Cybersecurity
Search documents
Fortinet Expands FortiCNAPP Cloud Risk Management with Network, Data, and Unified Risk Context
Globenewswire· 2026-01-27 14:00
Core Insights - Fortinet announced enhancements to FortiCNAPP aimed at improving cloud risk management by integrating network security posture, data security posture management, and runtime validation [1][2] Group 1: Cloud Security Challenges - Security teams face challenges due to growing complexity, limited resources, and skills gaps, making risk management across cloud environments difficult [2] - Nearly 70% of organizations report tool sprawl and visibility gaps as major barriers to effective cloud security according to the Fortinet 2026 Cloud Security Report [2] Group 2: FortiCNAPP Enhancements - FortiCNAPP incorporates network-level protection context into risk evaluation, providing a more accurate assessment of real exposure [3] - Native Data Security Posture Management (DSPM) enhances risk prioritization by including data sensitivity and exposure without requiring data movement [4] - The platform consolidates siloed security signals into a single actionable workflow, simplifying cloud risk operations [5] Group 3: Context-Driven Security Operations - Effective risk management requires understanding misconfigurations, vulnerabilities, existing protections, and the likelihood of real-world impact [6] - FortiCNAPP helps organizations reduce noise and improve decision-making by aligning security efforts with actual exposure and available resources [6] Group 4: Unified Risk Management Features - FortiCNAPP provides network-aware risk scoring by detecting FortiGate solutions along the internet-accessible path to cloud workloads [7] - It reduces false urgency by providing a realistic view of risk, enabling consistent understanding of exposure among security and network teams [7] - The platform identifies sensitive data, access patterns, and potential malware while supporting privacy and data governance requirements [7] Group 5: Business Impact and Prioritization - Risks affecting sensitive data are automatically elevated, allowing teams to focus on issues with the greatest potential impact [7] - Insights from various security aspects are unified into a single view, facilitating faster remediation and response [7][8]
Tenable Extends Exposure Management to AI Attack Surface
Globenewswire· 2026-01-27 14:00
Tenable One unifies AI discovery, protection and governance within a single exposure management platformCOLUMBIA, Md., Jan. 27, 2026 (GLOBE NEWSWIRE) -- Tenable® Holdings, Inc. (NASDAQ: TENB), the exposure management company, today announced general availability of Tenable One AI Exposure. With this release, the Tenable One Exposure Management Platform unifies AI protection, discovery and usage governance across the enterprise – including SaaS platforms, cloud services, APIs and agents. AI is deeply embedde ...
HUB Cyber Security Announces Receipt of Nasdaq Notification Regarding Market Value of Listed Securities Requirement
Globenewswire· 2026-01-27 13:45
Core Viewpoint - HUB Cyber Security Ltd. has received a notification from Nasdaq regarding non-compliance with the Market Value of Listed Securities requirement, which mandates a minimum market value of US$35 million for continued listing on the Nasdaq Capital Market [1] Compliance Status - The company has a compliance period of 180 calendar days, until July 20, 2026, to regain compliance with the MVLS requirement [1] - If the company's market value meets or exceeds US$35 million for at least 10 consecutive business days during this period, Nasdaq will confirm compliance [1] - Failure to regain compliance may lead to delisting, but the company has the right to request a hearing [1] Company Overview - HUB Cyber Security Ltd. is a leader in confidential computing, AI-driven data fabric, and cybersecurity, with operations in North America, Europe, and Israel [3] - The company's Secured Data Fabric technology allows organizations to secure and analyze sensitive data while adhering to regulatory standards [3] - HUB partners with Fortune 100 companies, global banks, and sovereign institutions to enhance digital infrastructure security [3]
Israeli cybersecurity co Memcyco raises $37m
En.Globes.Co.Il· 2026-01-27 12:55
Company Overview - Israeli cybersecurity company Memcyco has completed a $37 million Series A financing round, bringing the total amount raised to $47 million [1] - The financing round was led by NAdventures, with participation from E. Leon Jimenes, Pags Group, and existing investors Capri Ventures and Venture Guides [1] Use of Funds - The capital raised will be utilized to expand Memcyco's cybersecurity platform, develop new products, and accelerate sales activities in North America and Latin America through direct efforts and business partners [2] Technology and Solutions - Memcyco has developed a security platform that identifies and thwarts phishing attacks and account takeovers at an early stage, allowing organizations to act before damage occurs [3] - The company's system operates in real-time, penetrating attacks to identify both victims and attackers instantly [5] Market Demand - There is an increasing demand for Memcyco's solutions due to a sharp rise in account takeover (ATO) attacks, which have surged by approximately 250% in 2024-2025, with cumulative damages expected to reach $343 billion by 2027 [4] Company Growth and Performance - In 2025, Memcyco reported threefold growth in annual recurring revenue (ARR) and customer base, having thwarted over 3.5 million ATO attempts [5] - The company was founded four years ago and currently employs about 90 people, with 60 based in Israel [5] Founders and Leadership - Memcyco was founded by Israel Mazin, Ori Mazin, Elyahu Mashiah, and Gideon Hazam, with Israel Mazin having over 30 years of experience in founding and leading software and cybersecurity companies [6]
Zscaler Unveils New Innovations to Secure Enterprise AI Adoption
Globenewswire· 2026-01-27 08:03
Core Insights - Zscaler has introduced new AI security innovations aimed at enabling enterprises to securely build, deploy, and govern AI applications while maintaining visibility and control [1][4] Group 1: AI Security Challenges - Many enterprises lack a comprehensive view of their AI applications and services, which limits their understanding of AI exposure and associated risks [2] - Traditional security models are inadequate for the unique behaviors of AI traffic, which can lead to vulnerabilities; Zscaler's ThreatLabz report indicates that most enterprise AI systems could be compromised in just 16 minutes [2] Group 2: New Innovations and Solutions - Zscaler's AI Security Suite provides a detailed inventory and dependency map of AI assets, enabling organizations to adopt AI technologies more securely [3] - The suite addresses enterprise AI security challenges through three core use cases, focusing on visibility, governance, and secure access [4][5] Group 3: Governance and Compliance - Zscaler supports alignment with frameworks like the NIST AI Risk Management Framework and the EU AI Act, enhancing governance for global AI adoption [6] - The company is expanding its defense capabilities with new features such as a secure automation gateway and AI Deception to counter model-based attacks [6] Group 4: AI Asset Management and Security - AI Asset Management provides comprehensive visibility for CISOs and IT teams to detect shadow AI and prioritize risks [7] - Secure Access to AI enables safe use of sanctioned AI services with Zero Trust controls, while Secure AI Infrastructure protects AI development throughout its lifecycle [7]
Zscaler 2026 AI Threat Report: 91% Year-over-Year Surge in AI Activity Creates Growing Oversight Gap for Global Enterprises
Globenewswire· 2026-01-27 08:01
Core Insights - Rapid AI adoption is creating a significant security gap, necessitating organizations to implement AI security platforms based on Zero Trust principles [1][2][12] AI Adoption Trends - AI usage is expanding across all business functions, with Finance & Insurance accounting for 23% of AI/ML traffic, while Technology and Education sectors saw year-over-year transaction growth of 202% and 184% respectively [4][12] - The number of applications driving AI/ML transactions quadrupled to over 3,400, indicating a rapid increase in complexity and reduced centralized visibility [12] Security Vulnerabilities - 100% of enterprise AI systems tested were found vulnerable to breaches, with critical vulnerabilities identified in an average of 16 minutes, and 90% of systems compromised in under 90 minutes [5][12] - AI/ML activity surged by 91% year-over-year, leading to a total of 18,033 terabytes of data transferred to AI applications, which poses a significant target for cybercriminals [7][9][12] Data Exposure Risks - Unmanaged embedded AI features in enterprise applications are creating critical data exposure risks, as these features often operate without oversight [8][12] - ChatGPT alone was associated with 410 million Data Loss Prevention (DLP) policy violations, highlighting the urgent need for AI governance [10][12] Recommendations for Security - Organizations are advised to adopt an intelligent Zero Trust architecture to mitigate risks associated with AI-driven cyber threats [3][11] - Continuous verification and least-privileged access should be enforced to eliminate attack surfaces, while all traffic, including encrypted data, must be inspected to stop threats in real time [13][11]
HyperGLLM论文入选AAAI 2026:360集团AI安全研究再获国际顶会认可
Huan Qiu Wang· 2026-01-27 03:18
AAAI被公认为全球AI学术界的顶级会议,其录用论文代表了相关领域的前沿水平与未来趋势。据悉,AAAI 2026共收到来自全球的投稿近2.9万篇,其中来 自中国的研究贡献占比近三分之二,竞争空前激烈。最终整体录用率仅为17.6%,可谓优中选优。360此篇论文能够在计算机视觉、机器学习、自然语言处 理等热门研究方向汇聚的数万篇投稿中胜出,充分体现了其研究的前沿性、原创性与坚实的技术价值。 HyperGLLM :重新定义终端威胁检测的 AI 范式 该论文直击终端安全核心挑战—如何从海量、交织的事件中精准捕捉高级威胁。为此,团队创新性地提出了 "HyperGLLM"框架,首次将超图 (Hypergraph) 的复杂关系推理能力与大语言模型(LLM)的语义理解优势相结合,为终端行为分析开辟了新路径。 【环球网科技综合报道】1月20日,第40届AAAI人工智能大会(AAAI-26)在新加坡开幕。在投稿量激增、录用率再创历史新低的激烈竞争中,由360集团 创始人周鸿祎领衔,联合360集团首席科学家、数字安全CTO潘剑锋博士团队(含彭敏博士等多位成员)及清华大学共同完成的论文《HyperGLLM:一种通 过超图增强大语言模 ...
Cybersecurity Meets Monthly Income: Amplify's New ETF Targets 15%+ Yield
Benzinga· 2026-01-26 18:09
Amplify ETFs has launched a new options-based cybersecurity ETF to meet the needs of investors wanting monthly income from a sector more associated with growth than income generation. • What’s driving HAKY shares up?The new fund, referred to as the Amplify HACK Cybersecurity Covered Call ETF (NYSE:HAKY) , will be comprised of shares of the Amplify Cybersecurity ETF (NYSE:HACK) and call options on the ETF, generating income from the premiums of the call options. The ETF seeks a 15% or more annualized option ...
Can Akamai's Cybersecurity Deal With Deutsche Telekom Fuel Its Shares?
ZACKS· 2026-01-26 16:25
Group 1 - Akamai Technologies, Inc. announced that Deutsche Telekom Security is utilizing its Security Certified Service Provider program to provide advanced cybersecurity services to sectors such as finance, insurance, critical infrastructure, and the public sector [1][4] - The program is designed to enhance organizations' cybersecurity through expert-led managed security services, allowing partners to deliver Akamai's advanced security solutions with deep technical expertise [2][4] - Akamai is extending its Guardicore Segmentation support through Deutsche Telekom Security, offering managed segmentation administration, incident response, and audit and compliance services on a sovereign cloud [3][8] Group 2 - Akamai has enhanced its Security Certified Service Provider programs to address the increasing demand for stronger API security and microsegmentation in targeted industries, aiming to strengthen customer relationships and expand into regulated markets [4][8] - The company is well-positioned to meet the rising demand for API security and managed services globally by combining its global edge platform with certified partners [4][8]
Will Check Point's Recent AI Advancements Help Steer the Competition?
ZACKS· 2026-01-26 16:15
Core Insights - Check Point Software Technologies (CHKP) is enhancing its response to cyber threats with a new AI-driven exposure management strategy aimed at closing the cybersecurity "remediation gap" [1][3] - The new platform allows security teams to quickly identify critical vulnerabilities and focus on the riskiest issues, improving remediation speed and efficiency [1][2] - Automation is a key feature, enabling safe, automated responses to threats, which reduces manual work and shortens response times [1][2] Company Strategy - The new platform prioritizes real-world threats and enables automated remediation methods such as virtual patching and policy updates, aligning with Gartner's CTEM model [2][8] - This AI exposure strategy is expected to strengthen threat response and improve security efficiency, helping Check Point remain competitive in the cybersecurity market [3] Competitive Landscape - Check Point faces significant competition from major players like Cisco Systems, Palo Alto Networks, and Fortinet [4] - Cisco has modernized its security portfolio for AI-driven threats, achieving strong early adoption with nearly 3,000 customers [5] - Palo Alto Networks leads the market with a unified platform strategy and benefits from strong annual recurring revenue (ARR) growth and AI-driven platforms [6] - Fortinet distinguishes itself with a tightly integrated platform that combines networking and security, leveraging its FortiOS operating system and custom chips for better performance [7]