CSIRT

BRI Unveils Robust Cybersecurity Measures to Safeguard Customer Data

Retrieved on: 
月曜日, 4月 8, 2024

Various forms of fraud aim to steal confidential data of bank customers, so that fraudsters can carry out illegal transactions.

Key Points: 
  • Various forms of fraud aim to steal confidential data of bank customers, so that fraudsters can carry out illegal transactions.
  • Although data protection from the customer side is very important, BRI also continues to ensure that it has data protection and governance that refers to international standards that are industry references.
  • BRI reveals its latest initiatives to combat cybersecurity risks and protect customer data.
  • Regarding technology, BRI adopts a comprehensive approach based on the NIST framework (Identify, Protect, Detect, Respond) to minimize the risk of customer data breaches.

Cloud Range Launches First Cyber Incident Commander Training

Retrieved on: 
火曜日, 3月 5, 2024

Cloud Range , the industry’s leading cyber range solution to reduce exposure to cyber risk across the organization, today announced the launch of its new training program, Cybersecurity Incident Commander Training.

Key Points: 
  • Cloud Range , the industry’s leading cyber range solution to reduce exposure to cyber risk across the organization, today announced the launch of its new training program, Cybersecurity Incident Commander Training.
  • This new training by Cloud Range is dedicated to the Incident Commander who oversees the SOC team when an incident or event occurs, such as a ransomware attack, data breach, or any other cybersecurity incident.
  • We realized there was a need for training that helps the Incident Commander lead the team and manage an incident,” said Debbie Gordon, CEO, Cloud Range.
  • Learn more and sign up for the Cloud Range Incident Commander Training, valued at $499 and offered at no cost for a limited time here .

Team Cymru Releases State of Attack Surface Management Report

Retrieved on: 
火曜日, 5月 31, 2022

LAKE MARY, Fla., May 31, 2022 (GLOBE NEWSWIRE) -- Team Cymru , a leader in digital risk management solutions, has released the findings from their " State of Attack Surface Management " report.

Key Points: 
  • LAKE MARY, Fla., May 31, 2022 (GLOBE NEWSWIRE) -- Team Cymru , a leader in digital risk management solutions, has released the findings from their " State of Attack Surface Management " report.
  • According to Frost & Sullivan , attack surface management (ASM) solutions sit loosely in the vulnerability management market, which is expected to become a $2.51 billion market by 2025 as organizations look for scalable solutions to secure their environments.
  • To highlight such obstacles that security professionals are facing with their existing ASM solutions, Team Cymru surveyed 440 security practitioners in the U.S. and Europe.
  • "This report offers cyber risk stakeholders a basis for making the changes necessary to improve their ASM program," said Rabbi Rob Thomas, CEO of Team Cymru.

Team Cymru Announces Pure Signal™ Orbit, a New Attack Surface Management Solution to Transform the Way Organizations Manage Digital Business Risk

Retrieved on: 
木曜日, 4月 14, 2022

By enriching cyber threat and digital risk information with business metrics, Pure Signal Orbit uniquely enables organizations to make better risk-based decisions in real-time, protecting themselves financially from direct threats and third-party risks.

Key Points: 
  • By enriching cyber threat and digital risk information with business metrics, Pure Signal Orbit uniquely enables organizations to make better risk-based decisions in real-time, protecting themselves financially from direct threats and third-party risks.
  • "The current approach to Attack Surface Management falls short of what modern organizations need: contextual awareness," said Rabbi Rob Thomas, CEO of Team Cymru.
  • "Organizations are increasingly suffering from a lack of visibility, threat intelligence sensory overload, and suffocating from ineffective tools.
  • The goal of Orbit is to enable all organizations to holistically manage digital business risks."

[redacted] Unveils TIDE to Automate and Scale Delivery of Layered Defense and Orchestrated Incident Response

Retrieved on: 
水曜日, 2月 2, 2022

As a major expansion of its cloud-native platform that scales delivery of [redacted]s layered defense services, TIDE automates the technical analysis of all files and immediately shares results with clients.

Key Points: 
  • As a major expansion of its cloud-native platform that scales delivery of [redacted]s layered defense services, TIDE automates the technical analysis of all files and immediately shares results with clients.
  • TIDE enhances the platform by providing one collaborative environment for both clients and [redacted] team members to upload any file for automated technical analysis.
  • TIDE illustrates how were continually investing in the [redacted] platform to scale our high-touch service delivery across all practices.
  • TIDE is currently available to [redacted] customers for independent research and analysis, and to consume Incident Response results.

Team Cymru Announces Valuable Enhancement to its Global DDoS Mitigation Collaborative

Retrieved on: 
水曜日, 1月 19, 2022

ORLANDO, Fla., Jan. 19, 2022 /PRNewswire-PRWeb/ --Today, Team Cymru announced a valuable update to its Unwanted Traffic Removal Service (UTRS) , which is a global DDoS mitigation collaborative, comprised of more than a thousand network operators around the world.

Key Points: 
  • ORLANDO, Fla., Jan. 19, 2022 /PRNewswire-PRWeb/ --Today, Team Cymru announced a valuable update to its Unwanted Traffic Removal Service (UTRS) , which is a global DDoS mitigation collaborative, comprised of more than a thousand network operators around the world.
  • UTRS notifies ISPs and other network operators which traffic to block in the event of a DDoS attack on any one of its global members' networks.
  • When only one Internet service provider (ISP) null routes (or removes) incoming DDoS traffic, the attack is not stopped.
  • The UTRS 2.0 enhancement allows members to stop DDoS attacks with more precise targeting of only the malicious traffic.

APWG Report: Phishing Smashes All Previous Records in Q3, 2021; Phishing Attacks Double Since Early 2020

Retrieved on: 
月曜日, 11月 22, 2021

Overall, the number of phishing attacks has doubled from early 2020.

Key Points: 
  • Overall, the number of phishing attacks has doubled from early 2020.
  • APWG Senior Research Fellow Greg Aaron noted, "The number of phishing sites being reported to APWG is now ten times what it was ten years ago, back in late 2011.
  • Phishing has not decreased as the online environment has evolved - it remains a dangerous, effective, and profitable activity for cybercriminals."
  • Attacks against financial institutions and payment providers continued to be numerous, and representeda combined 34.9 percent of all attacks.

Team Cymru Announces Acquisition of Attack Surface Management Provider Amplicy

Retrieved on: 
火曜日, 11月 16, 2021

Team Cymru today announced that it has acquired Amplicy , a market-leading company and technology disruptor in global attack surface and vulnerability management.

Key Points: 
  • Team Cymru today announced that it has acquired Amplicy , a market-leading company and technology disruptor in global attack surface and vulnerability management.
  • We are honored to bring Amplicy into the Team Cymru family,'' commented Rabbi Rob Thomas, CEO of Team Cymru.
  • We are delighted to be a part of the Team Cymru family, a leader in cyber intelligence, stated Ronen Carmona, CEO of Amplicy.
  • Established in 2020, Amplicy is a leading provider of attack surface management solutions to commercial end markets.

Survey Reveals Gap in Threat Hunting Leaving Organizations Repeatedly Exposed to Cyber Attacks

Retrieved on: 
木曜日, 8月 12, 2021

"This survey looks at the threat intelligence and threat hunting challenges facing organizations with emphasis on the role of the analyst," explained Larry Ponemon, Founder of the Ponemon Institute.

Key Points: 
  • "This survey looks at the threat intelligence and threat hunting challenges facing organizations with emphasis on the role of the analyst," explained Larry Ponemon, Founder of the Ponemon Institute.
  • The survey reveals organizations acknowledge they are suffering, not just from disruptive cyber-attacks, but from repeat offenders, and for many victim organizations, complete remediation has not been possible.
  • Threat hunting, particularly external threat hunting, has empowered more sophisticated security organizations to identify and block impending attacks, augment threat detection, and achieve comprehensive remediation.
  • Sixty-one percent acknowledged that threat intelligence could not keep up with the changes in how threat actors attack their organizations.