Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ThreatQuotient to join Securonix

Today is a big day for the Crash. We are announcing the next step in our collective journey – Securonix has acquired ThreatQuotient. This is an exciting and rare opportunity to combine Securonix’s best-in-class security analytics and detection with ThreatQ’s best-in-class threat intelligence platform. As we all know, the security operations world is changing at a dramatic pace.

Cloudflare acquires Outerbase to expand database and agent developer experience capabilities

I’m thrilled to share that Cloudflare has acquired Outerbase. This is such an amazing opportunity for us, and I want to explain how we got here, what we’ve built so far, and why we are so excited about becoming part of the Cloudflare team.

Google's $32B Multicloud Security Bet: What the Wiz Deal Means to the Market

In a record-breaking transaction that reflects the increasing importance of multicloud security, Google is to acquire cloud security giant Wiz in a whopping $32 billion all-cash deal. The largest deal by Google so far, the buyout marks a seismic step ahead in its cloud security offerings. As cyber threats continue to evolve at a record pace, businesses are looking for better, AI-driven solutions to protect their cloud-based digital properties.

Reshaping IGA for the Modern Enterprise: Welcome Zilla Security to CyberArk

This week, we announced an important development in our journey to deliver the industry’s most powerful, comprehensive identity security platform. CyberArk has acquired Zilla Security, a leader in modern Identity Governance and Administration (IGA) solutions, bringing their cutting-edge, AI-powered technology into the fold of our industry-leading platform.

The Aurora Endpoint Security Difference: Ushering in a New Dawn for Cybersecurity

Today, Arctic Wolf successfully completed the acquisition of BlackBerry’s Cylance endpoint security assets. With this acquisition, we are thrilled to welcome hundreds of new partners and thousands of customers to The Pack. Additionally, we are excited to welcome almost 400 new employees who will join Arctic Wolf offices around the globe.

JumpCloud Acquires Stack Identity, Paving the Way for Identity-First Security

JumpCloud Inc. is continuing its identity-first momentum by acquiring Stack Identity. Stack Identity is a next-generation identity security and access visibility platform. This acquisition strengthens JumpCloud's identity-first access management solution.

WatchGuard Acquires ActZero to Add Scalable and Open-Platform AI Security to Deliver Simplified 24/7 MDR Services

With demand for WatchGuard's existing MDR service soaring, this acquisition lets MSPs easily add best-in-class MDR capabilities without building and maintaining their own in-house security operations center (SOC).

WatchGuard Acquires ActZero to Accelerate Delivery of 24/7 MDR Services

WatchGuard acquired ActZero, a leading provider of MDR services with proactive, rapid and automated threat response and cross-platform AI-driven threat analysis designed to outpace threats at machine speed. This move further expands and matures WatchGuard’s innovative 24/7 MDR service and was signed and closed on December 17, 2024.

1Password acquires Trelica, a trailblazer in SaaS access management

From the earliest days of 1Password, our bedrock value has been building a security tool that works for our users – not against them – enabling people to behave securely without needless friction or frustration. For our business customers, this means making the productive way to work the secure way to work.

Innovating to Secure Software Supply Chains: Veracode Acquires Phylum, Inc. Technology for Enhanced Software Composition Analysis

The rise of emerging open-source threats presents a growing risk to organizations as attackers increasingly exploit vulnerabilities in widely used libraries, frameworks, and tools. In fact, most Software Composition Analysis (SCA) tools on the market today are unable to keep up with the volume of new overtly malicious activities in the open-source ecosystem.