Skybox Security
75% of new vulnerabilities exploited within 19 days
Last year alone, over 30,000 new vulnerabilities were published, with a new vulnerability emerging approximately every 17 minutes — averaging 600 new vulnerabilities per week, …
Skybox 13.2 empowers organizations to identify and remediate vulnerabilities
Skybox Security announced Skybox 13.2, introducing enhancements to its Vulnerability and Threat Management solution. These updates mark a significant milestone in …
Transforming cybersecurity from reactive to proactive with attack path analysis
An attack path is important to prioritize potential risks in cloud environments. The attack path offers the ability to look at cloud environments from the attacker’s …
Skybox Security announces platform enhancements to mitigate cyber exposure risk
Skybox Security announced the next generation of its Continuous Exposure Management Platform. This 13.0 release introduces significant advancements to its Attack Surface and …
Mordecai Rosen joins Skybox Security as CEO
Skybox Security appoints Mordecai Rosen as Chief Executive Officer and closes $50 million in financing from CVC Growth Funds, Pantheon, and J.P. Morgan. Mr. Rosen is a …
Skybox Security appoints Corey Williams as CMO
Corey Williams will leverage his extensive cybersecurity background to lead Skybox Security’s core marketing strategy and accelerate market growth. The seasoned marketing …
Skybox Security introduces SaaS solution for Security Policy and Vulnerability Management
Skybox Security announced the next generation of its Security Posture Management Platform – including a Software-as-a-Service (SaaS) solution for Security Policy and …
How to improve public sector’s security strategy?
With international tensions heightened as we enter month eight of the war between Russia and Ukraine, it’s clear that a new era of intensifying state-sponsored attacks …
Organizations need to change their strategy to reduce cyber risk
Traditional security approaches that rely on reactive, detect-and-respond measures and tedious manual processes can’t keep pace with the volume, variety, and velocity of …
Conventional cybersecurity approaches are falling short
Traditional security approaches that rely on reactive, detect-and-respond measures and tedious manual processes can’t keep pace with the volume, variety, and velocity of …
Infosec products of the month: May 2022
Here’s a look at the most interesting products from the past month, featuring releases from: AuditBoard, BIO-key, Cohesity, Corelight, Data Theorem, Deepfence, ForgeRock, …
New infosec products of the week: May 20, 2022
Here’s a look at the most interesting products from the past week, featuring releases from Deepfence, Kasten by Veeam, Qualys, Skybox Security, and Trusona. Qualys Custom …
Featured news
Sponsored
Don't miss
- Researchers unearth two previously unknown Linux backdoors
- AxoSyslog: Open-source scalable security data processor
- Product showcase: Augmenting penetration testing with Plainsea
- CWE top 25 most dangerous software weaknesses
- Enhancing visibility for better security in multi-cloud and hybrid environments