Ad Image

Endpoint Security and Network Monitoring News for the Week of September 22; Recast Software, Wing Security, Logpoint, and More

Endpoint Security and Network Monitoring News for the Week of September 22

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of September 22. This curated list features endpoint security and network monitoring vendors such as Recast Software, Wing Security, Logpoint, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Data Integration Buyers Guide

Endpoint Security and Network Monitoring News for the Week of September 22


Recast Software Acquires Liquit

Recast Software, an endpoint management solutions provider, has acquired Liquit, an application management solutions provider. With the acquisition, Recast Software can offer customers a complete application delivery platform, while strengthening the company’s position in endpoint and application management. Liquit’s application management solutions allow IT pros to configure, update, and provision applications rapidly and securely, while enabling seamless access to applications for end users. Together, the solutions “simplify software deployment, reducing the burden on IT teams while ensuring that applications are up-to-date, in compliance, and functioning properly.”

Read on for more.

Wing Security Launches Compliance-Grade SaaS Security Solution

Wing Security, a posture management solutions provider, this week announced the launch of its new SSPM for Compliance tier, enabling midmarket companies to adopt SaaS solutions while meeting a base level of security required by compliance frameworks. Customers who are seeking a “comprehensive 24×7 posture management solution” can upgrade their product to Wing’s enterprise tier, with automated risk reduction, detection, and response.

Read on for more.

Digital.ai 2023 Application Security Threat Report: “57 Percent of All Monitored Apps Are Under Attack”

Digital.ai, an app development and security solutions provider, this week announced the results of its first annual Application Security Threat Report, illuminating and quantifying the risks to applications in the wild. The results reveal that 57 percent of all monitored apps are under attack, with gaming (63 percent) and FinServ (62 percent) the most likely to be attacked. The study found no correlation between an app’s popularity and likelihood of being attacked but found Android apps are more likely to be put in unsafe environments (76 percent) than iOS apps (55 percent). Android apps are also more likely (28 percent) to be run with modified code than iOS apps (6 percent). Digital.ai surveyed its application security customers around the globe, based on point-in-time data collected from February 1 – February 28, 2023.

Read on for more.

Infovista Announces Rick Hamilton Appointed CEO, José Duarte Becomes Executive Chairman

Infovista, a global leader in network lifecycle automation solutions, this week announced a notable change in its leadership structure. The Board of Directors, led by private equity firm Seven2, has appointed Rick Hamilton as Chief Executive Officer (CEO), effective October 1st. José Duarte, the current CEO, has been named Executive Chairman. José Duarte has been at the helm of Infovista since 2019, leading the company through a remarkable period of transformation and growth, both organic and inorganic. During his tenure, he has driven key strategy development for Infovista, including the implementation of a new strategy built around automation of networks, the acquisition and merge of Empirix, and the sale of Ipanema SD-WAN business. However, aligning with his professional and personal aspirations and in-line with the evolving business requirements, Duarte has decided to step down from the CEO role to transition to the position of Executive Chairman. Rick Hamilton, who joined Infovista as Deputy CEO since May 2023, has been appointed as the new CEO. Hamilton is an experienced telecoms industry executive, with an extensive background in technology, operations and finance within and across the telecoms value chain. Most recently, Rick spent six years at BluePlanet, a division of Ciena, where he was the General Manager. Prior to this role, Hamilton held senior leadership positions at Juniper Networks and Cisco Systems.

Read on for more.

FBI and CISA Joint CSA: “#StopRansomware: Snatch Ransomware”

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing a joint CSA to disseminate known ransomware IOCs and TTPs associated with the Snatch ransomware variant identified through FBI investigations as recently as June 1, 2023. This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware.

Read on for more.

Logpoint Research: “Akira: A New Ransomware Gang Wreaks Havoc”

This week, Logpoint research has identified a new ransomware gang, known as “Akira.” The Akira ransomware group has emerged as a tenacious adversary and grabbed widespread notice quickly. The group appeared in March 2023 and became the fourth most active group in August, demanding millions of dollars in ransom from victims. The group primarily targets organizations in the UK and US within various industries, including education, finance, real estate, manufacturing, and consulting.

Read on for more.


Expert Insights Section

expert insight badgeWatch this space each week as Solutions Review editors will use it to share new Contributed Content Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry thought leaders together to publish the web’s leading insights for enterprise technology practitioners.

Insider Threats and the Bystander Effect

When most people think of the bystander effect, they don’t think of cybersecurity. However, in the same way people expect someone else at the scene of an accident to call 911, most employees figure another member of their team will report risky behavior or suspicious digital activity. And, more times than not, this mindset leads to a security incident or data leak that could have been prevented. Defending against insider threats means getting everyone involved. Every employee at an organization, whether they’ve been with the company for 15 years or 15 days, is someone who could unintentionally expose sensitive data. Breaking even the most seasoned employees out of their regular patterns to create a more communicative and security-focused culture at your organization is the only surefire protection against insider threats. This means creating a culture that encourages open lines of communication between the security team and the rest of the organization. Employees need to view the security team as an ally and as a team of people they can go to for help, not punishment, after mistakenly sharing sensitive information. Awareness training also plays a big role in combating insider threats, particularly with the rise of generative AI. If your employees are well-trained, feel comfortable communicating honestly with their security teams, and have an anonymous way to report their concerns without fear of repercussion, the odds of preventing a threat before sensitive information is exposed increase exponentially.

– Doug Kersten, CISO at Appfire 

Download Link to Data Integration Buyers Guide

Share This

Related Posts