Security News
ThycoticCentrify, formed from a merger between two computer access management firms, said it surveyed about 8,000 people, and reports just under a quarter admitted they reuse passwords across multiple websites - a cybersecurity no-no because it opens you up to credential stuffing. The use of browser-stored passwords was also called out as a potential security risk by ThycoticCentrify, with a third of respondents apparently saying they rely on their web browser to manage their passphrases.
Treeverse announced $23 million in funding to date, which will further accelerate the development and adoption of the innovative solution designed for any enterprise data team tasked with managing petabytes or more of data in one shared system. "We're most proud of how lakeFS elegantly solves the file system challenge for data lakes of exponential size and how the growing community around it is involved in finding new ways to leverage lakeFS to improve their data workflows. We plan to use this round of funding to perfect the open-source core capabilities and build a SaaS offering over it that allows fast creation of predefined workflows that are essential for managing an ever-growing amount of data within every enterprise."
Burgoon joined Fusion's Executive Leadership Team and is responsible for talent management, succession planning, organizational and performance management, diversity, and inclusion, and learning and development. Burgoon will report directly to Fusion's CEO, Mike Campbell.
Trifacta announced the launch and general availability of the pre-built cloud data engineering templates, furthering the acceleration of self-service modern data management. Trifacta's data templates gallery gives users a head start by allowing them to deploy data engineering workflows in minutes that can be tailored to solve specific data challenges in common use cases.
Datadobi launched a vendor-neutral unstructured data mobility engine designed to handle the scale and complexity of the world's largest storage environments. Version 5.12 unifies the most sophisticated and field-hardened capabilities and techniques to deliver the data mobility required for sophisticated, vendor-neutral, and scalable unstructured data management solutions.
Cyber asset management and controls platform Noetic Cyber emerged from stealth mode today and also announced that it has raised $20 million in Series A funding. Founded in 2019, with headquarters in Boston and London, Noetic claims to take a new approach to cybersecurity, relying on API aggregation and correlation to gather data from security and IT management tools.
S&I Corporation has released "Atxpert AI Viewer", a new AI building security management system based on Microsoft Azure, TnM Tech's Ghost-I AI edge computing and Scenera's NICE PaaS, a managed Kubernetes service built on Microsoft Azure infrastructure. Combining these partners' technologies enables a highly scalable and easy to manage building safety and security management system.
Entrust announced cryptographic key lifecycle management functionality for customer-generated keys used in Amazon Web Services. "Entrust now gives customers full control over the customer master keys in AWS, and we plan to extend this control across multiple public cloud service providers. KeyControl backs up and automates master keys in the key management system, to ensure full control of their keys from generation to retirement. As customers sail in the uncharted waters of multi-cloud deployments, they can benefit from the agility of running their workloads in AWS, while keeping one hand on the tiller - ensuring control over where their IT assets are headed."
Cyber risk measurement and mitigation platform provider Safe Security this week announced that it has received a $33 million strategic investment led by BT Group. As part of the investment, BT will have exclusive rights to use and sell Safe Security's products in the U.K. by incorporating the cyber risk management platform into its portfolio.
Needless to say, Geyer has a lot to say about the threat ransomware poses to OT, ICS and critical infrastructure. How to prepare for the future of ransomware risk management.