top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Cydome Brings Zero-Touch Cybersecurity to Offshore Wind Farms, No On-Site Hardware Required
Cydome is taking aim at one of clean energy’s most stubborn security gaps: how to protect offshore wind farms that are expensive, dangerous, and sometimes impossible to physically reach. The maritime and critical infrastructure security firm this week unveiled a deployment model designed specifically for offshore renewable energy facilities, where traditional cybersecurity assumptions break down. Instead of requiring new hardware or on-site technicians, the company’s softwar
Feb 3


Security Experts Analyze: WhatsApp Introduces Strict Account Settings to Shield High-Risk Users From Spyware Attacks
WhatsApp is preparing to roll out a new security option designed for users who face a higher risk of targeted surveillance, including journalists, activists, and public figures. The feature, called Strict Account Settings, reflects a broader industry shift toward defensive tools that assume attackers may already be well resourced, persistent, and patient. Once enabled, the setting places tighter limits on how people can interact with an account. Messages from unknown contact
Jan 28


NCC Group and Delinea Team Up to Bring Cloud-Native Privileged Access Security to the Front Lines of Zero Trust
As identity becomes the primary control plane for modern enterprises, privileged access is emerging as one of the most fragile and frequently exploited layers of security. That reality is driving a new partnership between NCC Group and Delinea , aimed at delivering cloud-native privileged access management services designed for hybrid, AI-enabled environments. The collaboration brings Delinea’s privileged access management technology into NCC Group’s Unified Digital Identity
Jan 25


Zeroport Raises $10M to Kill the VPN Era With Hardware-Based Remote Access
Zeroport Co-founder and CTO, Lavi Friedman (Left) and CEO and Co-Founder, Joseph Gertz (Right) For decades, remote access has carried an uncomfortable truth. The same IP-based plumbing that makes networks usable also makes them dangerously reachable. VPNs, bastion hosts, and layered gateways were supposed to manage that risk, yet breaches tied to exposed remote access infrastructure keep piling up, including incidents that have reached the highest levels of government. A new
Jan 21


Keeper Security Secures FedRAMP High Approval to Protect the US Government’s Most Critical Cloud Systems
Keeper Security has crossed one of the most demanding thresholds in federal cybersecurity, earning authorization to operate at the FedRAMP High level for its government cloud platform. The approval positions the company to secure some of the US government’s most sensitive unclassified systems, including those tied to law enforcement, emergency response, and critical infrastructure. FedRAMP High is not a routine certification. It applies to cloud systems where a breach could
Dec 29, 2025


Claroty’s New CPS Library Takes Aim at the Most Chaotic Corner of Cybersecurity: Device Identity
In the sprawling world of cyber-physical systems—industrial controllers, medical devices, manufacturing lines, energy infrastructure—security teams have been fighting a quiet but brutal battle: no one can agree on what anything is actually called. A single controller might report three different names depending on the protocol you ask. Another might hide its product code entirely. Vendors publish advisories full of vague model families instead of specific variants. And CVE li
Nov 18, 2025
bottom of page