Augusta, Ga., Establishes Itself as Cybersecurity Hub

An Atlanta-based technology organization expects to bring more national attention to Augusta’s growing cybersecurity industry through the formation of a trade association.The Technology Asso­cia­tion of Georgia reported today that the new trade group, to be based in Atlanta and called the National Tech­no­logy Security Coali­tion, will serve as an umbrella organization in the fight against the “digital or physical disruption to information systems of U.S. companies, governmental authorities and individuals.”

Spotlight

Cygilant

We are passionate about helping organizations of all sizes build a comprehensive enterprise-class security program. Our goal is to be the #1 customer-centric organization in the IT Security industry. Acting as an extension of our customers’ IT teams, Cygilant, a pioneer in hybrid security as a service, provides continuous security operations based on best-of-breed technology at a fraction of the cost of alternate solutions. Cygilant is a trusted advisor to organizations that need to improve their IT security and compliance posture and protect against cyber threats and vulnerabilities.

OTHER ARTICLES
Software Security

GRC Security 2024: Notable Cybersecurity Events on the Horizon

Article | March 28, 2024

Network with the best of the best cybersecurity experts at the top cybersecurity events in 2024 with cybersecurity conferences. Keep up with global security trends, challenges and best practices. Contents 1. Setting the Stage: Cyber Security 2024 Events 2. A Sneak Peek: 2024’s Cybersecurity Events and Conferences 2.1 Cyber Security and Cloud Expo 2.2 RSA Conference 2024 2.3 InfoSec World 2.4 Nordic IT Security Event 2.5 Cyber Security World Asia 2.6 Cybersecurity Expo 2.7 Infosecurity Europe 2.8 Gartner Security & Risk Management Summit 2.9 CS4CA 2.10 2024 Cybersecurity Summit 3. The 2024 Expedition: Cybersecurity and Data Protection Are you feeling left out in the cybersecurity domain, where changes happen every second? Fear not! Attending cybersecurity events in 2024 is your golden ticket to staying ahead of the curve. 1. Setting the Stage: Cyber Security 2024 Events These cybersecurity events in 2024 are not just about listening to experts but are a treasure trove of networking opportunities, sharing ideas, and gaining insights that would otherwise require substantial effort and time for research. From the Cyber Security and Cloud Expo to the CS4CA event, these gatherings are intendedto provideprofessionals with the skills and resourcesthey need to elevate their cybersecurity approach. So, mark your calendars for 2024 and prepare to experience a year of learning and growth in cybersecurity! Be part of the cybersecurity community that’s active locally and nationally at events across the globe. Remember, knowledge is power, and these events are your powerhouse. Don’t miss out! 2. A Sneak Peek: 2024’s Cybersecurity Events and Conferences Are you ready to dive into the ocean of cybersecurity knowledge? Buckle up! The year 2024 is packed with a myriad of cybersecurity events that are just waiting for your participation. These events are your one-stop-shop for everything cybersecurity, from GRC to the latest threats and defenses. So, grab this opportunity to learn from the best, network with peers, and stay updated in this fast-paced field. Get ready to explore, learn, and grow in the world of cybersecurity. Your journey starts here! 2.1 Cyber Security and Cloud Expo The Cyber Security and Cloud Expo, RAI Amsterdam, is a must-attend event for cybersecurity enthusiasts. Here's a brief overview: Who it's for: The event is expected to attract over 7,000 attendees globally, including Chief Information Security Officers, Chief Information Officers, Chief Security Architects, Heads of Information Security, Chief Compliance Officers, Privacy Officers, and Data Protection Specialists. Specialization: The event covers areas such as: Zero Trust Threat Detection and Response Cyber Security Landscape Identity and Access Management Application Security Hybrid Cloud strategies Cloud Adoption Cloud Transformation Data Security Disaster Recovery Strategies Smart Cloud Security When and where: The event will take place at RAI, Amsterdam, on 1-2 October 2024. Agenda: More than 150 speakers will share their incomparable business knowledge and firsthand experiences at the conference through presentations, knowledgeable panel discussions, and fireside talks. Notable speakers: Some of the notable speakers include: Maikel Ninaber, Director, Cyber and Intelligence (C&I) at Mastercard Arda Çirpili, Cyber Security Project Manager & Business Analyst at Rabobank Piergiorgio Ladisa, Security Researcher PhD Student at SAP Labs France René Pluis, Global Cyber Security Remediation Manager at Philips Martin Sandren, IAM Product Lead at IKEA Networking opportunities: During the VIP Networking Party, attendees will have the opportunity to interact with prominent people and have deep and important talks. GRC in cybersecurity: The event will cover topics pertaining to governance, risk, and compliance (GRC) in cybersecurity. It will also include discussions on data security and protection, identity, privacy, compliance, GDPR and other regulations, and legal implications of cybersecurity breaches. This event is a great opportunity to learn about the latest advancements in cybersecurity and cloud computing and to network with industry professionals. 2.2 RSA Conference 2024 The RSA Conference 2024 is a must-attend event for cybersecurity professionals. Here's a snapshot of what you can expect: Who it's for: The conference is crafted for cybersecurity professionals who seek to stay ahead of the curve in the cybersecurity space. Specialization: Attendees and speakers specialize in various areas of cybersecurity, including threat intelligence, infrastructure security, and more. When and where: The conference will take place at the San Francisco MosconeCenter from May 6 – 9, 2024. Agenda: The conference will feature expert-led sessions, keynotes, in-depth learning labs, and more, covering the latest trends, threats, and solutions in cybersecurity. Notable speakers: Some of the keynote speakers include: Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA) Vijay Bolina, CISO Head of Cybersecurity Research at Google DeepMind Adam Cohen,Senior Director and Associate General Counsel – Cybersecurity at Capital One Michael Sentonas,President of CrowdStrike Networking opportunities: The conference provides numerous opportunities for networking, such as interactive sessions and an expo.Here, the attendees can connect with industry vendors, meet product experts, discuss challenges, and demonstrate the latest solutions. GRC in cybersecurity: While specific sessions on governance, risk management, and compliance (GRC) are not mentioned in the available details, the conference typically covers a wide range of topics, and GRC is a crucial aspect of cybersecurity. This event promises to be a rich learning experience, offering insights into the art of the possible in the dynamic field of cybersecurity. 2.3 InfoSec World InfoSec World 2024 is one of the most sought-after information security conferences. It is a convergence of cybersecurity experts and thought leaders, shaping the future of cybersecurity through insightful discussions and innovative solutions. Here’s its overview: Who it's for: The event is for cybersecurity professionals, including CISOs, CTOs, COOs, CIOs, Developers, IAM Architects/Engineers, IAM Directors, Information Security Officers, IS/IT Directors/Managers, Product Managers, Security Architects, and Security Infrastructure Engineers. Areas of Specialization: The attendees and speakers specialize in various areas of cybersecurity, including Application Security Cloud Security Cyber Crime Data Protection DevSecOps Governance, Regulation and Compliance (GRC) Date, Time, and Place: The event will take place from September 23-25, 2024, at Disney’s Coronado Springs Resort, Lake Buena Vista, Florida. Agenda and Topics: The event will feature world-class conference programming, enlightening keynotes, and a vibrant expo floor featuring the latest security solutions. Topics covered include cybercrime, data protection, DevSecOps, governance, regulation and compliance (GRC), and more. Notable Speakers: Some of the notable speakers include: Scott Shapiro, Founding Director of the Yale CyberSecurity Lab Rachel Wilson, Managing Director and Head of Cybersecurity of Morgan Stanley Wealth Management Iranga Kahangama, Assistant Secretary for Cyber, Infrastructure, Risk & Resilience of the U.S. Department of Homeland Security Networking Opportunities:It provides a network of over 2,500 security professionals, offering ample opportunities for networking. GRC in Cybersecurity:It covers topics related to governance, regulation, and compliance (GRC) in cybersecurity. This event is a great opportunity for cybersecurity professionals to learn, network, and stay updated with the latest trends in the industry. 2.4 Nordic IT Security Event Audience: The event is primarily for cybersecurity professionals who are keen on staying updated with the latest developments in the field. It's a platform for seasoned industry professionals to discuss business-critical topics. Specialization: The attendees and speakers at this event come from various specializations within cybersecurity. This includes areas like threat intelligence, infrastructure security, and many more. Date, Time, and Venue: The event is scheduled to take place on May 23, 2024, at the Stockholm Waterfront Congress Center. Agenda: The conference will feature expert-led sessions, keynotes, and in-depth learning labs. These will cover the latest trends, threats, and solutions in cybersecurity. Speakers: The event will host several notable speakers,including: David Jacoby, an Ethical Hacker with over 25 years of experience Mikko Hypponen, a globally recognized cybersecurity expert and Chief Research Officer for With Secure Arnaud Wiehe, a thought leader in cybersecurity who has served as a CISO for multiple years Patric J.M. Versteeg, a visionary executive passionate about revolutionizing information and cybersecurity management Nir Chervoni, the Head of Data Security at Booking.com Networking Opportunities: The conference provides numerous networking opportunities. This includes interactive sessions and an expo where attendees can connect with industry vendors, meet product experts, discuss challenges, and demo the latest solutions. GRC in Cybersecurity: While specific sessions on governance, risk management, and compliance (GRC) are not mentioned in the available details, the conference typically covers a wide range of topics, and GRC is a crucial aspect of cybersecurity. This event is a great opportunity for cybersecurity professionals to learn, network, and stay updated with the latest trends in the field. It's a platform that brings together the best minds in the industry to discuss and address the challenges faced by global communities in the 21st century. 2.5 Cyber Security World Asia The Cyber Security World Asia is one of the cybersecurity conferences to attend in 2024 for these reasons: Audience: The event is for professionals, business leaders, and cybersecurity enthusiasts. Specialization: Attendees and speakers specialize in various areas of cybersecurity, including: Zero trust Data protection DevSecOps Date, Time, and Place: The event will take place on 9-10th October 2024 at Marina Bay Sands, Singapore. Agenda and Topics Covered:Keynote addresses, panel discussions, interactive workshops, and networking opportunities will all be included in the conference. It will also cover the newest developments, difficulties, and tactics in cybersecurity. Networking Opportunities: The event offers unique opportunities for networking and knowledge exchange, with the potential to create partnerships and collaborate with peers. GRC in Cybersecurity: GRC (Governance, Risk, and Compliance) is a crucial aspect of cybersecurity. It aligns IT goals with business objectives while effectively managing cyber risks and achieving regulatory needs. This event is a must-attend for anyone looking to stay updated on the latest in cybersecurity and network with industry professionals. 2.6 Cybersecurity Expo Who is the event for: The Cybersecurity Expo is intended for a broad spectrum of attendees who are interested in the latest developments in the field. It includes cybersecurity professionals, business leaders, and enthusiasts. Areas of Specialization: The attendees and speakers at the event specialize in various areas of cybersecurity. This includes but is not limited to zero trust security models, data protection strategies, and DevSecOps practices. Date, Time, and Place: The event is scheduled to take place on 31st October 2024. The venue for the event is the QEII Centre, located in Broad Sanctuary, London, SW1P 3EE. Agenda and Topics Covered:Plenty of different activities, such as interactive workshops, panel discussions, and keynote addresses, will be offered during the conference. These sessions will cover a wide range of topics, providing insights into the latest trends, challenges, and strategies in cybersecurity. Notable Speakers: The event will feature a lineup of industry leaders from various organizations. Some of the confirmed speakers include representatives from Northrop Grumman, Counter Terrorism Policing, Jacobs, CGI, Matchtech, Mott MacDonald, and QinetiQ. Networking Opportunities: The Cybersecurity Expo offers attendees unique opportunities for networking and knowledge exchange. This includes the potential to create partnerships and collaborate with peers from various sectors within the cybersecurity industry. GRC in Cybersecurity: Governance, Risk, and Compliance (GRC) is a crucial aspect of cybersecurity. It involves aligning IT goals with business objectives, managing cyber risks, and meeting regulatory needs. GRC in cybersecurity is about ensuring that an organization’s IT systems and processes are aligned with its business objectives, managing cyber risks, and meeting all relevant industry and government regulations. This event is a must-attend for anyone seeking to stay updated on the latest in cybersecurity and network with industry professionals. 2.7 Infosecurity Europe The Infosecurity Europe is one of the best security conferences and events in the northern hemisphere for these reasons: Who the event is for: Infosecurity Europe is for everyone in information security, from experts and engineers to innovators and industry leaders. Areas of specialization: The attendees and speakers specialize in various areas of information security, including cybersecurity knowledge, infosec tools, and complex threat environments. Date, time, and place: The event will take place from 4-6 June 2024 at ExCeL London. Agenda and topics covered: The conference program covers a wide range of topics in information security. It includes keynote sessions, panel discussions, fireside chats, and interviews. The 2024 conference program is yet to be announced. Networking opportunities: The event provides opportunities to connect with emerging and established international suppliers worldwide. It also allows attendees to grow new relationships through diverse networking opportunities. GRC in cybersecurity: While the specific topics for the 2024 event are not yet announced, GRC (Governance, Risk, and Compliance) is a crucial aspect of information security and is likely to be covered. 2.8 Gartner Security & Risk Management Summit The Gartner Security and Risk Management Summit is a must-attend cybersecurity summit for security and risk management leaders. Here's what you need to know: Who it's for: The summit is designed for Chief Information Security Officers, Security Operations, Risk Management Leaders, IAM Leaders, Security Architects, Technical Professionals, Infrastructure Security Leaders, and Data and Application Security Leaders. Specialization: The attendees and speakers specialize in cybersecurity, risk management, infrastructure security, application and data security, and more. When and where: The summit will take place on June 3 – 5, 2024, in National Harbor, MD. Agenda: The summit will cover topics like: the impact of Generative AI on security cybersecurity value drivers infrastructure security cybersecurity board reporting Networking opportunities: The summit provides opportunities for networking through roundtables, peer conversations, end-user case studies, and social engagements. There's also a dedicated program called the CISO Circle for chief information security officers. It will cover keynote speaker speeches, Magic Quadrant sessions and market guides, solution provider sessions, workshops, midsize enterprise programs, and diversity, equity, and inclusion sessions. GRC in cybersecurity:The summit will cover a broad range of topics in cybersecurity, which may include Governance, Risk, and Compliance (GRC). This event is a great opportunity to learn from leading experts, share experiences, and gain insights into the latest trends and strategies in cybersecurity and risk management. 2.9 CS4CA The CS4CA is one of the top security conferences in 2024. It focuses on the aspects mentioned in the following: Audience: The CS4CA event is designed for IT & OT security professionals from critical infrastructure sectors across the globe. Specialization: The attendees and speakers specialize in cybersecurity for critical assets, with a focus on industries like Energy, Agriculture, Oil & Gas, Manufacturing, Aviation, Transport, and more. Date, time, and place: The CS4CA event is scheduled to take place at different locations throughout 2024. These include: Houston, Texas (March 26th - 27th) Singapore (April 3rd - 4th) Calgary, Canada (June 11th - 12th) London, UK (September 24th - 25th) Agenda and topics covered: The event will address key challenges in cybersecurity, such as managing risks, ensuring cyber resilience, and implementing effective governance, risk, and compliance (GRC) strategies. Notable speakers: The event features a line-up of expert speakers, including: John Ellis (CISO, Bupa) Manjunath Pasupuleti (CISO, ENNOVI) Roshan Daluwakgoda (CISO, Eastern Health) Andrew Ginter (VP Industrial Security, Waterfall Security Solutions) Networking opportunities: The event provides ample opportunities for networking, learning, and collaboration among senior IT and OT stakeholders. GRC in cybersecurity: The event covers the importance of a good Governance, Risk, and Compliance (GRC) strategy in overcoming cybersecurity risks. This event is a must-attend for anyone looking to enhance their knowledge and network in the field of cybersecurity. 2.102024 Cybersecurity Summit The 2024 Cybersecurity Summit is going to be one of the most attended information security events and conferences. Here is an overview of it: Who the event is for: The summit is for cybersecurity professionals, from novices to experts, looking to acquire practical knowledge and fresh perspectives. Areas of specialization: The attendees and speakers are specialized in various areas of cybersecurity, including: Cyber threat intelligence (CTI) Digital trust Audit Governance Privacy Security Emerging technologies Date, time, and place: The summit is scheduled to take place from January 29 – February 5, 2024. The event will be held in Washington, DC, and also virtually. Agenda and topics covered: The summit will cover a wide range of topics, challenging traditional CTI assumptions and offering new perspectives. Networking opportunities: The summit provides an excellent platform for networking, bringing together cybersecurity executives and CISOs from all corners of the country. GRC in cybersecurity: The sources do not specify if the event will cover governance, risk management, and compliance (GRC) in cybersecurity. This event is a must-attend for anyone looking to stay updated in the ever-evolving field of cybersecurity. 3. The 2024 Expedition: Cybersecurity and Data Protection As we set sail on the 2024 expedition, the cybersecurity scene is more dynamic than ever. The rise of Generative AI (GenAI) is transforming operational practices, offering both challenges and opportunities. Ransomware 2.0, with its double extortion and data theft, is introducing a new level of complexity. The expanding attack surface due to the exponential growth of connected devices is amplifying vulnerabilities. Preventing cyber security incidents with the help of robust red teaming and pentesting has become more important than ever before. Amidst these challenges, the importance of a comprehensive cybersecurity strategy that aligns with company objectives and regulatory compliance remains paramount. The journey ahead is challenging, but with vigilance and adaptability, we can navigate the evolving cybersecurity frontier. Stay tuned for the notable cybersecurity events in 2024 with rich global cyber expertise.

Read More
Data Security

What Is Mac Malware, How It Penetrates Your Device, and How to Get Rid of It

Article | February 12, 2024

I would like to share my experience with you and talk about viruses created for Mac devices and how to deal with them. You may say that there are no Mac viruses as Apple does not allow it. However, I may say that there are plenty of nasty malware types like adware that open new tabs in your browser, redirect you to irrelevant pages and show numerous popups. Yes, these are not real viruses. Adware like Search Marquis cannot clone itself and infect other connected devices. It cannot encrypt your files or cause any other harm. Its activity is related only to web redirects and excessive advertising. At the same time, who knows which rogue websites adware may land you on next time. It may happen that you end up on a phishing website where cyber crooks harvest personal information that leads to identity theft. Fake antiviruses I strongly recommend removing all adware that penetrated your device. But there is a problem here. If you want to get rid of Mac adware, you cannot quickly find a solution. If you go to google and search there how to get rid of Mac malware, you will see that all top results offer you to buy and install some shady software. In reality, these Mac antiviruses do nothing, as we know that the Apple ecosystem does not allow apps to access other apps' data. No antivirus can really scan and check your files. How to remove Mac malware Solution 1: If your system is infected with adware and you do not know how to get rid of it, you may try to call Apple and ask what to do. You can find their phone number here: support.apple.com/en-gb/HT201232#us-ca. Solution 2: Another option is to try your luck on Apple communities. Thousands of tech enthusiasts help uses with their problems there. Here is a sample thread: discussions.apple.com/thread/8226644. Solution 3: There are other options too. Apple operating systems are not very difficult to use, and any person can remove adware manually by going through step-by-step guides posted on numerous malware removal websites. Here is a guide by BitAdvisors.com on how to remove Search Marquis malware. Most rogue software works by exploiting bugs and vulnerabilities in your computer's operating system. And macOS has its own bugs too. To fix these vulnerabilities, Apple periodically releases operating system updates. To date, macOS has not proved attractive enough for cybercriminals and evil developers to flood it with malware. Protection tips To stays away from any surprises, it is recommended to update your OS as well as all apps installed regularly. You should never install apps from unofficial app stores not controlled by Apple. One of the ways for adware to penetrate your Mac computer is through bundled installs. You download and install a very useful app that is often free, but in reality, you get several apps. People never read user agreements written in small print. There it can be noted that you agree to install additional tools and provide some rights to them. Whenever you install something, be careful and read user agreements, and do not miss additional unnecessary software. Do not install any software without urgent necessity. Any additional software widens the attack surface. To be able to do bad things, current Mac malware requires users to perform some actions – grant rights. So, be careful with allowing any app to access your data, change settings, etc. One more wise move is to make backups. iCloud or ordinary flash drives will help you not lose your data in case of a system glitch or malware attack. Final advice - do use VPNs. Your connection will be encrypted, and attackers will not be able to find where you are actually located or what data your traffic consists of.

Read More
Identity Management

As Ransomware Surge Continues, Where Next for Government?

Article | February 14, 2024

Global leaders want to carve out specific areas of critical infrastructure to be protected under international agreements from cyber-attacks. But where does that leave others? There are ‘four or five steps you could take that could significantly mitigate this risk,’ Falk said. These are patching, multifactor authentication and all the stuff in the Australian Signals Directorate's Essential Eight baseline mitigation strategies. …” Back in April of this year, a BBC News headline read, "The ransomware surge ruining lives." And that was before the cyber-attacks on critical infrastructure sectors like Colonial Pipeline, meat-processing giant JBS, the Irish Health Service and so many others. And when President Biden met with Russian President Putin last month in Geneva, he declared that certain critical infrastructure should be “off-limits” to cyber-attacks. “We agreed to task experts in both our countries to work on specific understandings about what is off-limits,” Biden said. “We’ll find out whether we have a cybersecurity arrangement that begins to bring some order.” As an initial positive step forward, this cyber defense policy makes sense. In fact, most global experts applaud these moves and efforts to better protect and clarify international crimes in cyberspace. Previous administrations going back to George W. Bush have taken aggressive steps to ensure critical infrastructure is protected in the U.S. and around the world through actions involving people, process and technology, both offline and online. The 16 critical infrastructure sectors identified by DHS/CISA can be found here. Still, many questions remain regarding this new policy: Will all global governments actually agree on the wording? More importantly, even if they do agree, how will the agreements be enforced? Also, what happens if some countries continue to allow criminals to attack these critical infrastructure sectors from their soil? And my main question goes further: Even if all of these agreements and actions are 100 percent agreed upon and enforced, which most people don’t believe will happen, does this imply that every organization not covered under these 16 critical infrastructure sectors can be openly attacked without a response? Is this giving into cyber criminals for everyone else? For example, would K-12 schools or small businesses be “fair game” and not off limits? Could this actually increase attacks for any organization not considered on the CISA list? No doubt, some will say that schools are a part of government, and yet there are private schools. In addition, if we do cover all others somehow, perhaps as a supplier of these 16 sectors, doesn’t that make the “off-limits” list essentially meaningless? Essentially, where is the line? Who is included, and what happens when some nation or criminal group crosses the line? These questions became more than an intellectual thought exercise recently when the Kaseya ransomware attack impacted more than 1,500 businesses, without, in their words, impacting critical infrastructure. CBS News reports, “Still, Kaseya says the cyber-attack it experienced over the July 4th weekend was never a threat and had no impact on critical infrastructure. The Russian-linked gang behind the ransomware had demanded $70 million to end the attack, but CNBC reported that the hackers reduced their demands to $50 million in private conversations. "The Miami-based company said Tuesday that it was alerted on July 2 to a potential attack by internal and external sources. It immediately shut down access to the software in question. The incident impacted about 50 Kaseya customers.” OTHER RECENT RANSOMWARE NEWS Meanwhile, in a bit of a surprise, ransomware group REvil disappeared from the Internet this past week, when its website became inaccessible. As Engadget reported, “According to CNBC, Reuters and The Washington Post, the websites operated by the group REvil went down in the early hours of Tuesday. Dmitri Alperovitch, former chief technology officer of the cyber firm CrowdStrike, told The Post that the group's blog in the dark web is still reachable. However, its critical sites victims use to negotiate with the group and to receive decryption tools if they pay up are no longer available. Visitors to those websites now see a message that says ‘A server with the specified host name could not be found.’" CNBC reported: “There are 3 main possibilities for the criminal gang’s disappearance — each of which carries good and bad news for U.S. efforts to combat the ransomware scourge emanating from Russia. The Kremlin bent under U.S. pressure and forced REvil to close up shop. U.S. officials tired of waiting for Kremlin cooperation and launched a cyber operation that took REvil offline. REvil’s operators were feeling the heat and decided to lay low for a while. "This situation may send a message to some of the players that they need to find a less-aggressive business model, which could mean avoiding critical infrastructure, or it could mean avoiding U.S. targets.” Also, the Biden administration announced several other measures to combat ransomware: “The Biden administration will offer rewards up to $10 million for information leading to the identification of foreign state-sanctioned malicious cyber activity against critical U.S. infrastructure — including ransomware attacks — and the White House has launched a task force to coordinate efforts to stem the ransomware scourge. "It is also launching the website stopransomware.gov to offer the public resources for countering the threat and building more resilience into networks, a senior administration official told reporters.” And yet, many experts are still predicting that ransomware will continue to grow in the near future. For example, TechHQ wrote that “identifying the culprits often isn't as big an obstacle as apprehending them.” To show recent growth of ransomware attacks, Fox Business offered details on a Check Point report this past week that “ransomware attacks surge, growing 93 percent each week.” Also: “'The ransomware business is booming. We’re seeing global surges in ransomware across every major geography, especially in the last two months,' said Lotem Finkelstein, head of threat intelligence at Check Point Software. 'We believe the trend is driven by scores of new entrants into the ransomware business.'" For more background on this hot topic, a few weeks back I appeared on MiTech News to discuss the ransomware crisis. FINAL THOUGHTS I’d like to close with this article which offers a slightly different perspective on ransomware from ZDNet Australia: “The threat of ransomware dominates the cyber news right now, and rightly so. But this week Rachael Falk, chief executive officer of Australia's Cyber Security Cooperative Research Centre, made a very good point. Ransomware is ‘Totally foreseeable and preventable because it's a known problem," Falk told a panel discussion at the Australian Strategy Policy Institute (ASPI) on Tuesday. ‘"It's known that ransomware is out there. And it's known that, invariably, the cyber criminals get into organisations through stealing credentials that they get on the dark web [or a user] clicking on a link and a vulnerability," she said. ‘We're not talking about some sort of nation-state really funky sort of zero day that's happening. This is going on the world over, so it's entirely foreseeable.’" Article Orginal Source: https://www.govtech.com/blogs/lohrmann-on-cybersecurity/as-ransomware-surge-continues-where-next-for-government

Read More
Platform Security

Why Should Businesses Care About Identity Security?

Article | July 11, 2022

In recent years, several of the world's most technology-savvy businesses have experienced identity-related breaches. These occurrences have emphasized how digital identities have evolved to be both today's largest cybersecurity issue and the foundation of current organizational security. It has become evident that a comprehensive, all-hands-on-deck strategy is essential to keep ahead of attackers and make their success more difficult. Why Should Businesses Care About Identity Security? According to CrowdStrike Overwatch team analysis, eight out of ten (80%) breaches are identity-driven. These contemporary attacks often skip the conventional cyber kill chain by utilizing stolen credentials to perform lateral moves and launch larger, more devastating attacks. Identity-driven attacks, however, are particularly difficult to detect. When a genuine user's credentials have been hacked, and an adversary is posing as that user, traditional security processes and tools might make it impossible to distinguish between the user's regular activity and that of the hacker. Identity security is often seen as an organization's final line of defense. These technologies are designed to combat attackers who have escaped existing security measures like endpoint detection and response tools. Identity Security and Zero Trust: How Are They Related? Zero Trust is a security architecture that needs every user, both within and outside of an organization's network, to be verified, approved, and constantly checked for security configuration and posture before allowing or maintaining access to applications and data. Zero Trust implies that there is no conventional network edge; networks can be local, in the cloud, or a mix or hybrid of the two, with resources and employees located everywhere. Businesses that wish to implement the most robust security defenses should combine an identity security solution with a zero-trust security architecture. They must also make sure that their chosen solution complies with industry standards, such as those specified by NIST. Closing Lines Many changes are in store for 2022. Indeed, we cannot forecast all the critical challenges and subjects that will arise this year. Could you fill in some of the gaps? A robust identity security solution will provide the business with several benefits and expanded capabilities.

Read More

Spotlight

Cygilant

We are passionate about helping organizations of all sizes build a comprehensive enterprise-class security program. Our goal is to be the #1 customer-centric organization in the IT Security industry. Acting as an extension of our customers’ IT teams, Cygilant, a pioneer in hybrid security as a service, provides continuous security operations based on best-of-breed technology at a fraction of the cost of alternate solutions. Cygilant is a trusted advisor to organizations that need to improve their IT security and compliance posture and protect against cyber threats and vulnerabilities.

Related News

Data Security

GuidePoint Security Announces Portfolio of Data Security Governance Services

GuidePoint Security | January 30, 2024

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, today announced the availability of its Data Security Governance services, which are designed to help customers address the challenges of unstructured data and data sprawl through a proven process and program to meet their unique needs. GuidePoint’s Data Security Governance services consist of policies, standards, and processes leveraging the newest technologies to meet organizations’ data governance goals in both on-prem and cloud environments. Once the right strategy is determined with the customer, GuidePoint Security consultants will review program requirements, assess current policies and controls, perform gap analysis, design and develop/enhance the program, recommend and implement supporting technologies, and create operational processes and metrics. “Whether an organization is just beginning to build their data security governance program or needs help assessing and improving an existing program, our team and service capabilities are built to meet them at their current maturity level,” said Scott Griswold, Practice Director - Security Governance Services, GuidePoint Security. “We work side by side with the customer to conduct the necessary data discovery in their environment and provide tailored recommendations for solutions and processes to ultimately build/improve upon the data security governance program.” GuidePoint’s Data Security Governance Services include: Sensitive Data Cataloging: For organizations just getting started in the process of protecting their sensitive data, GuidePoint offers Data Identification workshops to identify sensitive data types in the environment, including trade secrets, intellectual property, and sensitive business communications. Data Security Governance Program Assessment: For organizations with existing Data Security Governance or Data Protection programs, GuidePoint Security experts will assess the program to identify policy non-compliance, gaps in data protection requirements—whether legal, regulatory, contractual, or business—and program maturity levels. Data Security Governance Program Strategy Development: The GuidePoint team will work with an organization's key stakeholders to design a program strategy aligned with relevant requirements. The outputs of this effort include delivering ongoing sensitive data discovery, automated classification and labeling, the application of required sensitive data protections, restrictions on where sensitive data can be stored and sent, and data retention policy enforcement. Merger and Acquisition Data Identification: This offering provides the ability to identify sensitive data within an M&A target or recent acquisition (including locations, amounts, and access rights) and then perform penetration testing on the storage repositories where that sensitive data exists to determine the risk of data compromise. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.

Read More

Software Security

Trellix and One Source Deliver Industry-Leading Managed Detection and Response Security Services

Trellix | January 22, 2024

Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today announced an expanded strategic partnership with One Source, a Managed Security Services Provider (MSSP) and technology delivery partner. Customers benefit from a Fortune 500 SOC capability built on the Trellix XDR Platform with AI-guided intelligence, enabling faster detection, investigation, and remediation. Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today announced an expanded strategic partnership with One Source, a Managed Security Services Provider (MSSP) and technology delivery partner. Customers benefit from a Fortune 500 SOC capability built on the Trellix XDR Platform with AI-guided intelligence, enabling faster detection, investigation, and remediation. “The partnership aligns with Trellix’s ongoing commitment to secure organizations from advanced cyber threats,” says Sean Morton, SVP of Professional Services at Trellix. “Leveraging One Source’s MDR capabilities and expanded footprint, we enable more businesses to build cyber resilience, with continued innovation in our combined products and solution offerings to stay ahead of bad actors.” One Source has multiple SOCs leveraging Trellix’s technology, staffed by the industry’s top experts to provide Managed Detection and Response (MDR) capabilities. Their team implements a proactive cyber strategy for customers specific to industry, technology environment, and vulnerabilities, built on the Trellix XDR Platform with 24x7 monitoring. The partnership and combined expertise benefits customers with enhanced services like managed threat detection and response, incident response, security operations and analytics, threat intelligence, threat hunting and forensics, and training and enablement. “The Trellix and One Source partnership is extremely powerful; the former offers an incredible set of security solutions, and the latter excels at personalized deployment and execution,” said Paul Moline, Chief Information Officer, Lindsay Automotive Group. “I never anticipated we could protect our environment with the same security solutions used by government agencies and Fortune 50 companies: I can now sleep at night.” The Trellix XDR Platform’s open architecture and broad set of native security controls across endpoint, email, network, cloud, and data security integrates with over 500 third-party tools to create multi-vector, multi-vendor event correlation and context to speed up investigations. The Trellix Advanced Research Center provides an additional layer of protection by continuously informing the platform with information from millions of global sensors on the latest threat vectors, tactics, and recommendations. One Source experts apply these insights to stay ahead of the constantly evolving threat landscape. “The collaboration with Trellix is a game-changer in reshaping the cybersecurity landscape,” says Eric Gressel, Executive Vice President of Sales, One Source. “Thanks to our partnership, we have access to the highest level of cyber intelligence to fend off newly-revealed hackers and their means of attack, enabling our customers with the most comprehensive offering of enhanced Managed Security Services to protect their businesses.” One Source has a proven track record supporting global businesses spanning retail, restaurant, automotive, healthcare, financial, and manufacturing industries. Trellix customers can rely on One Source's leading Managed Security Services to optimize technology expenses while enhancing telecom connectivity, IT infrastructure, and cybersecurity strategies. About Trellix Trellix is a global company redefining the future of cybersecurity and soulful work. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix, along with an extensive partner ecosystem, accelerates technology innovation through machine learning and automation to empower over 40,000 business and government customers with living security. More at https://trellix.com. About One Source One Source helps businesses simplify a complex technology world. One Source is the leading provider of Technology and Managed Security Services for enterprises. Today, One Source manages more than 2,500 customers, 45,000 business locations, and over one million assets throughout North America. In addition to Managed Security Services, One Source provides Managed Technology Expense Management, 24 / 7 local helpdesk, procures and provisions telecom & IT solutions, and manages customer service requests. One Source frequently generates triple-digit ROI for customers through contract negotiation, portfolio optimization, and ongoing expense management. In addition, One Source leverages partnerships with industry leaders, including Trellix to bring Fortune 500 security solutions and fully managed services to the mid-market. One Source's approach empowers businesses to focus on customers and revenue-generating activities. Learn more at https://www.onesource.net/.

Read More

End Point Protection

Malwarebytes Unveils New K-12 ThreatDown Bundle to Defend Schools and Districts from Cyberattacks

Malwarebytes | January 24, 2024

Malwarebytes, a global leader in real-time cyber protection, today announced the availability of ThreatDown K-12 Bundle, combining the cybersecurity technologies and services that K-12 education institutions need into a streamlined, cost-effective bundle. Purpose-built to reduce risk, complexity and costs for districts and schools, the ThreatDown K-12 Bundle delivers unified protection with an intuitive, easy-to-manage design. The ThreatDown K-12 Bundle allows schools to optimize device uptime and improve productivity, while protecting students and staff, devices and data from the latest cyber threats. "Schools are increasingly facing cyber threats with limited IT resources, leading to a rise in ransomware attacks that affect staff, teaching, and student well-being," said Marcin Kleczynski, Founder and CEO of Malwarebytes. "Historically, cost barriers prevented schools from adopting cybersecurity managed services. Our K-12 Bundle packages together everything districts need to reduce risk and comply with regulations within a manageable budget. We're committed to making powerful protection and managed services accessible to vulnerable schools and students." Bridging the Cybersecurity Gap for Resource-constrained K-12 IT Teams Modern K-12 educational institutions have a wide range of school-, staff- and student-owned devices – from traditional laptops, desktops and servers to Chromebooks, iPadOS, iOS, and Android devices. While these devices greatly enrich the student learning experience and streamline operations for staff, they also introduce new risks. Key features of the ThreatDown K-12 Bundle include: Award-winning endpoint security: K-12 Bundle is built on ThreatDown's strongest AI/ML-driven prevention, detection and response technologies fortified by built-in innovations to reduce the attack surface. These technologies simplify the process of finding and patching software vulnerabilities and prevent unauthorized programs from executing. 24x7x365 managed services: The K-12 Bundle combines ThreatDown advanced technologies with Managed Detection and Response (MDR) service of ThreatDown cybersecurity experts to manage security and resolve alerts around the clock, delivered as an affordable, hassle-free bundle. Unified endpoint management: ThreatDown extends powerful endpoint protection across workstations, servers and mobile device to substantially strengthen schools' cybersecurity postures in compliance with new and pending regulations. Quick and easy to deploy, the K-12 Bundle saves time and resources with unified endpoint management for both traditional and mobile devices – all from a single, cloud-native console. Centralized, real-time visibility: K-12 IT teams can easily view activity across all devices in real time. With a unified platform and visibility for traditional and mobile endpoints, teams can monitor and protect devices from a single pane of glass. Teams can understand the threats to devices in their environments and mitigate potential risks. Advanced mobile protection: ThreatDown K-12 Bundle provides effective protection for Chromebooks, iPadOS, iOS, and Android devices, guarding against the latest mobile threats such as ransomware, malicious apps, and potentially unwanted programs (PUPs). With real-time protection, schools can also prevent accidental access to harmful websites, safeguard against malicious apps, block unwanted in-app ads, and enable a secure mobile experience for students. About Malwarebytes Malwarebytes is a global cybersecurity leader delivering award-winning endpoint protection, privacy and threat prevention solutions worldwide. Built on decades of experience as the last resort to find and eradicate the latest malware, Malwarebytes is now trusted by millions of individuals and organizations to stop threats at each stage of the attack lifecycle, secure digital identities and safeguard data and privacy. A world class team of threat researchers and proprietary AI-powered engines provide unmatched threat intelligence to detect and prevent known and unknown threats. The company is headquartered in California with offices in Europe and Asia. For more information and career opportunities, visit https://www.malwarebytes.com.

Read More

Data Security

GuidePoint Security Announces Portfolio of Data Security Governance Services

GuidePoint Security | January 30, 2024

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, today announced the availability of its Data Security Governance services, which are designed to help customers address the challenges of unstructured data and data sprawl through a proven process and program to meet their unique needs. GuidePoint’s Data Security Governance services consist of policies, standards, and processes leveraging the newest technologies to meet organizations’ data governance goals in both on-prem and cloud environments. Once the right strategy is determined with the customer, GuidePoint Security consultants will review program requirements, assess current policies and controls, perform gap analysis, design and develop/enhance the program, recommend and implement supporting technologies, and create operational processes and metrics. “Whether an organization is just beginning to build their data security governance program or needs help assessing and improving an existing program, our team and service capabilities are built to meet them at their current maturity level,” said Scott Griswold, Practice Director - Security Governance Services, GuidePoint Security. “We work side by side with the customer to conduct the necessary data discovery in their environment and provide tailored recommendations for solutions and processes to ultimately build/improve upon the data security governance program.” GuidePoint’s Data Security Governance Services include: Sensitive Data Cataloging: For organizations just getting started in the process of protecting their sensitive data, GuidePoint offers Data Identification workshops to identify sensitive data types in the environment, including trade secrets, intellectual property, and sensitive business communications. Data Security Governance Program Assessment: For organizations with existing Data Security Governance or Data Protection programs, GuidePoint Security experts will assess the program to identify policy non-compliance, gaps in data protection requirements—whether legal, regulatory, contractual, or business—and program maturity levels. Data Security Governance Program Strategy Development: The GuidePoint team will work with an organization's key stakeholders to design a program strategy aligned with relevant requirements. The outputs of this effort include delivering ongoing sensitive data discovery, automated classification and labeling, the application of required sensitive data protections, restrictions on where sensitive data can be stored and sent, and data retention policy enforcement. Merger and Acquisition Data Identification: This offering provides the ability to identify sensitive data within an M&A target or recent acquisition (including locations, amounts, and access rights) and then perform penetration testing on the storage repositories where that sensitive data exists to determine the risk of data compromise. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.

Read More

Software Security

Trellix and One Source Deliver Industry-Leading Managed Detection and Response Security Services

Trellix | January 22, 2024

Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today announced an expanded strategic partnership with One Source, a Managed Security Services Provider (MSSP) and technology delivery partner. Customers benefit from a Fortune 500 SOC capability built on the Trellix XDR Platform with AI-guided intelligence, enabling faster detection, investigation, and remediation. Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today announced an expanded strategic partnership with One Source, a Managed Security Services Provider (MSSP) and technology delivery partner. Customers benefit from a Fortune 500 SOC capability built on the Trellix XDR Platform with AI-guided intelligence, enabling faster detection, investigation, and remediation. “The partnership aligns with Trellix’s ongoing commitment to secure organizations from advanced cyber threats,” says Sean Morton, SVP of Professional Services at Trellix. “Leveraging One Source’s MDR capabilities and expanded footprint, we enable more businesses to build cyber resilience, with continued innovation in our combined products and solution offerings to stay ahead of bad actors.” One Source has multiple SOCs leveraging Trellix’s technology, staffed by the industry’s top experts to provide Managed Detection and Response (MDR) capabilities. Their team implements a proactive cyber strategy for customers specific to industry, technology environment, and vulnerabilities, built on the Trellix XDR Platform with 24x7 monitoring. The partnership and combined expertise benefits customers with enhanced services like managed threat detection and response, incident response, security operations and analytics, threat intelligence, threat hunting and forensics, and training and enablement. “The Trellix and One Source partnership is extremely powerful; the former offers an incredible set of security solutions, and the latter excels at personalized deployment and execution,” said Paul Moline, Chief Information Officer, Lindsay Automotive Group. “I never anticipated we could protect our environment with the same security solutions used by government agencies and Fortune 50 companies: I can now sleep at night.” The Trellix XDR Platform’s open architecture and broad set of native security controls across endpoint, email, network, cloud, and data security integrates with over 500 third-party tools to create multi-vector, multi-vendor event correlation and context to speed up investigations. The Trellix Advanced Research Center provides an additional layer of protection by continuously informing the platform with information from millions of global sensors on the latest threat vectors, tactics, and recommendations. One Source experts apply these insights to stay ahead of the constantly evolving threat landscape. “The collaboration with Trellix is a game-changer in reshaping the cybersecurity landscape,” says Eric Gressel, Executive Vice President of Sales, One Source. “Thanks to our partnership, we have access to the highest level of cyber intelligence to fend off newly-revealed hackers and their means of attack, enabling our customers with the most comprehensive offering of enhanced Managed Security Services to protect their businesses.” One Source has a proven track record supporting global businesses spanning retail, restaurant, automotive, healthcare, financial, and manufacturing industries. Trellix customers can rely on One Source's leading Managed Security Services to optimize technology expenses while enhancing telecom connectivity, IT infrastructure, and cybersecurity strategies. About Trellix Trellix is a global company redefining the future of cybersecurity and soulful work. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix, along with an extensive partner ecosystem, accelerates technology innovation through machine learning and automation to empower over 40,000 business and government customers with living security. More at https://trellix.com. About One Source One Source helps businesses simplify a complex technology world. One Source is the leading provider of Technology and Managed Security Services for enterprises. Today, One Source manages more than 2,500 customers, 45,000 business locations, and over one million assets throughout North America. In addition to Managed Security Services, One Source provides Managed Technology Expense Management, 24 / 7 local helpdesk, procures and provisions telecom & IT solutions, and manages customer service requests. One Source frequently generates triple-digit ROI for customers through contract negotiation, portfolio optimization, and ongoing expense management. In addition, One Source leverages partnerships with industry leaders, including Trellix to bring Fortune 500 security solutions and fully managed services to the mid-market. One Source's approach empowers businesses to focus on customers and revenue-generating activities. Learn more at https://www.onesource.net/.

Read More

End Point Protection

Malwarebytes Unveils New K-12 ThreatDown Bundle to Defend Schools and Districts from Cyberattacks

Malwarebytes | January 24, 2024

Malwarebytes, a global leader in real-time cyber protection, today announced the availability of ThreatDown K-12 Bundle, combining the cybersecurity technologies and services that K-12 education institutions need into a streamlined, cost-effective bundle. Purpose-built to reduce risk, complexity and costs for districts and schools, the ThreatDown K-12 Bundle delivers unified protection with an intuitive, easy-to-manage design. The ThreatDown K-12 Bundle allows schools to optimize device uptime and improve productivity, while protecting students and staff, devices and data from the latest cyber threats. "Schools are increasingly facing cyber threats with limited IT resources, leading to a rise in ransomware attacks that affect staff, teaching, and student well-being," said Marcin Kleczynski, Founder and CEO of Malwarebytes. "Historically, cost barriers prevented schools from adopting cybersecurity managed services. Our K-12 Bundle packages together everything districts need to reduce risk and comply with regulations within a manageable budget. We're committed to making powerful protection and managed services accessible to vulnerable schools and students." Bridging the Cybersecurity Gap for Resource-constrained K-12 IT Teams Modern K-12 educational institutions have a wide range of school-, staff- and student-owned devices – from traditional laptops, desktops and servers to Chromebooks, iPadOS, iOS, and Android devices. While these devices greatly enrich the student learning experience and streamline operations for staff, they also introduce new risks. Key features of the ThreatDown K-12 Bundle include: Award-winning endpoint security: K-12 Bundle is built on ThreatDown's strongest AI/ML-driven prevention, detection and response technologies fortified by built-in innovations to reduce the attack surface. These technologies simplify the process of finding and patching software vulnerabilities and prevent unauthorized programs from executing. 24x7x365 managed services: The K-12 Bundle combines ThreatDown advanced technologies with Managed Detection and Response (MDR) service of ThreatDown cybersecurity experts to manage security and resolve alerts around the clock, delivered as an affordable, hassle-free bundle. Unified endpoint management: ThreatDown extends powerful endpoint protection across workstations, servers and mobile device to substantially strengthen schools' cybersecurity postures in compliance with new and pending regulations. Quick and easy to deploy, the K-12 Bundle saves time and resources with unified endpoint management for both traditional and mobile devices – all from a single, cloud-native console. Centralized, real-time visibility: K-12 IT teams can easily view activity across all devices in real time. With a unified platform and visibility for traditional and mobile endpoints, teams can monitor and protect devices from a single pane of glass. Teams can understand the threats to devices in their environments and mitigate potential risks. Advanced mobile protection: ThreatDown K-12 Bundle provides effective protection for Chromebooks, iPadOS, iOS, and Android devices, guarding against the latest mobile threats such as ransomware, malicious apps, and potentially unwanted programs (PUPs). With real-time protection, schools can also prevent accidental access to harmful websites, safeguard against malicious apps, block unwanted in-app ads, and enable a secure mobile experience for students. About Malwarebytes Malwarebytes is a global cybersecurity leader delivering award-winning endpoint protection, privacy and threat prevention solutions worldwide. Built on decades of experience as the last resort to find and eradicate the latest malware, Malwarebytes is now trusted by millions of individuals and organizations to stop threats at each stage of the attack lifecycle, secure digital identities and safeguard data and privacy. A world class team of threat researchers and proprietary AI-powered engines provide unmatched threat intelligence to detect and prevent known and unknown threats. The company is headquartered in California with offices in Europe and Asia. For more information and career opportunities, visit https://www.malwarebytes.com.

Read More

Events