Cyber Security

Search documents
Leidos acquires Kudu Dynamics, advancing AI capabilities for cyber warfighters
Prnewswire· 2025-05-28 12:00
Leidos' extensive current AI-enabled cyber offerings arm users with the rapid capability and scale needed to automate vulnerability detection, enhance novel defenses, neutralize attacker advantages and evade adversary defenses. Acquiring Kudu Dynamics will accelerate Leidos' strategy for AI-enabled offensive cyber, electromagnetic spectrum operations and vulnerability research. Founded in 2013, Kudu Dynamics rapidly has grown its work across the Department of Defense, leading the industry in automated targe ...
Fortinet (FTNT) FY Conference Transcript
2025-05-13 19:30
Fortinet (FTNT) FY Conference Summary Company Overview - **Company**: Fortinet (FTNT) - **Industry**: Cybersecurity Software - **Date of Conference**: May 13, 2025 Key Points Industry Dynamics - There is a significant increase in cybersecurity threats, driven by factors such as AI, nation-state activities, and organized crime, creating a strong demand for Fortinet's solutions [6][8][9] - The market is experiencing a refresh cycle as many customers are expected to upgrade their firewalls due to end-of-support deadlines by the end of 2026 [37][38] Company Strategy and Performance - Fortinet has transitioned from a firewall-only company to a provider of a broad solution set, including secure networking, SASE, and SecOps [7][9] - The company is currently the leader in deployed firewalls, SD WAN, and OT security, with aspirations to lead in SASE as well [8][9] - Fortinet's sales leadership is confident, with a strong focus on execution and market share growth [17][24] Sales Leadership and Management Changes - The sales leadership team has undergone changes, with three leaders now providing input into the company's outlook, which has led to a more diversified perspective on market conditions [12][15] - The company is cautious in its guidance due to macroeconomic uncertainties, despite strong execution confidence [16][17][47] Financial Outlook - Fortinet's guidance for Q2 reflects a conservative approach due to uncertainties in the macro environment, despite a strong Q1 performance [16][42][47] - The company anticipates a 12% compound annual growth rate (CAGR) in the midterm, but current year guidance is more conservative due to economic conditions [42][44] Product Development and Innovation - Fortinet emphasizes organic growth over acquisitions, leveraging its R&D capabilities and a strong engineering team to innovate quickly [24][27] - The company is investing in AI for both internal efficiencies and product enhancements, with applications in threat intelligence and customer support [30][35][36] SASE and SD WAN Transition - The transition from SD WAN to SASE is a significant focus, with a strong upsell strategy in place [50][53] - Fortinet has partnered with Google Cloud Platform (GCP) to enhance its network availability, which has positively impacted demand [58][61] Operational Technology (OT) Security - OT security is a growing segment for Fortinet, with rugged devices designed for harsh environments contributing to growth [65][66] - The convergence of IT and OT is driving demand for Fortinet's solutions as companies seek to secure their operational environments [66][67] Maintenance Revenue and Churn - There was a noted decline in maintenance revenue, attributed to various factors including churn from Lacework customers and fewer billing days in Q1 [70][71] - The company is optimistic about reducing churn and improving customer retention moving forward [72] Additional Insights - Fortinet's entrepreneurial culture and founder-led approach are seen as competitive advantages, allowing for rapid response to market changes [24][25] - The company is focused on building solutions that work seamlessly together, avoiding the pitfalls of competitors who have struggled with integration post-acquisition [26][27] This summary encapsulates the key insights and strategic directions discussed during the Fortinet FY Conference, highlighting the company's position in the cybersecurity industry and its proactive approach to market challenges and opportunities.
Gen Digital (GEN) - 2025 Q4 - Earnings Call Transcript
2025-05-06 21:00
Gen Digital (GEN) Q4 2025 Earnings Call May 06, 2025 05:00 PM ET Company Participants Jason Starr - VP - IRVincent Pilette - CEO, President & DirectorNatalie Derse - Chief Financial OfficerSaket Kalia - Managing DirectorRoger Boyd - Executive Director Conference Call Participants Andrew Nowinski - AnalystTomer Zilberman - AnalystDan Bergstrom - Analyst Operator Good afternoon, everyone. Thank you for standing by. My name is Tamiya, and I will be your conference operator today. Today's call is being recorded ...
Check Point Software Technologies Receives Common Criteria EAL4+ Certification for Quantum Firewall Software R82
Globenewswire· 2025-05-01 15:46
Core Insights - Check Point Software Technologies has announced that its Quantum Firewall Software R82 has received Common Criteria EAL4+ certification, enhancing its reputation as a trusted security solution for critical infrastructure and government sectors globally [1][2][3] - The certification confirms that the R82 platform meets rigorous global standards for security, providing verifiable protection in highly regulated environments [2][3] - The evaluation was conducted by TÜV Informationstechnik GmbH, an accredited testing facility, and the certification is recognized in over 30 countries under international agreements [2][3] Company Overview - Check Point Software Technologies is a leader in cyber security solutions, protecting over 100,000 organizations worldwide with AI-powered technologies [4] - The company employs a hybrid mesh network architecture with SASE at its core, offering a unified management approach for on-premises, cloud, and workspace environments [4]
HUB Security Reports Second Half 2024 Financial Results and the Filing of its Annual Report on Form 20-F for the Year Ended December 31, 2024
Globenewswire· 2025-05-01 11:49
Significant Year-over-Year Margin Expansion, Streamlined Operations, and Strategic Wins Position HUB for Scalable Growth in 2025 Conference call will be held Friday, May 2 at 10:00 am ET TEL AVIV, Israel, May 01, 2025 (GLOBE NEWSWIRE) -- HUB Cyber Security Ltd. (NASDAQ: HUBC) (“HUB” or the “Company”), a global leader in confidential computing and advanced data fabric technology, today announced results for the full year and second half period ended December 31, 2024 and the filing of its Annual Report on Fo ...
Check Point Research Launches AI Security Report: Exposing the Rise of AI-Powered Cybercrime and Defenses
Globenewswire· 2025-04-30 10:00
Core Insights - The article discusses the launch of Check Point Software Technologies' inaugural AI Security Report, highlighting how cyber criminals are leveraging artificial intelligence to enhance their attacks and the need for organizations to adapt their defenses accordingly [1][4]. AI-Driven Cyber Threats - Cyber criminals are using generative AI and large language models to create realistic impersonations, undermining trust in digital identities [2][3]. - The report identifies four key areas where AI is eroding trust: AI-enhanced impersonation, data poisoning, AI-created malware, and the hijacking of AI models [3][5]. Defensive Strategies - Organizations are advised to adopt AI-aware cybersecurity frameworks to counteract AI-driven threats [4]. - The report emphasizes the importance of integrating AI into cybersecurity defenses to keep pace with attackers [4]. Specific Threats Identified - AI-Enhanced Impersonation: Attackers are generating realistic phishing emails and audio impersonations, exemplified by a recent incident involving Italy's defense minister [5]. - LLM Data Poisoning: Malicious actors are manipulating AI training data, with evidence showing that AI chatbots can repeat false narratives 33% of the time [5]. - AI-Created Malware: Cyber criminals are using AI to optimize malware and automate attacks, enhancing the resale value of stolen data [5]. - Weaponization of AI Models: Attackers are commercializing AI tools for hacking and fraud on the dark web [5]. Recommendations for Organizations - Implement multi-layered identity verification methods to combat AI-powered impersonation [5]. - Utilize AI for threat detection and hunting to identify AI-generated threats [5]. - Equip security teams with tools to recognize and respond to AI-driven tactics [5].
Commvault Announces Next Evolution of Cleanroom Recovery that Further Reduces Risk of Restoring Compromised Infrastructure
Prnewswire· 2025-04-28 12:30
Commvault extends the power of its advanced Cleanroom Recovery technology to managed service providers focused on keeping enterprises resilient TINTON FALLS, N.J., April 28, 2025 /PRNewswire/ -- Commvault, a leading provider of cyber resilience and data protection solutions for the hybrid cloud, today announced highly differentiated capabilities with its Cleanroom Recovery offering that usher in a new era in end-to-end recovery following cyberattacks.Studies show that it takes enterprises 24 days, on averag ...
Commvault Awarded GovRAMP Authorization for Commvault Cloud
Prnewswire· 2025-04-28 12:30
Becomes only cyber resilience vendor meeting GovRAMP Authorization at a High Impact Level, FedRAMP High Authorization, and FIPS 140-3 validation for public sector customers "With Commvault, we've been able to fortify our cyber defenses and streamline our incident response processes. The continuous monitoring and advanced data security features have been instrumental in preventing disruptions to our operations, allowing us to focus on our core mission," Winder added. TINTON FALLS, N.J., April 28, 2025 /PRNew ...
WithSecure Interim Report 1 January – 31 March 2025: Elements ARR growth continued, 70% ARR growth for Cloud Protection for Salesforce
GlobeNewswire News Room· 2025-04-25 05:00
WithSecure Corporation, Interim Report 1 January – 31 March 2025, 25 April 2025 at 8.00 EEST WithSecure Interim Report 1 January – 31 March 2025: Elements ARR growth continued, 70% ARR growth for Cloud Protection for Salesforce Highlights of January – March 2025 (“first quarter”) Annual Recurring Revenue (ARR)1 for Elements Cloud products and services increased by 8% to EUR 86.6 million (EUR 80.5 million)Elements Cloud ARR increase from previous quarter was 4%Net Revenue Retention (NRR) for Elements Cloud w ...
Check Point Recognized for #1 AI-Powered Cyber Security Platform by Miercom
Newsfilter· 2025-04-07 13:00
REDWOOD CITY, Calif., April 07, 2025 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (NASDAQ:CHKP), a pioneer and global leader of cyber security solutions, today announced that its Infinity Platform has been named the top-ranked AI-powered cyber security platform in the 2025 Miercom Assessment. The report validates Check Point's leadership across critical security categories, with the Infinity Platform outperforming all competitors in security efficacy, Zero Trust implementation, and ease of use ...