Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CYJAX Launches Compromised Device Alerting to Detect Threats Earlier

Detect compromised devices before attackers act. CYJAX’s new alerting identifies stealer malware infections and exposed credentials in near real time. CYJAX today announced the launch of Compromised Device Alerting, a new capability designed to help organisations identify compromised devices within their environment before attackers can act on stolen credentials.

CrowdStrike Named a Leader in the First-Ever Gartner Magic Quadrant for Cyberthreat Intelligence Technologies

CrowdStrike has been named a Leader in the inaugural 2026 Gartner Magic Quadrant for Cyberthreat Intelligence Technologies and positioned furthest to the right in Completeness of Vision among all vendors evaluated. We believe this placement validates CrowdStrike as the platform of choice for threat intelligence and reflects our relentless innovation to provide organizations with the technology they need to understand, detect, and defend against modern adversaries.

Why WatchGuard Acquired Perimeters.io: Making Cloud Security Work for MSPs

If you ask any MSP what they use to protect their clients’ cloud environments, you will get one of two answers. Either they’ll point to the native security tools built into platforms like Microsoft 365 or Google Workspace. Or they’ll describe a patchwork of different products stitched together to cover identity, configuration, and SaaS visibility. Neither approach is ideal. But both reflect the reality MSPs are working with today.

LuxSci Launches Enterprise-Grade HIPAA-Compliant Email Security for Mid-Sized Healthcare Organizations

New right-sized offering brings advanced encryption, easy API integration, and HITRUST-certified compliance to the most underserved segment in healthcare email - with pricing starting at $99/month.

CrowdStrike Launches Falcon OverWatch for Defender

CrowdStrike is excited to announce Falcon OverWatch for Defender, a new offering that extends our elite managed threat hunting to Microsoft Defender environments. The need for proactive threat hunting is increasingly urgent as adversary operations evolve: 82% of intrusions observed in 2025 were malware-free, the CrowdStrike 2026 Global Threat Report revealed, and the fastest eCrime breakout time was a mere 27 seconds. Adversaries using AI increased their attacks 89% year-over-year.