SMX® announced that its newest acquisition, cBEYONData, has officially achieved Cybersecurity Maturity Model Certification (CMMC) 2.0 Level 2, placing it among fewer than 300 organizations within the 75,000-strong Defense Industrial Base (DIB) to meet this standard. The certification, conducted by CyberNINES, highlights cBEYONData’s capacity to protect Controlled Unclassified Information (CUI) for Department of Defense (DoD) missions. By leveraging PreVeil, a secure end-to-end encrypted collaboration platform approved for handling CUI, cBEYONData demonstrated its compliance with stringent DoD cybersecurity requirements. Anthony Vultaggio, CTO of SMX, emphasized that the certification is not merely a regulatory milestone but a driver of innovation, ensuring the company remains proactive in protecting sensitive defense data. This achievement builds upon SMX’s recent DIBCAC certification, reinforcing its broader commitment to national security resilience.
Meanwhile, Astra Security unveiled its API Security Platform, designed to tackle the mounting risks associated with API sprawl. The platform identifies undocumented, zombie, and shadow APIs — endpoints that frequently bypass oversight and create major vulnerabilities. With real-time traffic analysis, over 15,000 Dynamic Application Security Testing (DAST) cases, and manual penetration testing by certified experts, Astra offers a hybrid solution to the escalating API security crisis. Recent data shows 90% year-over-year growth in demand for API pentesting, with threats increasingly tied to AI agent APIs and MCP servers. Shikhil Sharma, Astra’s CEO, noted that APIs are now the “unguarded backdoor to corporate data,” underscoring the urgency of automated, continuous API defense. The platform integrates with major cloud and traffic platforms such as AWS, Azure, GCP, NGINX, Istio, and Apigee, ensuring broad coverage for enterprises undergoing digital transformation.
Finally, Check Point Software Technologies introduced its new Enterprise Browser, extending Zero Trust protections to unmanaged devices — a long-standing security gap for enterprises. Designed for contractors, BYOD users, and third-party partners, the Chromium-based browser provides an isolated, ephemeral session environment that wipes all data upon closure. Features include integrated Data Loss Prevention (DLP), watermarking, agentless posture checks, full session visibility, and seamless integration with Harmony SASE and Agentless ZTNA. By eliminating the need for costly VPN provisioning or corporate-issued hardware, Check Point offers organizations a compliance-ready way to secure sensitive workflows while enabling productivity. As Amit Bareket, VP of SASE at Check Point, put it: “Enterprises can no longer afford to choose between productivity and security.” The new Enterprise Browser ensures both, making unmanaged devices secure, compliant, and auditable.
Together, these developments illustrate a clear trend across the cybersecurity industry: a shift toward proactive, compliance-driven, and hybrid solutions that safeguard the expanding attack surface — from defense contractors handling sensitive data, to enterprises securing shadow APIs, to distributed workforces relying on unmanaged devices. The emphasis is increasingly on closing long-overlooked gaps before adversaries can exploit them, signaling a new phase in security innovation.
Leave a Reply