Cyberwarfare

U.K. Firms Seek Cybersecurity Service Providers as Digital Transformations Increase Risk of Attacks

Retrieved on: 
Wednesday, August 4, 2021

Cloud migrations, mergers and acquisitions and the growth of application estates have added to the cybersecurity challenges British firms are facing, said Roger Albrecht, co-leader of ISG Cybersecurity.

Key Points: 
  • Cloud migrations, mergers and acquisitions and the growth of application estates have added to the cybersecurity challenges British firms are facing, said Roger Albrecht, co-leader of ISG Cybersecurity.
  • Companies consider risk management central to enterprise leadership and want experienced partners for security solutions and services.
  • Enterprises are also implementing zero-trust architectures, which focus on continuous authentication, to maintain security amid the growth of remote work.
  • The WannaCry ransomware attack against the National Health Service in 2017 revealed the potential risks of cybercrime to organizational reputations.

OpSec Security launches OpSec® Network Intelligence to neutralize bad actor networks that repeatedly abuse the world’s best brands

Retrieved on: 
Tuesday, August 3, 2021

With its third-generation technology and proprietary OpSec ClusterScore, Network Intelligence combs through terabytes of data and instantly identifies which networks are the most valuable targets.

Key Points: 
  • With its third-generation technology and proprietary OpSec ClusterScore, Network Intelligence combs through terabytes of data and instantly identifies which networks are the most valuable targets.
  • Network Intelligence connects bad actor data across the globe, to take down even the toughest networks.
  • Network Intelligence empowers brands to quickly neutralize vast networks of bad actors, and can be implemented simply and easily into a brands protection strategy, Tim Elton, Director of Brand Product Management at OpSec Security stated.
  • Learn more about OpSec Network Intelligence and contact the experts at OpSec to take swift action to protect your brand and your consumers.

Mimecast Joins XDR Alliance as a Founding Member to Drive Open Standards and a Stronger Cybersecurity Ecosystem

Retrieved on: 
Tuesday, August 3, 2021

The alliance is a partnership of leading cybersecurity industry innovators committed to an inclusive and collaborative extended detection and response (XDR) framework and architecture.

Key Points: 
  • The alliance is a partnership of leading cybersecurity industry innovators committed to an inclusive and collaborative extended detection and response (XDR) framework and architecture.
  • We are thrilled to be a founding member and inaugural email security partner in the XDR Alliance, said Jules Martin, vice president ecosystem & alliances at Mimecast.
  • The founding members of the XDR Alliance encourage security vendors to participate in the alliance for the continuous improvement of threat detection, investigation, and response (TDIR) outcomes.
  • The XDR Alliance is a partnership between best-in-class cybersecurity vendors, service providers and other security operations (SecOps) stakeholders.

ISA Cybersecurity and Proofpoint join forces to deliver email “security-as-a-service”

Retrieved on: 
Tuesday, August 3, 2021

TORONTO, Aug. 03, 2021 (GLOBE NEWSWIRE) -- ISA Cybersecurity today announced that it is now delivering Proofpoints industry-leading secure email solutions as a managed service offering.

Key Points: 
  • TORONTO, Aug. 03, 2021 (GLOBE NEWSWIRE) -- ISA Cybersecurity today announced that it is now delivering Proofpoints industry-leading secure email solutions as a managed service offering.
  • ISA Cybersecurity was named Proofpoints Fastest-growing Canadian Regional Partner of 2020 earlier this year, and is recognized as a Proofpoint Trusted Partner, confirming ISA Cybersecuritys reputation of success in working with customers on their Proofpoint implementations.
  • We have years of experience working together to deliver Proofpoints cloud-based DLP and email protection solutions for our customers.
  • ISA Cybersecurity has shown strong commitment and expertise with Proofpoint products, and is the first Proofpoint partner in Canada to offer this type of service.

Rochester Institute of Technology Eaton Cybersecurity SAFE Lab Testing Shows CloudCover’s® CC/B1 CyberSafety PlatformTM Provides “Significant Security Protection” Against Cyberattacks

Retrieved on: 
Tuesday, August 3, 2021

CloudCover, an automated intelligence (AI)-driven cybersecurity platform, today announces the results of the recent testing of its CC/B1 CyberSafetyPlatformTM, conducted by the Rochester Institute of Technologys (RIT) Eaton Cybersecurity SAFE (Security Assessment and Forensic Examination) Lab.

Key Points: 
  • CloudCover, an automated intelligence (AI)-driven cybersecurity platform, today announces the results of the recent testing of its CC/B1 CyberSafetyPlatformTM, conducted by the Rochester Institute of Technologys (RIT) Eaton Cybersecurity SAFE (Security Assessment and Forensic Examination) Lab.
  • The labs assessment shows that the CC/B1 platform provides significant defensive capabilities and successfully defended vulnerable systems against many common cyber threats and attack scenarios.
  • CloudCover engaged RITs SAFE Lab with the primary objective of evaluating the effectiveness of the CC/B1 Platform in stopping cyber criminals from successfully completing cyberattacks.
  • RITs Global Cybersecurity Institute and its Eaton Cybersecurity SAFE Lab are world-class facilities devoted to the education, training, and testing for the next generation of cybersecurity professionals and technologies.

Cado Security Unveils Cloud Memory Forensics For Enhanced Visibility and Context Across Data Breaches

Retrieved on: 
Tuesday, August 3, 2021

Many of today’s sophisticated hackers leverage techniques that run in memory only -- such as fileless malware, rootkits and process hollowing -- which leave no traces when data logs and host information are analyzed. If security teams aren’t able to capture evidence in memory, these attacks are extremely challenging to investigate. The Cado Response platform empowers security teams to investigate such attacks by automating memory capture and processing as soon as malicious activity is detected. Further, the Cado Response platform allows forensics experts to analyze memory alongside other critical data sources including disk information and cloud logs in a single pane of glass so they can easily grasp the full extent of what happened.

Key Points: 
  • With Memory Forensics, security teams gain enhanced visibility and context to identify the root cause of incidents and respond to data breaches faster.
  • By incorporating memory acquisition and processing capabilities directly in our Cado Response platform, security experts gain additional context and visibility into an attackers activities, further empowering them to investigate and respond to breaches at cloud speed.
  • The Cado approach provides security teams with 100% of the data and information they need to respond to breaches faster.
  • By automating data capture and processing across cloud and container environments, Cado Response enables security teams to effectively investigate and respond to cyber incidents at cloud speed.

Legal Cyber Attack Prevention and Recovery Live Webcasts Offered by eMazzanti Technologies and HSBA

Retrieved on: 
Tuesday, August 3, 2021

HOBOKEN, N.J., August 3, 2021 /PRNewswire-PRWeb/ -- eMazzanti Technologies, a specialist in legal cybersecurity , is featured in two upcoming Hawaii State Bar Association (HSBA) webcasts.

Key Points: 
  • HOBOKEN, N.J., August 3, 2021 /PRNewswire-PRWeb/ -- eMazzanti Technologies, a specialist in legal cybersecurity , is featured in two upcoming Hawaii State Bar Association (HSBA) webcasts.
  • The live online sessions will present simple steps to protect client information and to restore business and client trust after an attack.
  • Both sessions will feature Carl Mazzanti, President and Co-founder of eMazzanti Technologies, along with a guest law firm.
  • The first Live Webcast entitled, "Cyber Attack Prevention: Simple Steps to Safeguard Client Information," is scheduled Wednesday, August 4, 2021, 12:00 p.m. to 1:00 p.m. HAST.

Princeton Identity Announces Partnership with EPAM to Develop High-Security Remote Work Solutions

Retrieved on: 
Tuesday, August 3, 2021

Together, the companies will address the need for solutions that provide secure use of confidential information as it is accessed by a remote workforce.

Key Points: 
  • Together, the companies will address the need for solutions that provide secure use of confidential information as it is accessed by a remote workforce.
  • The Princeton Identity / EPAM collaborative effort is uniquely suited to deliver solutions compliant with industry best practices and reliant on proven, top-tier technologies.
  • "Since our inception, Princeton Identity has been at the forefront of expanding the markets and applications for biometric identity solutions," said Bobby Varma, CEO of Princeton Identity.
  • Through Princeton Identity's partnership with EPAM, PI's industry-leading iris and face identification technology will provide the gateway through which remote employees identify themselves to corporate networks that rely on EPAM's enterprise cybersecurity solutions.

Secmation Receives $1.5M SBIR Phase II Award for Anneal Cybersecurity

Retrieved on: 
Tuesday, August 3, 2021

RALEIGH, N.C., Aug. 3, 2021 /PRNewswire/ --Secmation, a leading small business in the fields of Cybersecurity Research and Development and Product Development, received a $1.5M Phase II Small Business Innovation Research (SBIR) award in December 2020.

Key Points: 
  • RALEIGH, N.C., Aug. 3, 2021 /PRNewswire/ --Secmation, a leading small business in the fields of Cybersecurity Research and Development and Product Development, received a $1.5M Phase II Small Business Innovation Research (SBIR) award in December 2020.
  • The SBIR was awarded for the purpose of developing the Anneal, an advanced cybersecurity solution for embedded systems.
  • The goal of the Phase II SBIR is to design, develop, implement, test, and demonstrate an innovative cybersecurity solution incorporating a real-time embedded hypervisor with other hardware protections.
  • Find out more about Secmation at our website: www.Secmation.com
    Find out more about the award here: https://www.sbir.gov/node/1921087

TrackTik, Innovative Security Workforce Management Company, Launches Data Lab to Help Security Companies Transform their Data into Key Business Insights

Retrieved on: 
Tuesday, August 3, 2021

MONTREAL, Aug. 3, 2021 /PRNewswire/ - TrackTik , an innovative and growing security workforce management software provider that helps the physical security industry deliver security services, today announced the launch of Data Lab.

Key Points: 
  • MONTREAL, Aug. 3, 2021 /PRNewswire/ - TrackTik , an innovative and growing security workforce management software provider that helps the physical security industry deliver security services, today announced the launch of Data Lab.
  • Data Lab helps security firms recognize the tremendous value of their data which is crucial in streamlining security operations.
  • With direct access to data, Data Lab helps security firms analyze, activate, and report on that data to make the kind of critical decisions that drive their business forward.
  • Data Lab was conceived and built on a deep understanding of today's advanced reporting data needs in the security industry.