article thumbnail

H.I.G. Growth Partners Invests in Corelight’s $75M Series D Financing

CyberSecurity Insiders

is pleased to announce that one of its affiliates has invested in the Series D growth financing for Corelight (“Corelight” or the “Company”), a leading cyber-security platform focused on network detection and response (“NDR”). Growth Partners (“H.I.G.”) For more information, www.corelight.com. About H.I.G. Growth Partners.

article thumbnail

NETSCOUT Delivers Service Assurance for Southern Linc's Mission-critical Private 4G LTE Wireless Network

CyberSecurity Insiders

NASDAQ: NTCT) helps assure digital business services against security, availability, and performance disruptions. We provide real-time, pervasive visibility and insights customers need to accelerate and secure their digital transformation. About NETSCOUT. NETSCOUT SYSTEMS, INC.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NETSCOUT Research Shows Issues with Unified Communications and Collaboration Tools are Responsible for Over 50% of All Helpdesk Tickets

CyberSecurity Insiders

NASDAQ: NTCT) helps assure digital business services against security, availability, and performance disruptions. We provide real-time, pervasive visibility and insights customers need to accelerate and secure their digital transformation. Visit our website to download a PDF of the research findings. # # #.

article thumbnail

Weakness at the Network Edge: Mandiant Examines 2022’s Zero-Day Exploits

eSecurity Planet

” The three activity sets included a campaign against the Philippine government between March and May 2022; a campaign against telecommunications and business service providers in South Asia in April 2022; and a campaign against organizations in Belarus and Russia in May 2022.

article thumbnail

“Best of Breed” – CASB/DLP and Rights Management Come Together

McAfee

This was followed by a directory service to sign into to protect your personal computer, then permissions on files stored on file servers to assure safe usage. Most organizations now consider cloud services to be essential in their business. Enter the cloud.

article thumbnail

The First Steps After an Attack

NopSec

In order to continue successful business operations, maintain customer trust, and build a strong brand reputation, everyone from the CEO to the network analyst needs to know what initial steps they have to take after a network intrusion.

article thumbnail

Managed IT Service Providers (MSPs): A Fast Way to Secure IT

eSecurity Planet

While MSPs also provide a wide range of business services, here we’ll focus on managed IT and cybersecurity service providers. For IT services and infrastructure, some larger MSPs will provide generalist services and attempt to solve all problems.