logo
Veza Identity Security Solutions Now Offered Through GuidePoint Security

Veza Identity Security Solutions Now Offered Through GuidePoint Security

Business Wire25-04-2025
REDWOOD SHORES, Calif.--(BUSINESS WIRE)-- Veza, the identity security platform, today announced a strategic reseller partnership with GuidePoint Security, a leading cybersecurity solutions provider that helps organizations minimize risk. Through this partnership, GuidePoint customers can now enhance their identity security strategies using Veza's cutting-edge platform—offering deep visibility and intelligence into access permissions and modern identity infrastructure across cloud and on-premises environments.
Veza's identity security platform enables organizations to manage and secure access to data, applications, and systems through an industry-first approach with the Veza Access Graph. The Veza Identity Partner Program (VIPP) equips partners like GuidePoint Security with technical training, financial incentives, and go-to-market support to deliver meaningful results. By combining Veza's innovation with GuidePoint's trusted expertise, the partnership helps customers reduce identity risk and simplify compliance in today's complex IT environments. According to CrowdStrike, 80% of cyberattacks now involve identity-based attack methods—underscoring the urgent need for modern identity security.
'The identity security landscape is becoming increasingly complex as organizations manage access across SaaS, cloud, and hybrid environments,' said Mark Thornberry, SVP of Vendor Management at GuidePoint Security. 'Veza's comprehensive approach to identity security—combined with the enablement support of the Veza Identity Partner Program—empowers us to deliver impactful outcomes that help organizations strengthen their security posture, simplify compliance, and gain deeper visibility into access permissions.'
'Identity is the number one battleground in security, and businesses need trusted partners to help them navigate today's challenges,' said Tom Barsi, SVP of Ecosystems at Veza. 'We are thrilled to welcome GuidePoint Security into the Veza Identity Partner Program, where they will leverage the Veza unified identity security platform and play a key role in helping organizations address their identity security initiatives.'
About Veza
Veza is the leader in identity security, helping organizations secure access across the enterprise. Veza's Access Platform goes beyond identity governance and administration (IGA) tools to visualize, monitor, and control entitlements so that organizations can stay compliant, achieve least privilege, and de-risk the breach. Global enterprises like Wynn Resorts, Expedia, and Blackstone trust Veza to manage identity security use cases, including privileged access monitoring, non-human identity (NHI) security, access entitlement management, data system access, SaaS access security, IAM hygiene, identity security posture management (ISPM), and next-generation IGA. Founded in 2020, Veza is headquartered in Los Gatos, California, and is funded by Accel, Bain Capital, Ballistic Ventures, Google Ventures (GV), Norwest Venture Partners, and True Ventures. Visit us at www.veza.com and follow us on LinkedIn, X, and YouTube.
About GuidePoint Security
GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint's unmatched expertise has enabled more than a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Microsoft software flaw leads to shock nuclear cyber breach
Microsoft software flaw leads to shock nuclear cyber breach

Yahoo

time19 hours ago

  • Yahoo

Microsoft software flaw leads to shock nuclear cyber breach

Microsoft software flaw leads to shock nuclear cyber breach originally appeared on TheStreet. It's funny how often the tools we trust most open the back door without us realizing it. Given the fast-evolving cybersecurity landscape, state-sponsored threats have grown more precise and quiet, with even routine enterprise software coming under the microscope. 💵💰💰💵 Though the headlines chase high-profile attacks, a quieter breach could potentially be reshaping how agencies think about risk. The latest one didn't arrive with fanfare, but its ripple effects are starting to surface. It's the kind of cyber threat that challenges assumptions about where the next attack is likely to originate. The trillion-dollar threat behind every cyber breach The financial toll of cyberattacks has been exploding. Last year, the average cost of a solitary data breach hit a record $4.88 million, according to IBM and the Ponemon Institute. That's a healthy 10% bump in one year, and it's only getting worse. Case in point is the MOVEit ransomware attack from a couple of years ago, orchestrated by the Cl0p gang and representing one of the costliest in history. The global price tag came in at more than $15.8 covers everything from legal bills, customer notifications, system rebuilds, and damage control across both public and private sectors. Health care took a massive hit, too. A botched CrowdStrike update in summer last year disrupted operations at 759 hospitals. More than 200 reported impacts to direct patient care. That included emergency patches, delayed procedures, and forced IT rollbacks, which pushed the costs higher. And things haven't slowed down this year, either. Rubrik Zero Labs reports that a whopping 74% of organizations discovered their backup systems were compromised during an attack. Even more alarming, over one-third lost their backups entirely. Then the June credential breach saw 16 billion passwords leaked in a single event. The damage is still unfolding, but industry experts expect upwards of $20 billion in fallout, led by identity theft protection, forced password resets, and potential lawsuits. Analysts now expect global cybercrime damages to reach a dizzying $10.5 trillion by the close of the year, up 15% year-over-year. More News: Top economist drops 6-word verdict on Trump tariffs, inflation JPMorgan reveals 9 stocks with major problems Major analyst revamps Nvidia stock price target after China surprise Companies are scrambling to roll out AI threat detection and zero-trust systems, while U.S. agencies are under immense pressure to meet these new breach-reporting rules. Microsoft SharePoint flaw linked to cyber breach at U.S. nuclear agency Bloomberg reports that hackers exploited a loophole in Microsoft's () SharePoint software in breaching systems at the U.S. National Nuclear Security Administration (NNSA). The agency is responsible for developing and dismantling nuclear weapons, powering Navy submarines, and handling radiological emergencies. Alhough apparently no classified material was stolen, the breach is serious. SharePoint, used widely in government and corporate networks, became the entry point for bad actors. According to a Department of Energy spokesperson, the hack began on July 18 but was limited due to the use of Microsoft's cloud-based services. Microsoft confirmed Tuesday that several Chinese-linked hacking groups, including names like 'Linen Typhoon,' 'Violet Typhoon,' and 'Storm-2603,' have been exploiting SharePoint's flaws. The attackers targeted internet-facing servers in gaining unauthorized access. Once inside, they stole usernames, passwords, hash codes, and sign-in firm Eye Security said the weaknesses enabled hackers to impersonate users, even with the patches in place. Hackers can maintain access through hidden back doors or modified files that can survive updates and reboots. Eye Security has tracked over 100 compromised servers across 60 organizations, including universities, energy firms, and others. Other government entities that took a hit include the likes of the U.S. Department of Education, the Florida Department of Revenue, and Rhode Island's General Assembly. A Florida official stated that the incident is still under investigation at multiple levels of government. Also, Microsoft clarified that only on-premises versions of SharePoint were impacted, while the cloud versions on Microsoft 365 remained safe. Meanwhile, the Chinese Embassy in Washington denied any involvement, saying China is against any forms of cyberattacks and calling for conclusions based on evidence. The investigation is ongoing as Microsoft and U.S. officials track additional actors using the same entry points. Microsoft software flaw leads to shock nuclear cyber breach first appeared on TheStreet on Jul 23, 2025 This story was originally reported by TheStreet on Jul 23, 2025, where it first appeared. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

Microsoft software flaw leads to shock nuclear cyber breach
Microsoft software flaw leads to shock nuclear cyber breach

Miami Herald

time2 days ago

  • Miami Herald

Microsoft software flaw leads to shock nuclear cyber breach

It's funny how often the tools we trust most open the back door without us realizing it. Given the fast-evolving cybersecurity landscape, state-sponsored threats have grown more precise and quiet, with even routine enterprise software coming under the microscope. Don't miss the move: Subscribe to TheStreet's free daily newsletter Though the headlines chase high-profile attacks, a quieter breach could potentially be reshaping how agencies think about risk. The latest one didn't arrive with fanfare, but its ripple effects are starting to surface. It's the kind of cyber threat that challenges assumptions about where the next attack is likely to originate. Image source:The financial toll of cyberattacks has been exploding. Last year, the average cost of a solitary data breach hit a record $4.88 million, according to IBM and the Ponemon Institute. That's a healthy 10% bump in one year, and it's only getting worse. Case in point is the MOVEit ransomware attack from a couple of years ago, orchestrated by the Cl0p gang and representing one of the costliest in history. The global price tag came in at more than $15.8 billion. Related: Morgan Stanley recalibrates its view on Apple stock ahead of earnings That covers everything from legal bills, customer notifications, system rebuilds, and damage control across both public and private sectors. Health care took a massive hit, too. A botched CrowdStrike update in summer last year disrupted operations at 759 hospitals. More than 200 reported impacts to direct patient care. That included emergency patches, delayed procedures, and forced IT rollbacks, which pushed the costs higher. And things haven't slowed down this year, either. Rubrik Zero Labs reports that a whopping 74% of organizations discovered their backup systems were compromised during an attack. Even more alarming, over one-third lost their backups entirely. Then the June credential breach saw 16 billion passwords leaked in a single event. The damage is still unfolding, but industry experts expect upwards of $20 billion in fallout, led by identity theft protection, forced password resets, and potential lawsuits. Analysts now expect global cybercrime damages to reach a dizzying $10.5 trillion by the close of the year, up 15% year-over-year. More News: Top economist drops 6-word verdict on Trump tariffs, inflationJPMorgan reveals 9 stocks with major problemsMajor analyst revamps Nvidia stock price target after China surprise Companies are scrambling to roll out AI threat detection and zero-trust systems, while U.S. agencies are under immense pressure to meet these new breach-reporting rules. Bloombergreports that hackers exploited a loophole in Microsoft's (MSFT) SharePoint software in breaching systems at the U.S. National Nuclear Security Administration (NNSA). The agency is responsible for developing and dismantling nuclear weapons, powering Navy submarines, and handling radiological emergencies. Alhough apparently no classified material was stolen, the breach is serious. SharePoint, used widely in government and corporate networks, became the entry point for bad actors. According to a Department of Energy spokesperson, the hack began on July 18 but was limited due to the use of Microsoft's cloud-based services. Microsoft confirmed Tuesday that several Chinese-linked hacking groups, including names like "Linen Typhoon," "Violet Typhoon," and "Storm-2603," have been exploiting SharePoint's flaws. The attackers targeted internet-facing servers in gaining unauthorized access. Once inside, they stole usernames, passwords, hash codes, and sign-in tokens. Related: Veteran analyst drops surprise call on Tesla ahead of earnings Cybersecurity firm Eye Security said the weaknesses enabled hackers to impersonate users, even with the patches in place. Hackers can maintain access through hidden back doors or modified files that can survive updates and reboots. Eye Security has tracked over 100 compromised servers across 60 organizations, including universities, energy firms, and others. Other government entities that took a hit include the likes of the U.S. Department of Education, the Florida Department of Revenue, and Rhode Island's General Assembly. A Florida official stated that the incident is still under investigation at multiple levels of government. Also, Microsoft clarified that only on-premises versions of SharePoint were impacted, while the cloud versions on Microsoft 365 remained safe. Meanwhile, the Chinese Embassy in Washington denied any involvement, saying China is against any forms of cyberattacks and calling for conclusions based on evidence. The investigation is ongoing as Microsoft and U.S. officials track additional actors using the same entry points. The Arena Media Brands, LLC THESTREET is a registered trademark of TheStreet, Inc.

CrowdStrike Named a Leader and Fast Mover in the 2025 GigaOm Radar Report for Identity Security Posture Management (ISPM)
CrowdStrike Named a Leader and Fast Mover in the 2025 GigaOm Radar Report for Identity Security Posture Management (ISPM)

Business Wire

time2 days ago

  • Business Wire

CrowdStrike Named a Leader and Fast Mover in the 2025 GigaOm Radar Report for Identity Security Posture Management (ISPM)

AUSTIN, Texas--(BUSINESS WIRE)-- CrowdStrike (NASDAQ: CRWD) today announced it has been named a Leader and Fast Mover in the 2025 GigaOm Radar Report for Identity Security Posture Management (ISPM). The report recognized CrowdStrike as the most complete Platform Play, scoring highest of all vendors in Emerging Features, with perfect 5/5 scores in Non-Human and Machine Identities Posture and Generative AI for Identity Insights. CrowdStrike also received perfect 5/5 scores in Key Features and Business Criteria including Automated Remediation, Security Ecosystem Integration, and Scalability. This recognition reinforces CrowdStrike's innovation and leadership in delivering a unified platform that protects every identity in the AI era – human and non-human – across the full attack lifecycle and hybrid environments. According to GigaOm 'identity compromise remains one of the most common, easily exploited, and potentially damaging vectors for cyberattacks.' As agentic AI drives explosive growth in machine and service identities, the AI-native CrowdStrike Falcon® platform secures both human and non-human identities – delivering the real-time visibility, automation, and intelligence defenders need to stop identity-based threats before they escalate. CrowdStrike Falcon® Identity Protection continuously correlates telemetry across endpoints, identity providers, cloud infrastructure, and data protection tools – enriched with adversary intelligence and dark web monitoring. By combining these signals in real time, the Falcon platform detects credential misuse, lateral movement, and privileged escalation, highlights identity attack paths, and enforces policy controls through Falcon Fusion, CrowdStrike's no-code SOAR engine. Key report findings include: Machine and Non-Human Identity Protection: With a perfect 5/5 score in Non-Human and Machine Identities Posture, CrowdStrike drives relentless innovation to keep customers ahead of evolving threats. End-to-End Hybrid Identity Coverage: The report highlighted how CrowdStrike secures the entire identity threat lifecycle and 'can protect hybrid identity infrastructures by detecting and responding to threats across on-premises and cloud identity infrastructures.' Agentic AI Innovation: With a perfect 5/5 score in Generative AI for Identity Insights, CrowdStrike brings the power of agentic AI to Falcon Identity Protection. Charlotte AI Agentic Detection Triage autonomously triages cross-domain attack detections with over 98% accuracy 1 to rapidly prioritize the most critical threats. Automated Response at Scale: CrowdStrike earned a perfect 5/5 score in Automated Remediation. The report notes how 'the platform prevents and mitigates identity risks through policy enforcement and automated remediation utilizing the no-code SOAR engine Falcon Fusion,' and that 'the solution can call on more than 150 automated actions.' 'The AI era has led to an explosion in machine, service, and non-human identities, massively expanding the attack surface,' said Cristian Rodriguez, field CTO, Americas, CrowdStrike. 'Adversaries are exploiting this shift to move faster, stay hidden, and breach environments through the front door: identity. As a unified part of the Falcon platform, Falcon Identity Protection is built for this new reality, correlating real-time signals across domains, applying agentic AI to triage and prioritize threats, and stopping identity-based attacks before they can escalate.' To learn more about the 2025 GigaOm Radar Report for ISPM, visit here and read our blog. 1 Accuracy rating is a measure of Charlotte AI triage decisions that match the expert decisions from the CrowdStrike Falcon Complete Next-Gen MDR team. About CrowdStrike CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world's most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities. Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value. CrowdStrike: We stop breaches. © 2025 CrowdStrike, Inc. All rights reserved. CrowdStrike and CrowdStrike Falcon are marks owned by CrowdStrike, Inc. and are registered in the United States and other countries. CrowdStrike owns other trademarks and service marks and may use the brands of third parties to identify their products and services. CrowdStrike owns other trademarks and service marks and may use the brands of third parties to identify their products and services.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store