needs of organizations that are increasingly adopting AI across various sectors, including finance, government, healthcare, manufacturing, and retail [1][4]. Group 2: Security Enhancements - The combination of Protect AI and Palo Alto Networks will provide a range of security features, including model scanning, posture management, AI red teaming, runtime protection, and AI agent security, which are essential for managing the new attack surfaces created by AI ecosystems [4][5]. - The integration is expected to help businesses confidently deploy AI-driven innovations while maintaining a strong security posture throughout the AI lifecycle [5][6]. Group 3: Industry Impact - The acquisition is seen as a significant advancement in delivering secure AI solutions, particularly in regulated industries and national security environments where the risks associated with AI adoption are heightened [7]. - Leidos, a strategic partner, is already utilizing Prisma AIRS to demonstrate safe AI acceleration for government customers, indicating strong market anticipation for a unified security platform [6][7]. Group 4: Customer Insights - Early adopters of Prisma AIRS, such as TELUS Digital, express excitement about the platform's capabilities, particularly in monitoring API calls and detecting malicious activities performed by AI tools [8].
Fortinet Advances Quantum-Safe Security to Guard against Emerging Quantum Threats
Globenewswire· 2025-07-22 13:00
Core Viewpoint - Fortinet has introduced enhanced features in its FortiOS operating system to protect organizations from quantum computing threats, enabling them to transition to post-quantum security without performance impact [1][4]. Group 1: Fortinet's Innovations - Fortinet's latest FortiOS capabilities include quantum-safe encryption algorithms and key distribution methods that can withstand quantum attacks, allowing organizations to secure highly sensitive data [1][3]. - The new features are available at no additional cost for FortiGate NGFW and Fortinet Secure SD-WAN customers, including NIST-approved algorithms like ML-KEM and emerging algorithms such as BIKE, HQC, and Frodo [4][7]. - Fortinet's approach integrates quantum key distribution (QKD) to ensure secure key exchange and detect eavesdropping attempts, enhancing network security [7]. Group 2: Industry Context - Quantum computers can break current encryption standards, posing a significant threat to industries handling sensitive data, such as telecommunications, financial services, government, and healthcare [3]. - Cybercriminals are already storing encrypted traffic to decrypt later, highlighting the urgency for organizations to adopt quantum-safe encryption now [3]. Group 3: Future-Proofing Security - Fortinet's unified operating system allows for the deployment of cutting-edge updates, including quantum-safe innovations, helping customers future-proof their security postures [5]. - The introduction of a hybrid mode facilitates a gradual transition to post-quantum security, enabling seamless integration of traditional public-key cryptography and QKD [7].
Rapid7 Launches Active Patching, Powered by Automox, to Proactively Mitigate Risk on Vulnerable Assets Across the Entire Attack Surface
Globenewswire· 2025-07-22 13:00
Core Insights - Rapid7, Inc. has launched Active Patching, an automated patching and remediation solution integrated into its Exposure Command platform, aimed at enhancing security and IT teams' ability to mitigate risks across vulnerable assets [1][3]. Group 1: Product Features - Active Patching automates risk remediation and provides continuous, real-time visibility into systems that require patches and those without available fixes, addressing the challenges posed by traditional patching methods [2][4]. - The solution is powered by Automox's Autonomous Endpoint Management platform, allowing teams to prioritize effectively and accelerate response times, resulting in a proactive security posture [3][5]. - Active Patching enhances Exposure Command's capabilities by providing automated patching and remediation, which includes features like automated remediation workflows and unmatched patching coverage across various operating systems [6]. Group 2: Industry Context - The increasing pace at which attackers exploit zero-day vulnerabilities and misconfigurations necessitates modern security solutions that not only identify vulnerabilities but also enable rapid action [2][5]. - The partnership between Rapid7 and Automox aims to reduce risk significantly by enabling customers to transition from identification to remediation in minutes, thus minimizing manual overhead [5][8]. - Automox's platform claims to deliver 65% faster patching and improve security team efficiency by 44% through automated configuration management across multiple operating systems [8].
Varonis Heads to Black Hat USA 2025, DEF CON, and BSides
Globenewswire· 2025-07-22 13:00
Core Insights - Varonis Systems, Inc. is participating in Black Hat USA 2025 as a Platinum Plus Sponsor, showcasing its cloud-native Data Security Platform to help organizations mitigate data risks in the AI era [2][7] - The company will present expert sessions and workshops focusing on data security challenges, including identity authentication failures and vulnerabilities in cloud databases [3][4][5] Company Highlights - Varonis will be at booth 2751, sharing insights from its Threat Labs team and demonstrating how to secure data across multi-cloud environments [1][2] - The company emphasizes its unique Managed Data Detection and Response service, which is dedicated to preventing data attacks [2][8] - Varonis' platform automates various security outcomes, including data classification, access governance, and insider risk management [8] Event Details - Expert sessions include "Navigating the Identity Crisis" and "Rusty Pearls: Postgres RCE on Cloud Databases," focusing on authentication issues and critical vulnerabilities [3][4][5] - An interactive workshop titled "SnowGoat" will address hidden security risks in Snowflake environments [5] - The events will take place at various locations within the Las Vegas Convention Center during the Black Hat and DEF CON conferences [4][5]
Integrated Cyber Pioneers Quantum-Resilient Federated Architecture to Power the Future of Cyber Defense
Thenewswire· 2025-07-22 12:00
Core Insights - Integrated Cyber Solutions Inc. (ICS) is developing a proprietary Federated AI Cybersecurity Architecture aimed at addressing cybersecurity challenges in a post-quantum world [1][2] - The architecture focuses on mitigating quantum risks, distributed threat surfaces, and the need for decentralized, real-time intelligence [2][4] - CEO Alan Guibord emphasizes the importance of future-proofing cybersecurity against quantum threats and redefining access, trust, and detection [3][8] Technical Framework - The architecture is based on a zero-trust design, decentralizing enforcement, enhancing privacy, and enabling rapid AI-driven responses without exposing sensitive data [4][5] - Key components include: - Edge-Oriented AI Orchestration for decision-making at the data source [5] - Dynamic Trust Indexing for real-time trust scoring [5] - Federated Threat Detection to keep sensitive data local while deploying AI for contextual threat detection [5] - Quantum-Ready Privacy Layer for future cryptographic principles [5] Strategic Vision - SecureGuard360™, ICS's flagship platform, will evolve into a control layer coordinating a decentralized security fabric powered by federated intelligence [7][10] - The Federated AI Architecture represents a significant step in ICS's innovation roadmap, showcasing the company's commitment to addressing complex global cyber threats [8][11] - ICS plans to collaborate with technology partners, academic advisors, and security architects to refine its research and develop post-quantum agile solutions [9][11]
X @The Wall Street Journal
The Wall Street Journal· 2025-07-22 10:34
Cybersecurity companies without the money and staff to do AI well are looking to be bought, bankers say https://t.co/y1MWZTIeOS ...
Is CrowdStrike a Buy a Year After the Big IT Outage?
The Motley Fool· 2025-07-22 08:30
Core Viewpoint - CrowdStrike has demonstrated resilience and growth despite facing significant challenges from a major IT outage last year, leading to a positive outlook for the company's future performance [1][2][11]. Company Overview - CrowdStrike offers an AI-driven cybersecurity platform called Falcon, which is designed to prevent cyberattacks by gathering and analyzing data from businesses [4]. - The platform includes various modules that allow customers to customize their security solutions according to their specific needs [5]. Financial Performance - Despite the challenges from the outage, CrowdStrike has achieved double-digit revenue growth, with annual recurring revenue increasing by 22% to over $4.4 billion, including $194 million added in the latest quarter [10]. - The company reported record cash flow from operations of $384 million and announced a share-repurchase authorization of $1 billion, indicating confidence in its future [10]. Customer Retention and Commitment - Following the IT outage, most customers remained with CrowdStrike, and the company continued to secure new deals, although earnings were impacted by customer commitment packages that provided discounts and flexible payment terms [9]. - The commitment program concluded in the fourth quarter, but its effects are expected to influence revenue through the end of the fiscal year [9]. Future Outlook - CrowdStrike's ability to manage the crisis effectively and its ongoing growth trends suggest a bright long-term outlook for the company [11]. - The stock is considered a buy as the company enters a new phase of growth, reflecting strong investor confidence [12].
Fortinet Honors the Life and Contributions of Valued Board Member William H. Neukom
Globenewswire· 2025-07-21 20:30
Core Insights - Fortinet announced the passing of William H. "Bill" Neukom, a board member since 2013, who provided significant leadership and guidance during the company's growth [1][2] - The Fortinet Board expressed deep sadness over Neukom's passing, highlighting his immeasurable contributions to the company and the technology industry [2] - Neukom's legacy includes his role as Microsoft's first general counsel and founder of the World Justice Project, emphasizing corporate responsibility and technology's societal role [2] Company Overview - Fortinet is a leader in cybersecurity, focusing on the convergence of networking and security, with a mission to secure people, devices, and data globally [3] - The company offers an extensive portfolio of over 50 enterprise-grade cybersecurity products, trusted by more than half a million customers [3] - Fortinet's commitment to enhancing global cyber resilience includes collaboration with public and private sectors and a robust training program through the Fortinet Training Institute [3]
Tenable Named a Leader in Unified Vulnerability Management Solutions by Independent Research Firm
Globenewswire· 2025-07-21 20:05
Group 1 - Tenable has been named a Leader in "The Forrester Wave™: Unified Vulnerability Management, Q3 2025," ranking highest in the Strategy category and receiving the highest scores (5.0) in seven criteria, including Vision and Roadmap [1][3] - Unified Vulnerability Management is defined as a solution that serves as the primary record for organizational vulnerabilities and enhances remediation workflows, with the report evaluating 10 vendors based on 19 criteria [2] - Tenable's ranking is based on its Strategy and Current Offering, the Tenable One Exposure Management Platform, which emphasizes proactive security strategies to address evolving attacker techniques over the next three to five years [3] Group 2 - The Forrester report highlights Tenable's strong roadmap for expanding remediation and response capabilities, focusing on remediation orchestration and a flexible asset-ratio-based pricing model [3][5] - Tenable's exposure management platform provides unmatched visibility across various environments, including IT, cloud, and operational technology, through both native discovery and third-party data ingestion [5] - The reporting capabilities of Tenable are noted for their presentation-ready format, including trending and benchmarking data, which enhances the overall user experience [5]
X @TechCrunch
TechCrunch· 2025-07-21 19:44
Hackers exploiting SharePoint zero-day seen targeting government agencies, say researchers | TechCrunch https://t.co/zD0E3MS0S0 ...