top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Cayosoft Pushes Hybrid Identity Resilience Into the Cloud With New Guardian SaaS Expansion
At Microsoft Ignite 2025, Cayosoft used its booth at the convention center—#5332, for anyone keeping score—to drop a strategic update that hits directly at one of the messiest problems in enterprise security: hybrid identity continuity. The company unveiled a new cloud-delivered deployment model for Cayosoft Guardian, turning its flagship identity protection platform into an always-on SaaS service designed to survive even when the environment it’s protecting is on fire. For
Nov 18


Zenity Plugs the Security Gap in Microsoft’s Booming Agentic AI Ecosystem
As enterprises rush to operationalize agentic AI across their workflows, one truth keeps getting louder: the more powerful the agents, the more catastrophic the mistakes when safeguards fail. With Microsoft Foundry and Copilot Studio turning enterprise ideas into fully orchestrated AI workers, the demand for real-time guardrails has turned into a full-on requirement. Zenity — a fast-rising platform focused on securing and governing AI agents — thinks it has the answer. The c
Nov 18


Google Takes Smishing Kingpin to Court
In a bold move that underscores how corporate cybersecurity strategy is evolving into the courtroom, Google filed a civil lawsuit Wednesday in the U.S. District Court for the Southern District of New York against an anonymous group of roughly 25 individuals accused of running one of the largest SMS-phishing—or “smishing”—operations on record. The group, according to Google’s complaint, built and sold a phishing-as-a-service kit called Lighthouse , a turnkey platform that pow
Nov 14


AI-Powered Adversaries Are Overwhelming SOCs — and Network Visibility Is the New Front Line
Security operations centers are cracking under pressure. According to new research from the Enterprise Strategy Group (now part of Omdia) commissioned by Vectra AI , defenders are contending with an unprecedented wave of threats — in both scale and sophistication — as attackers increasingly harness AI to automate reconnaissance, mimic legitimate traffic, and blend into the digital noise. The report, The Role of Network Visibility in Protecting Modern Environments , paints a c
Nov 14


Botnets, Miners, and Reverse Shells: XWiki CVE-2025-24893 Becomes a Playground for Attackers
When VulnCheck first reported active exploitation of CVE-2025-24893 in late October, the attacks appeared to stem from a small number of opportunistic actors abusing exposed XWiki servers. Two weeks later, that has changed dramatically.According to new Canary Intelligence data from VulnCheck, exploitation has exploded across the internet, attracting everything from crypto-miners and botnets to custom-built scanning tools and manual intrusion attempts. From Niche Exploit to
Nov 14
bottom of page