LaunchDarkly announced the private preview of Warehouse Native Experimentation, its Snowflake Native App, to offer Data Warehouse Native Experimentation.
CyberArk introduced a cybersecurity insurance offering that prioritizes privileged access security to reduce business risk.
CNA selected CyberArk to provide its policyholders with access to a range of world-class services that will improve education and awareness about privileged access-related risk. This includes tools to identify where the riskiest accounts and credentials exist within an organization and guidance for prioritizing protection and management of privileged access to improve security and compliance.
“The costs of data breaches caused by malicious attackers, human error or simple technology glitches have never been higher,” said Andrew Lea, vice president, head of Commercial E&O, Cyber & Media Liability, CNA. “We understand that privileged access security significantly reduces risk, and we want to make sure CNA policyholders have access to the best services and technology the industry has to offer. CyberArk is an industry leader in privileged access security and offers a depth of experience and expertise that will deliver great value to our policyholders.”
The program begins with a complimentary CyberArk Privileged Access Security Assessment, which identifies current privileged access security risk posture and enables organizations to understand how they compare to industry peers.
Once an evaluation is completed, CNA policyholders have access to a range of additional privileged access-related services including:
- Discovery and Audit (DNA Workshop): A review of organizational requirements and drivers to identify objectives, success criteria, priorities and use cases of a privileged access security solution. With CyberArk, customers will conduct an in-depth review of critical controls and timelines using recommended CyberArk frameworks and tools such as the CyberArk Privileged Access Security Cyber Hygiene Program and Discovery and Audit (DNA) tool.
- CyberArk Red Team Tools, Tactics and Procedures (TTP): An engagement with the CyberArk Red Team will educate organizations on the common techniques utilized by attackers to compromise security controls and put companies at significant risk. Security teams will receive the hands-on experience they need to understand popular attack techniques and defense strategies.
- CyberArk Security Services Intensive: Gain the building blocks for developing or accelerating an effective privileged access security program with implementation planning, architecture design and consulting.
“Global organizations understand that in order to reduce the most business risk, they must prioritize privileged access security as a long-term program,” said Adam Bosnian, EVP, Global Business Development, CyberArk. “This first-of-its-kind program will deliver superior education and training to improve overall cybersecurity awareness, and give CNA policyholders the tools they need to prioritize privileged access security in ways that are quantifiable and compliance driven.”
Created by CyberArk, the Privileged Access Security Assessment systematically addresses organizations’ privileged access security risk and directs them toward actions that will yield the greatest improvement in their overall privileged access security posture. Evaluations are based on seven critical areas such as protecting against irreversible network takeover and securing application credentials. A customized risk score enables the organization to benchmark their privileged access security maturity against peers using a reference group defined by industry, employee count, annual revenue and region. This detailed, comparative analysis also provides remediation guidance based on CyberArk’s experience, allowing organizations to best optimize their time and resources on processes that reduce the most privileged access security risk.
Industry News
SingleStore announced the launch of SingleStore Flow, a no-code solution designed to greatly simplify data migration and Change Data Capture (CDC).
ActiveState launched its Vulnerability Management as a Service (VMaas) offering to help organizations manage open source and accelerate secure software delivery.
Genkit for Node.js is now at version 1.0 and ready for production use.
JFrog signed a strategic collaboration agreement (SCA) with Amazon Web Services (AWS).
mabl launched of two new innovations, mabl Tools for Playwright and mabl GenAI Test Creation, expanding testing capabilities beyond the bounds of traditional QA teams.
Check Point® Software Technologies Ltd. announced a strategic partnership with leading cloud security provider Wiz to address the growing challenges enterprises face securing hybrid cloud environments.
Jitterbit announced its latest AI-infused capabilities within the Harmony platform, advancing AI from low-code development to natural language processing (NLP).
Rancher Government Solutions (RGS) and Sequoia Holdings announced a strategic partnership to enhance software supply chain security, classified workload deployments, and Kubernetes management for the Department of Defense (DOD), Intelligence Community (IC), and federal civilian agencies.
Harness and Traceable have entered into a definitive merger agreement, creating an advanced AI-native DevSecOps platform.
Endor Labs announced a partnership with GitHub that makes it easier than ever for application security teams and developers to accurately identify and remediate the most serious security vulnerabilities—all without leaving GitHub.
Are you using OpenTelemetry? Are you planning to use it? Click here to take the OpenTelemetry survey.
GitHub announced a wave of new features and enhancements to GitHub Copilot to streamline coding tasks based on an organization’s specific ways of working.
Mirantis launched k0rdent, an open-source Distributed Container Management Environment (DCME) that provides a single control point for cloud native applications – on-premises, on public clouds, at the edge – on any infrastructure, anywhere.
Hitachi Vantara announced a new co-engineered solution with Cisco designed for Red Hat OpenShift, a hybrid cloud application platform powered by Kubernetes.