Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/4/2021
03:15 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cerberus Sentinel Announces Acquisition of Alpine Security

US cybersecurity services firm expands compliance and penetration testing teams

SCOTTSDALE, Ariz., Dec. 29, 2020 (GLOBE NEWSWIRE) -- Cerberus Cyber Sentinel Corporation (OTC: CISO), a cybersecurity consulting and managed services firm based in Scottsdale, Ariz., announced that it has acquired Alpine Security, a St. Louis, Missouri-based cybersecurity services provider.

Under the terms of the acquisition, Alpine will become part of Cerberus Sentinel and will continue to focus on providing integrated risk managed services to a diverse set of national customers. With the new organizational structure, Alpine president and founder Christian Espinosa will take on a strategy role within Cerberus Sentinel.

“Alpine is an excellent fit for the Cerberus portfolio of companies,” said David Jemmett, CEO and founder of Cerberus Sentinel. “The demand for quality compliance, training, and penetration testing talent continues to grow, and we are pleased to have them join us.”

“Alpine Security has reached the point in our journey where it makes sense to expand our impact by joining forces with a cybersecurity organization aligned with our purpose and values,” said Espinosa. “Our purpose is to reduce cybersecurity risk for our clients. Our integration with Cerberus enhances and expands our cybersecurity capabilities, ensuring we are able to meet the growing demands of our clients.”

Alpine will continue to be based in St. Louis, and its compliance team will add to the experienced Cerberus Sentinel team led by chief compliance officer Baan Alsinawi. The penetration testing team will be integrated into the existing capabilities crew at Cerberus Sentinel, and it will continue to specialize in medical devices, addressing the expanding demand from healthcare clients.

“Alpine will further expand our expertise and offerings in the cybersecurity field,” Jemmett added. “They are talented and share a culture of excellence that we strive to bring to each client engagement.”

Financial terms of the acquisition were not disclosed.

About Cerberus Sentinel

Cerberus Sentinel is a U.S. provider of consulting and managed services, focused solely on cybersecurity. The company seeks to expand by acquiring world-class cybersecurity talent and utilizes the latest technology to create innovative solutions that protect the most demanding businesses and government organizations against continuing and emerging security threats. For more information, visit https://www.cerberussentinel.com/. Follow us on LinkedIn and Twitter.

Safe Harbor Statement

This news release contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Statements including words such as "believes," "expects," "anticipates," "intends," "estimates," "plan," "will," "may," "look forward," "intend," "guidance," "future" or similar expressions are forward-looking statements. Because these statements reflect Cerberus Sentinel's current views, expectations and beliefs concerning future events, these forward-looking statements involve risks and uncertainties. Investors should note that many factors, as more fully described under the caption "Risk Factors" and elsewhere in Cerberus Sentinel's Form 10-K, Form 10-Q and Form 8-K filings with the Securities and Exchange Commission and as otherwise enumerated herein, could affect Cerberus Sentinel's future financial results and could cause actual results to differ materially from those expressed in such forward-looking statements. The forward-looking statements in this press release are qualified by these risk factors. These are factors that, individually or in the aggregate, could cause the Cerberus Sentinel's actual results to differ materially from expected and historical results. You should not place undue reliance on any forward-looking statements, which speak only as of the date they are made. We assume no obligation to publicly update any forward-looking statements, whether as a result of new information, future developments or otherwise.

Contact:
Charles J. Zigmund, Vice President
Cerberus Sentinel
617-838-4183
[email protected]

Cathy Morley Foster
Eskenzi PR
925-708-7893
[email protected]

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22847
PUBLISHED: 2021-01-22
Hyweb HyCMS-J1's API fail to filter POST request parameters. Remote attackers can inject SQL syntax and execute commands without privilege.
CVE-2021-22849
PUBLISHED: 2021-01-22
Hyweb HyCMS-J1 backend editing function does not filter special characters. Users after log-in can inject JavaScript syntax to perform a stored XSS (Stored Cross-site scripting) attack.
CVE-2020-8567
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
CVE-2020-8568
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that conta...
CVE-2020-8569
PUBLISHED: 2021-01-21
Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, ...