top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Ping Identity Secure Containers Approved for Iron Bank, Clearing Path for Faster IL5 Deployment Across Defense Networks
Ping Identity has secured Iron Bank approval for its Secure Containers, a move that could streamline how identity infrastructure is deployed across U.S. defense and federal environments operating at Impact Level 5. The designation allows Department of War programs and defense contractors to implement IL5 aligned identity services with reciprocity across cloud, hybrid, and tactical deployments. The approval arrives as defense agencies accelerate modernization efforts into hy
Feb 26


Cydome Brings Zero-Touch Cybersecurity to Offshore Wind Farms, No On-Site Hardware Required
Cydome is taking aim at one of clean energy’s most stubborn security gaps: how to protect offshore wind farms that are expensive, dangerous, and sometimes impossible to physically reach. The maritime and critical infrastructure security firm this week unveiled a deployment model designed specifically for offshore renewable energy facilities, where traditional cybersecurity assumptions break down. Instead of requiring new hardware or on-site technicians, the company’s softwar
Feb 3


Security Experts Analyze: WhatsApp Introduces Strict Account Settings to Shield High-Risk Users From Spyware Attacks
WhatsApp is preparing to roll out a new security option designed for users who face a higher risk of targeted surveillance, including journalists, activists, and public figures. The feature, called Strict Account Settings, reflects a broader industry shift toward defensive tools that assume attackers may already be well resourced, persistent, and patient. Once enabled, the setting places tighter limits on how people can interact with an account. Messages from unknown contact
Jan 28


NCC Group and Delinea Team Up to Bring Cloud-Native Privileged Access Security to the Front Lines of Zero Trust
As identity becomes the primary control plane for modern enterprises, privileged access is emerging as one of the most fragile and frequently exploited layers of security. That reality is driving a new partnership between NCC Group and Delinea , aimed at delivering cloud-native privileged access management services designed for hybrid, AI-enabled environments. The collaboration brings Delinea’s privileged access management technology into NCC Group’s Unified Digital Identity
Jan 25


Zeroport Raises $10M to Kill the VPN Era With Hardware-Based Remote Access
Zeroport Co-founder and CTO, Lavi Friedman (Left) and CEO and Co-Founder, Joseph Gertz (Right) For decades, remote access has carried an uncomfortable truth. The same IP-based plumbing that makes networks usable also makes them dangerously reachable. VPNs, bastion hosts, and layered gateways were supposed to manage that risk, yet breaches tied to exposed remote access infrastructure keep piling up, including incidents that have reached the highest levels of government. A new
Jan 22


Keeper Security Secures FedRAMP High Approval to Protect the US Government’s Most Critical Cloud Systems
Keeper Security has crossed one of the most demanding thresholds in federal cybersecurity, earning authorization to operate at the FedRAMP High level for its government cloud platform. The approval positions the company to secure some of the US government’s most sensitive unclassified systems, including those tied to law enforcement, emergency response, and critical infrastructure. FedRAMP High is not a routine certification. It applies to cloud systems where a breach could
Dec 29, 2025
bottom of page