Ad Image

Identity Management and Information Security News for the Week of May 17; Exabeam, Saviynt, VAST Data, and More

Identity Management and Information Security News for the Week of May 17

Identity Management and Information Security News for the Week of May 17

The editors at Solutions Review have curated this list of the most noteworthy identity management and information security news for the week of May 17. This curated list features identity management and information security vendors such as Exabeam, Saviynt, VAST Data, and more.

Keeping tabs on all the most relevant identity management and information security news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month, in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy identity management and information security news items.

Identity Management and Information Security News for the Week of May 17

LogRhythm and Exabeam Announce Intent to Merge

LogRhythm, a SIEM solutions provider, and Exabeam, a global cybersecurity leader, this week announced that the companies have entered into a merger agreement. “Together our expertise and shared strategic vision will accelerate innovative AI-driven cybersecurity solutions for customers around the world,” said Chris O’Malley, CEO of LogRhythm. “With more than twenty years of best-in-class SIEM and UEBA experience in serving thousands of worldwide customers, we are poised to create a new employee-inspired organization that encapsulates the absolute best of what we both offer. Vigilant CISOs have eagerly awaited the emergence of a strong, customer-obsessed, singularly-focused global leader in AI-driven security operations—one that offers a best-of-breed alternative to the frustratingly complex options on the market today. That day has arrived.”

Read on for more.

Britain and US Sound Alarm Over Growing Chinese Cyber Threat

U.S. and British officials warned on Tuesday of a growing cyber threat from China, with the White House cyber director saying Beijing was capable of causing havoc in cyberspace and a UK spy agency chief warning of an “epoch-defining” challenge. Anxiety has been increasing in the United States and Europe about alleged Chinese cyber and espionage activity, but Beijing has denied the accusations. “China poses a genuine and increasing cyber risk to the UK,” Anne Keast-Butler, director of Britain’s Government Communications Headquarters (GCHQ) eavesdropping agency, told a security conference in the central English city of Birmingham.

Read on for more.

CRN’s 2024 Women of the Channel Honors Grace Jameson and Maggie White of Saviynt

Saviynt, a leading provider of cloud-native identity and governance platform solutions, announced today that CRN, a brand of The Channel Company, has named its Senior Director of Partner Marketing Grace Jameson and Senior Manager of Product Marketing Maggie White to the Women of the Channel list for 2024. “We are so proud that Grace and Maggie have been named to this year’s CRN Women of the Channel,” said Mark Francetic, SVP Global Alliances at Saviynt. “Both Grace and Maggie have been instrumental in helping refine Saviynt’s sales approach and fostering more targeted and impactful interactions with our valued partners. The channel success we’ve experienced over the past 12 months is a testament to the dedication and leadership that both Grace and Maggie bring to their roles. They are completely deserving of this accolade.”

Read on for more.

Palo Alto Networks Set to Buy QRadar From IBM

This week, Palo Alto Networks announce that is buying cloud security software assets from IBM, as part of a broader partnership that will give the cybersecurity company access to more consultants and a bigger customer base. In a joint press release, the companies said Palo Alto is acquiring IBM’s QRadar cloud software for an undisclosed sum and migrating existing customers to its security platform, Cortex Xsiam. The move normally takes one to three months, Nikesh Arora, Palo Alto’s CEO, told CNBC. Also, IBM will train more than 1,000 of its consulting employees on Palo Alto’s products.

Read on for more.

AttackIQ Academy Launches Online AI Security Course to Help Teams Bridge the Knowledge Gap

AttackIQ, a leading independent vendor of breach and attack simulation (BAS) solutions and founding research partner of the MITRE Engenuity Center for Threat-Informed Defense (CTID), this week announced the launch of a new AttackIQ Academy course, Foundations of AI Security. The free course addresses the urgent need to secure artificial intelligence (AI) systems as they become increasingly intertwined with daily life. The new course is led by Keith Wilson, a seasoned information security professional with over a decade of industry experience. Wilson’s career, marked by collaborations with top global companies, equips him with the insights to guide participants through the intricate world of AI security. “AI technology is advancing rapidly, often outpacing the preparedness of our security frameworks,” said Wilson. “With Foundations of AI Security, we’re shifting the paradigm, equipping security professionals with the understanding and tools to stay ahead of emerging threats. We’re not just raising awareness, we’re providing the solutions needed to take concrete action.”

Read on for more.

VAST Data and Superna Announce Partnership

VAST Data, a data management solutions provider, this week announced a partnership with Superna, a data security solutions provider. “By combining the world’s simplest, fastest and most efficient data platform built for exabyte scale AI, with Superna’s trusted, secure data protection and recovery offerings – we’re offering a ready-made solution able to access, manage, move and protect data for the most data-intensive organizations on the planet,” said John Mao, vice president, Technology Alliances at VAST Data. “With VAST and Superna, customers get robust, federated cyber-defense and resilience at the data layer.”

Read on for more.

Expert Insights Section

Insight Jam logoWatch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from Insight Jam, Solutions Review’s enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.


“Safe Travels” Starts at the Office

Summer will be here before you know it. If you’re an IT professional, it’s time to start thinking about how to keep your company’s network, information, and your corporate and private identity secure while you and your fellow employees are travelling for vacation.

Consider sharing the following guidance with your employees before, during and after the summer travel season. 

  • Before You Leave the Office: Shut down all your computers and devices that aren’t in use during your vacation. Since we use them every day, many of us leave our work and home computers –as well as many IoT devices–on at all times. However, if you won’t need to connect to them during your vacation remotely, turn them off! When a device is on, it’s also online, leaving it open to attack (depending on your protections). If it’s off, it can’t get hacked. If you aren’t using it for many days or weeks, why not just shut it off to avoid any chance of an attack?
  • Patch Production Servers Before you Disappear: On the other hand, just because you are on vacation doesn’t mean the rest of the business is. If you are in IT you probably manage some critical production servers that must stay up at all times. Before leaving for an extended period of time, make sure those servers remain safe by apply all software updates to their OS and server software, to fix any vulnerabilities that may have been fixed since your last update.
  • Recognizing Phishing Attempts: Even though it’s summer, cybercriminals are still on the prowl and you could receive a phishing attack at any time. If you receive an unusual email about an urgent password change, a payment to a supplier that can’t wait, or anything else strange and suspicious, beware! Even if it comes from a known contact, it could be phishing. If an attacker has gained access to someone’s calendar or email account, they could know when that person is on vacation and can impersonate them. Verify the sender’s address and, if in doubt, do not reply to the message or open its links or attachments. 
  • Enable & Implement MFA: Deploying an MFA solution can prevent attackers from entering your organization’s network if one of your staff members has been the victim of a successful phishing attack. MFA makes it much more difficult to hack into your accounts even when threat actors steal your credentials, and, best of all, you get warned that an attempt is being made to gain unauthorized access to one of your services. 
  • Make Contingency Plans: Preparation helps to limit the impacts and scope of an attack. These plans should include a breakdown of who should be involved and their responsibilities, outlining scenarios according to team member’s vacations.

-Corey Nachreiner, CSO at WatchGuard Technologies

Share This

Related Posts