
Barracuda Launches Managed Vulnerability Security
'By proactively identifying vulnerabilities, we can better predict the likelihood of an attack, giving both Barracuda and our customers a decisive edge to stop threats before they're exploited and reduce cyber risk,' said Adam Khan, vice president of global security operations at Barracuda. 'Barracuda Managed Vulnerability Security delivers deep visibility into risks across environments – without the burden of managing additional tools or hiring hard to find and retain security operations specialists. With expert guidance and smart prioritization, it streamlines remediation and transforms how organizations manage vulnerabilities and defend against today's sophisticated attacks.'
Barracuda Managed Vulnerability Security provides expert-led vulnerability scanning, analysis and contextual reporting across organizations' networks and cloud infrastructure. The service uncovers vulnerabilities across a broad range of hardware and software – including endpoints, servers, IoT devices, firewalls, and other network-connected systems – regardless of whether those vulnerabilities are associated with known exploits.
Organizations receive detailed, actionable reports, including an audit summary and prioritized remediation plan. These insights help organizations clearly understand their risk exposure and make informed decisions aligned with both their security objectives and compliance requirements. Regular vulnerability scans play a critical role in helping organizations meet regulatory guidelines such as the Digital Operational Resilience Act (DORA), Network Information Security 2 (NIS2), General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry Data Security Standard (PCI DSS), and others by supporting ongoing risk assessment, mitigation and audit readiness.
Barracuda Managed Vulnerability Security is now available to both new and existing customers through Barracuda's global network of resellers and Managed Service Providers.
The service can be deployed on its own or seamlessly integrated with Barracuda Managed XDR, a 24/7/365 threat detection and response offering that leverages advanced AI analytics and threat intelligence to prevent breaches. When combined, customers gain a unified, fully managed security experience that streamlines vendor management, accelerates vulnerability and threat detection and remediation, and enhances operational efficiency.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Channel Post MEA
6 days ago
- Channel Post MEA
Vectra AI Introduces AI Assistant For Faster Detection Of Cyber Threats
Vectra AI has announced Vectra AI MCP Server, a powerful tool that brings seamless, natural language access to the Vectra AI Platform through the Model Context Protocol (MCP). Currently available as early access to all customers, with more releases to come soon, this tool allows security teams to engage with the Vectra AI Platform through AI assistants like Claude Desktop, Cursor, and others – turning complex threat investigations into intuitive conversations. Security operations teams are embracing AI to work faster and more efficiently, but accessing deep security insights remains a technical and time-consuming process. Analysts often struggle with alert fatigue, fragmented toolsets, and complex workflows that delay response and increase risk. By adopting MCP – a fast-growing open standard that enables AI agents to connect with external data and tools – Vectra AI is breaking down those barriers and making expert-level detection and response accessible through a simple prompt. The Vectra AI MCP Server connects directly to the Vectra AI Platform, enabling analysts and threat hunters to investigate incidents, reconstruct attack timelines, and report on security posture – all through conversational queries. The integration eliminates the need for custom connectors, reduces investigation time, and allows SOC teams to generate context-rich visuals and reports that can be easily shared with leadership. It builds on Vectra AI's core platform strengths and requires no changes to existing deployments. 'As AI-native workflows reshape the way teams investigate and respond to threats, we're committed to making our intelligence available wherever and however our customers work,' said Jeff Reed, chief product officer at Vectra AI. 'The launch of our MCP Server is a major step in democratizing security expertise – empowering every analyst with instant access to powerful insights through the AI tools they already use.'


Web Release
7 days ago
- Web Release
Digital Sovereignty is far more than compliance
I have honed my expertise in digital sovereignty in recent years largely as a result of it being one of the things our EMEA-based partners and customers always ask about. There is no one unifying reason for this increased interest in digital sovereignty, but rather several converging factors are accelerating its urgency. The most obvious is geopolitical instability. Sanctions and trade wars continue to disrupt global business operations. As reported, a coalition of nearly 100 organisations has urged European Commission leaders to establish a dedicated fund for building technological independence. In a joint letter addressed to President Ursula von der Leyen and Digital Commissioner Henna Virkkunen, the group advocated for strategic investments in homegrown infrastructure to reduce reliance on non-European tech giants. Another concern is that seemingly neutral cloud providers can become liabilities. One example is the high profile move of a major hyperscaler to cut off the International Court of Justice's email access following political pressure, highlighting that vendor obligations can sometimes override customer needs. In addition to geopolitical concerns, regulatory pressure is also mounting, with regulations like DORA (Digital Operational Resilience Act) and NIS2 in Europe requiring financial institutions and critical infrastructure providers to ensure operational resilience. While it is true that geopolitical dynamics have put digital sovereignty into the spotlight, it would be a misconception to think of this as a fresh challenge, as at its core digital sovereignty is about resilience and autonomy. Organisations need to prove they can operate independently, even when global political shifts or vendor decisions disrupt their operations. Prepare for unintended consequences In April 2022, the Amsterdam Trade Bank (ATB), a financially stable Dutch institution, was forced into bankruptcy. This wasn't due to poor management or insolvency, but rather because of sanctions imposed on its Russian parent company, Alfa Bank. When the US, the EU and UK enacted sanctions against Russian entities in spring 2022, the ripple effects were catastrophic for ATB. Despite ATB being fully compliant with Dutch and EU laws, service providers, again being respectful with the same laws and sanctions, were obliged to abruptly terminate critical cloud services, including email and core banking operations. Without access to cloud-based workspaces and business software suites, ATB lost the ability to communicate internally or with customers, leading to its sudden collapse. While the sanctions against Alfa Bank have been implemented in a different context this case nevertheless underscores a critical distinction when it comes to the question of sovereignty: Own compliance does not guarantee autonomy. Even legally sovereign organisations can fail if they lack operational resilience. ATB's total dependence on their service providers left it defenceless when they withdrew support, a stark warning against vendor lock-in. While 'digital sovereignty' refers to government-mandated control, such as GDPR or data localisation laws, 'digital autonomy' is about an organisation's ability to operate independently, regardless of whether disruptions originate at the geopolitical or vendor level. This distinction has now been officially defined in the Netherlands by the Dutch government. ATB was sovereign (regulated under Dutch law) but not autonomous, so when its cloud providers pulled the plug, it had no backup plan. And, of course, ATB is not alone, in Australia another major hyperscaler accidentally deleted superannuation fund UniSuper's online account. Thankfully for UniSuper and its half a million members, they had taken the wise step of having a third party back-up. Building true autonomy takes a strategic approach To avoid ATB's fate, organisations need to take proactive steps towards technology and systems resilience. First, they should eliminate single points of failure by adopting multi-cloud or hybrid cloud strategies including on-premise solutions, reducing reliance on any single provider. Open source solutions, such as Red Hat OpenShift, offer portability across environments, helping businesses avoid lock-in to a single vendor's ecosystem, and providing customers with the flexibility, privacy and portability required to adapt to future regulations and sovereign requirements. In addition to this, specific technologies such as Confidential Computing can help you to continue using your current investments in cloud technologies while protecting your data from third party operations. Open source software, being a neutral decentralised way to develop software, delivers access and transparency while not relying on a single vendor, instead leaning on the decentralised community as the real back up. Next, organisations must control their exit strategy, for a smooth migration of data and applications if vendors change policies or face geopolitical restrictions. Lastly, they should invest in community-driven resilience that can provide an additional safety net. The CVE database, a cornerstone of global cybersecurity, nearly collapsed after US funding cuts but was saved by international collaboration, demonstrating the need for decentralised solutions and also the need to be able to keep innovating while protecting global collaboration and contributions. Innovating is costly and if you are only a consumer you may miss important advances and security. While digital autonomy is needed, we also must protect global collaboration and innovation with open source communities at its centre. Open source provides transparency and control of code while at the same time accelerating innovation, making it a key strategic investment for local/sovereign talent development. Organisations cannot afford to take a wait-and-see approach when it comes to establishing their digital future. Sovereignty laws will evolve, but resilience is permanent. Digital sovereignty isn't just a regulatory obligation, it's a strategic imperative for survival. The ATB and UniSuper cases showcase that legal compliance alone is insufficient, and that true autonomy requires technical resilience and independence from vendor lock-in.


Zawya
28-07-2025
- Zawya
Kalaam Telecom Group partners with SecurityHQ to enhance the cybersecurity landscape in the region
RIYADH, Saudi Arabia/PRNewswire/ -- Kalaam Telecom Group, a leading regional Digital Solutions Provider is thrilled to announce its partnership with SecurityHQ, a global Managed Security Service Provider (MSSP) to empower the cybersecurity landscape in the region. This strategic partnership brings together SecurityHQ's global expertise in managed security services and Kalaam Telecom's strong regional presence to deliver advanced SOC and Managed Security services tailored to the unique needs of local enterprises. Under this partnership, SecurityHQ will provide Managed Security Operations Centers (SOCs) and other Managed Security Services within the Kingdom of Saudi Arabia (KSA), Bahrain, Kuwait and other regional GCC locations based on Kalaam's footprint. This will leverage world-class technologies, utilize local citizens, employ matured processes, and demonstrate a proven ability to meet local regulatory requirements. This is all subject to obtaining the Managed Security Operations Center (MSOC) license from the National Cybersecurity Authority in KSA. This combination of capabilities ensures Kalaam Telecom's clients will receive world-class cybersecurity solutions meticulously tailored to the specific demands of the region. Veer Passi, Group CEO of Kalaam Telecom commented; "Our partnership with SecurityHQ marks a pivotal step in our mission to empower businesses in the Kingdom of Saudi Arabia & Bahrain with cutting-edge cybersecurity solutions. We will be utilizing industry leading technologies, highly matured processes and capabilities to provide enterprises with unparalleled protection against evolving cyber threats, while adhering to the highest regulatory standards and industry best practices." Aaron Hambleton, Senior VP, MEA at SecurityHQ, emphasized the significance of this collaboration, stating: "SecurityHQ's partnership with Kalaam Telecom represents a strategic milestone in strengthening our cybersecurity capabilities and presence in the GCC region. By combining our global MSSP expertise with Kalaam Telecom's regional presence, we're positioned to deliver enhanced cybersecurity services that address the unique challenges of local enterprises while maintaining our commitment to excellence in threat detection and response." As a Leader in the 2024 IDC Marketspace for Middle East Managed Detection and Response Services, and with the launch of seventh global SOC in KSA, SecurityHQ continues to raise the bar for cyber defence across the region. With strong references across the GCC and a commitment to excellence, this partnership underscores Kalaam Telecom's dedication to empowering businesses with the tools and expertise necessary to address today's ever-evolving cyber threats. About Kalaam Telecom: Kalaam Telecom Group (Kalaam) is a trusted digital solutions provider with over 30 years of expertise, serving SMEs, Enterprises, and Telecom Carriers regionally and globally. Headquartered in Bahrain with offices in Saudi Arabia, Kuwait, UAE, Jordan, Egypt and the UK, Kalaam offers advanced digital solutions like Connectivity, Cloud, Cybersecurity, Managed Networks, Voice & Collaboration, ICT & Data Center for various verticals. Kalaam owns the KNOT terrestrial cable system and is a consortium member of the Europe-India Gateway (EIG) undersea cable. Its unique "Kalaam Iraq Transit" terrestrial route ensures low latency, high security, and resilience, making it a reliable partner for regional and international connectivity. To know more about Kalaam Telecom Solutions, visit About SecurityHQ SecurityHQ is a technology-agnostic MSSP that designs and architects custom security solutions to fit your environment's specific needs. Whether that extends to total management of your security features, or just filling in the gaps, SecurityHQ offers services from 24/7 MDR to threat and risk advisory, to proactive security posture management. Our team of over 500+ SOC Analysts and Engineers is positioned to detect and remediate threats with a 62% lower noise-to-signal ratio than competitors. With our leading expertise, we serve as an extension of your security program and provide the essential elements needed to protect your organization: time and insights. Photo - SOURCE Kalaam Telecom