top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Zeroport Raises $10M to Kill the VPN Era With Hardware-Based Remote Access
Zeroport Co-founder and CTO, Lavi Friedman (Left) and CEO and Co-Founder, Joseph Gertz (Right) For decades, remote access has carried an uncomfortable truth. The same IP-based plumbing that makes networks usable also makes them dangerously reachable. VPNs, bastion hosts, and layered gateways were supposed to manage that risk, yet breaches tied to exposed remote access infrastructure keep piling up, including incidents that have reached the highest levels of government. A new
Jan 21


When Your Legitimate Calls Don’t Get Through: The Silent Risk Facing Every Enterprise
Voice is still central to business outcomes -- from banks confirming fraud alerts, to hospitals coordinating care, to retailers following up on customer inquiries. But legitimate calls that originate outside the U.S. and use U.S.-based numbers are increasingly and inadvertently mislabeled as spam or blocked outright due to FCC rules and fragmented verification frameworks. The result: missed connections, wasted resources and new openings for fraud. In this Q&A with Peter Ford,
Jan 21


StealC Malware Operators Exposed After Flawed Infrastructure Lets Researchers Hack the Hackers
Cybercriminals like to sell the illusion of professionalism. Malware dashboards are slick, subscription plans are clearly tiered, and promises of easy profits are framed with the language of software-as-a-service. But new research from CyberArk Labs shows how thin that polish can be, and how quickly the roles of attacker and victim can blur. The case centers on StealC, an infostealer that has circulated since early 2023 and is sold through a malware-as-a-service model. Buyer
Jan 19


In 2026, Privacy Stops Being a Checkbox and Starts Looking Like Identity Protection
As Data Privacy Week approaches, security leaders are confronting a reality that feels markedly different from even a few years ago. The conversation is no longer about simply meeting regulatory requirements or keeping databases locked down. It is about protecting individual identity itself in an era where personal data is inseparable from health, finances, work, and daily life. That shift is being accelerated by generative AI. As organizations race to deploy AI-powered tool
Jan 19


Grubhub Confirms Data Breach as Hackers Demand Extortion Using Stolen SaaS Credentials
Food delivery giant Grubhub is investigating a data breach that has escalated into what sources describe as an extortion attempt, underscoring how stolen SaaS credentials can reverberate across companies months after an initial compromise. The company confirmed that attackers accessed parts of its internal systems and downloaded data, but declined to specify when the intrusion occurred, whose information was involved, or whether ransom demands are underway. In a statement, G
Jan 19


The Non-Human Identity Explosion: Why Security Teams Must Rethink Trust
This guest article was contributed by Alix Melchy, VP of AI at Jumio In modern enterprise environments, the users you fear most gaining access to your systems may not be people at all. From autonomous bots to AI agents and machine-generated tokens, non-human identities (NHIs) are becoming embedded across enterprise operations. Agentic AI is seeing explosive growth, with 79% of organizations already adopting it and the market set to hit over $199 billion by 2034 . These mach
Jan 19
bottom of page