Toby Buschini joins Ermetic as VP of worldwide sales
Ermetic announced the appointment of Toby Buschini as vice president of worldwide sales. He will oversee a major global expansion of Ermetic’s sales team and open new customer …
Ermetic partners with IDSA to address risks associated with over privileged cloud identities
Ermetic announced it will work with the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral education and resources to help organizations …
Ermetic platform detects suspicious activity and prevents security threats in multicloud environments
Ermetic announced a new version of the Ermetic platform that continually monitors the access behavior of user and machine identities to detect suspicious activity and prevent …

New infosec products of the week: November 6, 2020
Qualys Container Runtime Security: Defense for containerized applications Qualys Runtime Container Security, once instrumented in the image, will work within each container …

Ermetic’s platform provides full stack visibility and control over multi-cloud infrastructure entitlements
Ermetic announced a platform that provides full stack visibility and control over multi-cloud infrastructure entitlements. By analyzing identity and access management (IAM) …

Most companies suffered a cloud data breach in the past 18 months
Nearly 80% of the companies had experienced at least one cloud data breach in the past 18 months, and 43% reported 10 or more breaches, a new Ermetic survey reveals. According …
Ermetic unveils analytics-based solution that prevents cloud data breaches
Ermetic, the cloud access risk security company, emerged from stealth mode and announced an analytics-based solution that prevents cloud data breaches by automating the …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility