Posts

Showing posts from October, 2025

Lumen Technologies Joins Forces with Commvault to Elevate Enterprise Cyber Resilience

Image
  Lumen Technologies has entered a strategic partnership with Commvault, combining the latter’s expertise in cyber resilience and data protection with Lumen’s global secure network and edge infrastructure. The collaboration introduces the “Lumen Valid ated Design for Cyber Resilience with Commvault” a blueprint that integrates air-gapped storage, anomaly detection, encrypted data transport and centralized policy management across hybrid environments. Why It Matters The partnership addresses the rising threat landscape ransomware incidents, hybrid cloud complexity and regulatory pressures by offering enterprises a unified and scalable model for data protection and rapid recovery. Lumen’s own deployment of the design achieved noteworthy results: consolidation of about 90% of legacy backup platforms and approximately $3.5 million in annual cost savings. Industries such as healthcare, manufacturing, utilities and financial services which operate across distributed, hybrid infrastructu...

Horizon3.ai Integrates NodeZero® with ServiceNow to Automate Vulnerability Remediation

Image
  Horizon3.ai announced its new integration of its NodeZero® platform with ServiceNow Vulnerability Response (VR), enabling organisations to automatically send exploit-verified findings into ServiceNow workflows for faster, risk-based remediation. The integration means that when NodeZero identifies a weakness that is proven exploitable, that information flows directly into ServiceNow VR—complete with asset details, exploit evidence and priority status eliminating manual ticket creation and reducing the delay between detection and remediation. Key Highlights of the Integration Seamless ticketing automation : Exploits found by NodeZero are automatically surfaced as tickets in ServiceNow, with the correct affected asset and status, making the hand-off between security and IT smoother. Prioritisation of exploitable risk : Because NodeZero doesn’t just list potential vulnerabilities but tests them to confirm exploit paths only high-impact issues are sent to remediation teams, reducing ...

Butterfly Network Strengthens Global Information Security Posture with Top Certifications

Image
  Butterfly Network has significantly enhanced its global information security posture , achieving key certifications including ISO 27001, SOC-2 Type 2, Germany’s C5 and the UK’s NHS Data Security & Protection Toolkit (DSPT). This development underscores the company’s commitment to enterprise-grade data protection, trust and compliance as it continues to scale its handheld whole-body ultrasound business internationally. Key Highlights Butterfly achieved the ISO 27001 certification , the premier standard for information security management systems issued by the International Organization for Standardization (ISO) in partnership with the International Electrotechnical Commission (IEC). In addition, it secured SOC-2 Type 2 , Germany’s C5 (Cloud Computing Compliance Criteria Catalogue) and the UK’s NHS DSPT accreditation fortifying its security posture across the U.S., Germany, the U.K. and global markets. According to Mike Tiemeyer, Chief Information Security Officer of Butterfl...

DeLeion Capital Launches Regulated Cryptocurrency Custody Plans for Secure Digital Asset Management

Image
  DeLeion Capital today announced the launch of its new regulated cryptocurrency custody plans , marking a milestone in offering institutional-grade security, compliance and growth opportunities in the digital asset space. In an environment where asset security and regulatory clarity are increasingly essential, DeLeion’s offering is positioned to serve both individual and institutional investors by combining cold-storage infrastructure, compliance frameworks and diversified growth strategies. Key Features of the Custody Platform Institutional-grade asset custody : The platform uses multi-signature cold-wallet storage with partnerships across global banking institutions to protect assets from exchange failures, theft and internal risk. Advanced encryption & insurance : Layered SSL and AES encryption protect transaction data, and custody plans are backed by insurance underwriters to add a layer of financial protection. Compliance readiness : Built around KYC/AML protocols, regula...

DoiT International Acquires CloudWize to Boost Multi-Cloud Security and Compliance

Image
  DoiT International has announced the acquisition of CloudWize, a multi-cloud security posture and compliance platform, in a strategic move to integrate cloud security and compliance directly into its Cloud Intelligence suite. Key Details of the Transaction The acquisition is positioned as part of DoiT’s broader investment of approximately US $250 million into AI-driven CloudOps and FinOps capabilities. CloudWize brings advanced capabilities such as a continuous “Security Graph” for incident-response investigations, automatic detection of cloud misconfigurations and compliance drift, and automated remediation via policy-as-code guardrails. The integration enhances DoiT’s platform to connect not only cost and usage (FinOps), but also risk, reliability and security posture across AWS, Google Cloud and Azure. Strategic Rationale & What It Means By bringing CloudWize’s security lens into the Cloud Intelligence platform, DoiT is extending its value proposition beyond financial an...

Bitdefender and CYPFER Partner to Deliver Full-Lifecycle Cyber Resilience

Image
  Bitdefender has entered into a strategic partnership with CYPFER to provide businesses with cyber resilience across the entire attack lifecycle from prevention and detection through investigation, recovery and restoration. By integrating CYPFER’s advanced digital forensics and incident response (DFIR) expertise with Bitdefender’s security platform suite including GravityZone, endpoint detection and response (EDR), extended detection and response (XDR), and managed detection and response (MDR) the collaboration aims to offer organisations of any size a unified, seamless workflow for responding to cyber-incident. What the Partnership Offers Comprehensive Multi-Layered Protection Together, Bitdefender and CYPFER deliver an end-to-end framework: protection via Bitdefender’s threat prevention and detection tools, then investigation and recovery led by CYPFER’s forensics and incident-response professionals. Unified Workflow from Detection to Restoration One of the key strengths is ...