Best Practices for Cloud Database Security

Bineesh Mathew | February 18, 2022 | 948 views

Cloud Database Security

Introduction

While databases can be run on-premise, 95% of US businesses have decided to move most of their apps and infrastructure to the cloud. In a cloud database, information is collected and stored in either structured or unstructured formats on a public, private, or hybrid cloud platform.

As numerous companies move their databases online, they need to be aware of the risks of cloud database security. This can help security teams plan for possible intrusions and lessen the damage caused by successful breaches.

The burden on databases is growing steadily as the global exchange of data expands exponentially with the number of systems and devices that transmit and generate data. The more data an organization collects, the more controls are required to keep the data flowing smoothly.

"I do think that cloud adoption is a pivotal part of our journey, but the cloud carries some significant risks. Your adoption strategy has to have equal parts of progressiveness and conservatism. Due diligence is required. The idea of the traditional corporate network is changing. And we need to be out in front of that change to ensure our users are secure, and that we're giving them the best experience that we can."

— Adam Leisring, CISO, Paycor.

Let’s discuss some of the cloud database security vulnerabilities and how they can be mitigated.

Possible Threats to Cloud Database

Many of the dangers that affect cloud technology also harm cloud database security and systems. However, due to the enormous amounts of potentially sensitive data being stored in databases, the consequences can be severe if left unchecked. These consequences, while not exhaustive, give an idea of the types of dangers that network managers may face as firms embrace large-scale cloud database storage systems. Some of the common cloud database security threats are:
  • Data breaches
  • Account hijacking
  • APIs
  • Data loss
  • Cloud servers as malware platforms


Secure Your Cloud Database with Best Practices

Although the risks associated with cloud databases security are frightening, understanding them can help users minimize potential damage. These broad methods also give system administrators advice on how to keep their networks safe from intrusions.


Monitor the Network Constantly

Effective network security teams are proactive, constantly scanning system security policies and logs for exceptions that could indicate data misuse. Semi-annual cloud database security audits should be conducted to provide a more systematic and structured look at how information is used and what defensive procedures are in place. Understanding your network’s flaws and how hackers could use them for their own benefit is often the best way to protect yourself from hackers.


Use Security Intelligence Technologies to Protect your Data in Cloud

SIEM (Security Intelligence and Event Management) technologies provide active network monitoring and the detection of cloud database security flaws. These technologies run continuous system analysis and help to detect potential security breaches in real-time. Individual monitoring should not be used to replace SIEM. It can help with manual searches and provide a more comprehensive picture of network safety.


Have a Cloud Database Security Strategy in Place

A cloud database security strategy is a road map that shows all of the elements of cloud data management.

Before transferring any organizational resources to the cloud, it is ideal for developing a security strategy to guarantee that the cloud infrastructure meets its demands.

A cloud database security plan entails the fundamentals of data management. It can assist enterprises in standardizing all aspects of data management, from analysis and corporate intelligence to performance, efficiency, security, and privacy. In addition, control becomes an essential gear in your data machine once you've established a strategy for continuing data operations.


Utilize Identity and Access Management to Secure Data

Identity and access management (IAM) is a way for organization to make sure that only authorized people have access to company-owned resources.

IAM allows you to manage user roles based on criteria such as role, access, privileges, and behavior.

IAM gives enterprises the control they need to safeguard data against illegal access. For example, an ex-employee's privileges are revoked by IAM, which helps organizations prevent the theft of trade secrets. Additionally, a corporation can utilize IAM to protect themselves against outbound assaults by implementing rules that deter thieves from accessing data. Dedicated IAM tools include the following:
  • Active Directory (AD)
  • Biometric authentication


Summing Up

Cloud security risks can eclipse its benefits, but adequate security measures can help to achieve the business goals as you want to. Security concerns may be reduced with sufficient education and a practical response approach, just like with any other technology. Administrators may significantly improve incident reaction time and keep most cloud data safe by maintaining a solid and proactive familiarity with network behavior. It may help this process if systems like SIEM are used in addition to personal attention and surveillance.

Frequently Asked Questions


Is cloud database secure?

Encryption is used to store files on cloud servers. This is cluttered, making it more difficult for fraudsters to access them. Following cloud database security best practices makes them more secure.


Is it possible to hack the cloud?

After gaining access to one account, a hacker can exploit the cloud infrastructure to access additional accounts. The attack would be far more extensive if they could gain access to a cloud provider's account.


Can businesses trust the cloud?

Yes, your data is safe in the cloud—probably far safer than it is on your hard drive. Furthermore, files are simple to access and maintain.

Spotlight

Stormshield

Stormshield, a fully-owned subsidiary of Airbus CyberSecurity, offers innovative end-to-end security solutions to protect networks (Stormshield Network Security), computers (Stormshield Endpoint Security) and data (Stormshield Data Security).

OTHER ARTICLES
DATA SECURITY

The Great CISO Resignation

Article | February 9, 2022

CISOs Are Leaving in Droves The Great Resignation has been front-page news since Covid lockdowns, with many employees looking for the work-life balance they enjoyed at the time. Now, the phenomenon has spread to the role of Chief Information Security Officer (CISO) and shows no signs of letting up. In fact, industry experts predict that it is likely to worsen. A recent study from cybersecurity company BlackFog found that 32% of CISOs in the U.K. and U.S. have considered leaving and many planned to do so in just six months. The majority noted that the top reason for leaving was a lack of work-life balance. The CISO role is demanding, with firefighting and frequent changes in regulations and customer expectations taking up significant time both on and off the job. In another recent study in which 581 CISOs were surveyed, the IANS Research and Artico Search explored CISO compensation and job satisfaction. Three-fourths of CISOs are satisfied with their job, which is 7% higher than in the 2021 sample and more than double that of the 2020 sample. The main drivers of satisfaction are compensation, budget, executive visibility, and organizational support. However, despite high satisfaction numbers, the study found that as many as 44% of respondents are considering a job change. CISO Challenges LIABILITY AND EXPOSURE OF THE CISO There is a perception that CISOs face heightened liability for cyber intrusions and the response to cyber events. One extraordinary example is the recent conviction of Uber’s former security officer, which represents the first time a security executive has faced federal crime prosecution over a data security response. In this case the finding was that he obstructed justice by concealing information about a breach, destroying data, and covering up the incident. CISOs are often in the hot seat when it comes to cyber-intrusions and how they are handled. The Board of Directors (possibly including named corporate officers) in most cases are protected by being diligent about the Business Judgement Rule (BJR). Heavily adopted in Delaware case law and since adopted in various forms in many states, this “rule” stipulates that proper oversight includes demonstrating the duty of loyalty (no conflicting interests) and duty of care (make informed decisions) to be protected from liability. There are few cases (although Enron being one) where liability was found but it was for illegalities and poor business judgment. Since CISOs are not named corporate officers in most cases, BJR does not provide comfort. Similarly, liability insurance which covers legal defense fees and cash judgments often covers only directors and named corporate officers unless the CISO has been specifically included in the policy. DUTY TO REPORT Improving Board-CISO Transparency There is a mechanism found in corporate governance best-practices for ensuring that the most senior people in an organization get direct, unfiltered input from a key executive, regardless of reporting structure. It is called the executive session. This is in common use by Boards of Directors who meet individually with the Chief Financial Officer, Controller, and other key executives, notably without other management in the room. Questions are intended to be penetrating and the respondent is expected to respond openly. Now that cybersecurity has risen to a top risk for the enterprise, the CISO position should be among those who appear individually in an executive session with the highest governing body of an enterprise at least annually. This addition to governance best-practices would give Board members and State governors unfiltered information on cybersecurity matters, thereby helping to fulfil their oversight responsibility. Bob Zukis, founder and CEO of the Digital Directors Network, reports that a survey of its membership of more than 900 IT, cyber, and boardroom leaders shows nearly half of the respondents already have some form of this policy in practice. However, this is still a minority of the overall CISO population, signaling more transparency between the CISO and Board is needed. CISOs in State Governments Government organizations also face many of these issues. Evidence shows that CISOs in state governments are as vulnerable to other job offers as CISOs in the private sector. In the span of eight days in October 2022, there were several reports of state CISOs resigning, including Oklahoma, Georgia, Pennsylvania, and North Dakota. [1] Legal liability is not an issue the government CISO needs to be worried about since governments and their employees are immune from legal suits. However, government CISOs are highly concerned about shouldering blame, especially in the press, for security intrusions or their coverup. As with private industry, state governments should also institute this recommended practice. NCC recommends CISOs be called upon to appear in an executive session with agency heads and even the governor at least once a year. The State of Texas, for example, already has a version of this policy implemented in a statute and in practice. Texas Administrative Code includes provisions for: Reporting, at least annually, directly to the agency head the status and effectiveness of the security program and its controls. Informing any relevant parties in the event of noncompliance with the state agency’s information security policies Resolving the Great CISO Resignation For organizations across the public and private sectors, cybersecurity has risen to one of the top risks and has increased the importance of the role of the CISO. Most are looking to improve their work-life balance and reduce some of the stressors of the job. While many CISOs are also concerned about trends in liability and becoming headline news for decisions made on the job, requiring CISOs to appear in executive sessions with board members or state governors can help to alleviate these concerns and improve CISO job satisfaction while at the same time improving how the most senior levels of organizations fulfil their responsibilities for oversight of top risks.

Read More
DATA SECURITY, ENTERPRISE SECURITY

Top 5 Application Security Trends Businesses Must Be Aware of in 2023

Article | November 22, 2022

Introduction Top 5 Trends for Businesses to Improve Their Existing Application Security 1.AppSec and Convergence 2.Adoption of Automated AI Security Capabilities 3.Emphasis on Securing the Software Supply Chain 4.Extreme 'Shift Left' 5.Upsurge in Demand for Vulnerability Prioritization Moving Forward with Application Security Introduction The proliferation of applications and their usage across the business landscape has made application security a strategic initiative that spans departments rather than an activity. Several factors are driving the rethinking of application security as a broader strategic program, including the evolving threat landscape, more incremental software development frameworks, and the adoption of nimbler. With the acceleration of software development and the greater-than-ever role of code in current business infrastructure, application security is shifting left in the process and infusing every step to ensure that the applications reaching customers' hands are secure and reliable. Top 5 Trends for Businesses to Improve Their Existing Application Security Applications serve as a doorway to servers and networks, making them an excellent target for malicious actors. Since cyber attackers constantly improve their techniques for breaking into software, it is becoming essential for businesses to gain insights into ever-evolving trends in the AppSec space. Here are some of the prominent trends that businesses should aware of to improve their existing application security. Trend 1: AppSec and CloudSec Convergence To accurately estimate attack surface and overall security posture, both application code vulnerabilities and cloud service hosting misconfigurations must be examined. The convergence of AppSec and CloudSec is becoming a critical component of modern security operations. It allows organizations to gain a comprehensive view of the attack surface and better understand the risks posed by application code and cloud service providers. By looking at these two areas cohesively, organizations can identify business-critical vulnerabilities and prioritize their remediation efforts. Trend 2: Adoption of Automated AI Security Capabilities The increasing volume and complexity of security threats pose significant challenges for organizations, causing strain on their threat detection and response capabilities. This leads to slower response times, higher costs, and a greater impact on security incidents. To address this issue, many companies are turning to security automation as a potential solution. One of such approaches involves the use of artificial intelligence (AI), which can automate data gathering, threat identification, and incident response processes. By adopting security automation, companies can optimize the use of limited security personnel and resources, enabling them to focus on high-value activities that provide maximum benefit to the organization. Trend 3: Emphasis on Securing the Software Supply Chain The software supply chain is emerging as a primary area of focus due to the heightened risks associated with software development. This urgency has been further compounded by the recent attack, such as Solarwind data breach and the Log4j attack on Apache, increasing the significance of software security measures. Companies are taking a more proactive approach for making enhancements in the software supply chain to protect their applications, including conducting Static Application Security Testing (SAST) to identify and address vulnerabilities before malicious actors can exploit them. Trend 4: Extreme 'Shift Left' The ‘shift left’ in software development has gained significant momentum in recent years. The idea behind this approach is to prioritize security and other critical aspects of software development at the earliest possible stage in the development process. By doing so, organizations can make more informed security decisions and identify and address security vulnerabilities before they cause any damage. As the pace of development continues to increase, organizations are increasingly adopting this approach in their software development processes to protect their systems and data from security risks. Trend 5: Upsurge in Demand for Vulnerability Prioritization Managing vulnerabilities in a software system requires analyzing vast amounts of data to determine issues that require immediate attention and prioritization. However, the growing presence of false positives is negatively impacting this process, resulting in decreased efficiency and wasted resources. Organizations are increasingly looking for vendors to provide vulnerability management tools that can reduce false positives, differentiate between low-priority issues and severe security threats, and offer actionable insights to mitigate them. Moving Forward with Application Security Applications security has become more critical than ever before for businesses in the current digital scape. With the attack surface constantly expanding and the frequency of threats on the rise, organizations must remain agile and employ the best effective strategies to protect their applications from potential cyberattacks. The significance of application security has not gone unnoticed. As organizations continue to invest in security measures, they are increasingly upgrading themselves as per emerging security trends to protect themselves against evolving cyber threats. This includes adopting the ‘shift left’ approach, tightening controls, and having a clear definition of remediation processes.

Read More
DATA SECURITY

Security by Sector: Improving Quality of Data and Decision-Making a Priority for Credit Industry

Article | March 1, 2022

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and risks than others? Do some do a better job of keeping data secure, and if so, how and why?A new study of credit management professionals has revealed that improving the quality of data and decision-making will be a top priority for the credit industry in the next three years. The research, from Equifax Ingnite in collaboration with Coleman Parkes, takes a deep dive into the views of credit management pros across retail, banking, finance and debt management/recovery sectors.

Read More

3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

Article | February 12, 2020

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full effect, we saw expensive fines levied upon companies that fell victim to data privacy breaches. As we move into a new year, probably the biggest takeaway from 2019 is that being proactive and having a data privacy strategy in place is important to help mitigate the risk of a data privacy breach. The regulatory landscape continues to evolve as states and countries actively pass new expanded requirements for privacy and cybersecurity regulations. While laws in the U.S., like the California Consumer Privacy Act (CCPA), are getting significant attention, many other states and countries are actively amending their breach notification laws to include tighter restrictions.

Read More

Spotlight

Stormshield

Stormshield, a fully-owned subsidiary of Airbus CyberSecurity, offers innovative end-to-end security solutions to protect networks (Stormshield Network Security), computers (Stormshield Endpoint Security) and data (Stormshield Data Security).

Related News

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

New KnowBe4 SecurityCoach Integrates With Bitdefender GravityZone

PRWeb | May 22, 2023

KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, today announced that its new SecurityCoach product integrates with Bitdefender GravityZone, a leading next-generation endpoint protection platform for threat prevention, detection and response. The new partnership and product integration between the two cybersecurity leaders will help reduce risky behavior, support real-time security coaching and help organizations become more cyber resilient. SecurityCoach helps IT/security professionals develop a strong security culture by enabling real-time security coaching of their users in response to risky security behavior. Leveraging an organization’s existing security stack, IT/security professionals can configure their real-time coaching campaigns to immediately deliver a SecurityTip to their users related to a detected event. “Bitdefender joins our ecosystem of technology partners, which is growing rapidly, to enrich the support we provide to our customers and fortify their organization’s human firewall,” said Stu Sjouwerman, CEO, KnowBe4. “KnowBe4 is proud to partner with Bitdefender to provide a seamless integration with our new SecurityCoach product, which aims to deliver real-time security coaching and advice to help end users enhance their cybersecurity knowledge and strengthen their role in contributing to a strong security culture. KnowBe4 is actively working with Bitdefender to provide an API-based integration to connect our platform with systems that IT/security professionals already utilize, making rolling out new products to their teams an easy and unified process.” “We are pleased to partner with KnowBe4 to integrate Bitdefender GravityZone with SecurityCoach,” said Daniel Daraban, senior director of product management at Bitdefender Business Solutions Group. “Businesses and organizations are under constant assault from ransomware, trojans, and other malware infecting systems. This integration leverages GravityZone’s behavioral analytics, machine learning, and root cause analysis for contextualized alerts resulting in actionable SecurityTips that help minimize risky user behavior.” KnowBe4 will provide step-by-step instructions and recommendations to help IT/security professionals achieve quick and pain-free integration and data syncing during the implementation process. KnowBe4 now integrates or partners with over 20 of the world's top cybersecurity platforms across Endpoint, Network, Identity, Cloud and Data Security https://www.knowbe4.com/integrations. For more information on SecurityCoach, visit http://www.knowbe4.com/securitycoach. About Bitdefender Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, enterprise, and government environments, Bitdefender is one of the industry’s most trusted experts for eliminating threats, protecting privacy, digital identity and data, and enabling cyber resilience. With deep investments in research and development, Bitdefender Labs discovers hundreds of new threats each minute and validates billions of threat queries daily. The company has pioneered breakthrough innovations in antimalware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 180 of the world’s most recognized technology brands. Founded in 2001, Bitdefender has customers in 170+ countries with offices around the world. For more information, visit https://www.bitdefender.com. About KnowBe4 KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, is used by more than 56,000 organizations around the globe. Founded by IT and data security specialist Stu Sjouwerman, KnowBe4 helps organizations address the human element of security by raising awareness about ransomware, CEO fraud and other social engineering tactics through a new-school approach to awareness training on security. Kevin Mitnick, an internationally recognized cybersecurity specialist and KnowBe4's Chief Hacking Officer, helped design the KnowBe4 training based on his well-documented social engineering tactics. Tens of thousands of organizations rely on KnowBe4 to mobilize their end users as their last line of defense.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Skyflow launches Skyflow GPT Privacy Vault

Businesswire | May 22, 2023

Today, Skyflow, the data privacy vault company, unveiled Skyflow GPT Privacy Vault, a robust privacy solution that enables organizations to safely and securely leverage the full power of large language models such as GPT. Companies are rushing to adopt AI, whether to increase productivity, enhance decision-making powered by data-driven insights, or to improve customer experience. However, privacy concerns hinder organizations from fully embracing AI. The Skyflow GPT Privacy Vault can provide enterprises with unparalleled data protection throughout the entire lifecycle of GPT models, and offers a comprehensive range of features tailored to meet the evolving needs of enterprises: Data Privacy and Security: Skyflow GPT Privacy Vault establishes a secure environment for sensitive data, protecting it from unauthorized access, breaches, and data leaks. Granular Data Control: Organizations can maintain strict control over sensitive data, ensuring that only authorized individuals or entities can access specific data sets or functionalities within GPT systems. Privacy-Preserving AI: Sensitive data is redacted and anonymized during data collection, model training, and interactions, enabling organizations to maximize AI capabilities without compromising privacy. Compliance and Regulatory Requirements: With Skyflow GPT Privacy Vault, global companies can leverage AI while complying with data residency requirements, such as GDPR, LGPD, and others. Here’s how organizations can leverage Skyflow GPT Privacy Vault: Data Collection and Preparation: Redact or tokenize sensitive information as it flows through GPT without lessening the value of the output. Skyflow’s proprietary polymorphic encryption technique enables the model to seamlessly handle protected data as if it were plaintext. Model Training: Safely train GPT models on content where sensitive data is redacted and anonymized. Robust multi-party training is also available, so that two or more entities can share anonymized datasets and safely use AI to unlock substantial insights. Interaction with GPT Models: De-identify sensitive data during interactions with GPT models, ensuring that privacy is preserved throughout the entire user interaction process. Secure Deployment and Integration: Seamlessly integrate Skyflow GPT Privacy Vault into existing data infrastructures to add a robust layer of data protection. Skyflow GPT Privacy Vault will protect all sensitive data flowing into GPT models and only reveal sensitive information to authorized parties once it has been processed by the model and returned. Skyflow GPT Privacy Vault delivers significant value across industries. Here are two specific use cases: Pharmaceutical Research: Pharmaceutical companies rely on Skyflow GPT Privacy Vault to protect sensitive data throughout the drug development lifecycle. It ensures the privacy and security of clinical trial data, safeguards proprietary research and intellectual property, and enables secure collaborations with external partners. Additionally, it supports personalized medicine initiatives by preserving the privacy of genetic data. Online Travel Booking: Online travel booking companies utilize Skyflow GPT Privacy Vault to protect customer data while leveraging AI models for personalized recommendations and enhanced customer experiences. It allows them to anonymize and protect personally identifiable information (PII) and payment data, ensuring compliance with privacy regulations while delivering superior travel experiences. “Generative AI can be a powerful tool for teams to maximize their output and scale their products. But the risk of a sensitive data leak is high, and with other providers, the cost of deploying a private GPT can be 10x what it is in a shared environment,” said Anshu Sharma, co-founder and CEO of Skyflow. “Skyflow can offer world-class data privacy throughout the lifecycle of GPT models, seamlessly and affordably.” The Global Partner in Cybersecurity and Privacy at Infosys, Joseph Williams, said, "Companies are eager to adopt ChatGPT and other generative AI platforms but they need to solve for privacy and regulatory compliance. Like we laid out in our seminal paper on the future of privacy engineering, data privacy vault architecture is a right way to go about this." Read more about Skyflow for GPT here. About Skyflow Skyflow is a data privacy vault company built to radically simplify how companies isolate, protect and govern their customers’ most sensitive data. With its global network of data privacy vaults, Skyflow helps companies meet complex data localization requirements. Skyflow customers span verticals like fintech, retail, travel, and healthcare. Skyflow is headquartered in Palo Alto, California and was founded in 2019. For more information, visit www.skyflow.com or follow on Twitter and LinkedIn.

Read More

ENTERPRISE IDENTITY, SOFTWARE SECURITY, CLOUD SECURITY

Lookout Announces the Successful Divestiture of Its Consumer Mobile Security Business Segment

Businesswire | June 05, 2023

Lookout, Inc., the endpoint-to-cloud security company, today announced it has closed the previously announced sale of its consumer mobile security business to F-Secure, a global provider of consumer security products and services. With this strategic divestiture Lookout will focus on expanding its core enterprise business, built around the Lookout Cloud Security Platform. The sale of Lookout’s consumer mobile security business represents a deliberate and strategic decision to optimize its enterprise product portfolio and concentrate its product innovation and go-to-market on the expansion of these core competencies. The divestiture sets Lookout up for long-term growth and further positions the Company to address the security transformation impacting organizations today, including the increase in remote work, the shift to cloud-based delivery models and the transition to zero trust architectures. “We are pleased to announce the successful divestiture of our mobile consumer security business, which represents a significant milestone in our strategic transformation to become a pure-play enterprise cybersecurity company,” Jim Dolce, CEO at Lookout. “With this refined focus, we will continue to drive innovation, invest in the development of cutting-edge solutions and drive greater value for our customers.” Lookout’s core enterprise business includes Lookout Mobile Endpoint Security and its security services edge (SSE) cloud-native solution, the Lookout Cloud Security Platform. The Company entered the cloud security market through its acquisition of CipherCloud in March 2021. Its Cloud Security Platform was recently scored among the highest three vendors in the 2023 Gartner Critical Capabilities for Security Service Edge (SSE)1 report in each of the four use cases. The Gartner Critical Capabilities for SSE – an essential companion to the Gartner Magic Quadrant™ for SSE2 in which Lookout was named a Visionary for the second year in a row – is a comparative analysis that scores products or services against a set of critical differentiators that every business needs, as identified by Gartner. These four use cases include Secure Web and Cloud Usage, Detect and Mitigate Threats, Connect and Secure Remote Workers and Identify and Protect Sensitive Information. As part of the sale agreement, F-Secure acquires all of the Lookout consumer mobile security products and technology and assumes all responsibility for ongoing operations and customer relationships. Additionally, the Company’s consumer employees will become part of F-Secure. About Lookout Lookout, Inc. is the endpoint-to-cloud cybersecurity company that delivers zero trust security by reducing risk and protecting data wherever it goes, without boundaries or limits. Our unified, cloud-native platform safeguards digital information across devices, apps, networks and clouds and is as fluid and flexible as the modern digital world. Lookout is trusted by enterprises and government agencies of all sizes to protect the sensitive data they care about most, enabling them to work and connect freely and safely. To learn more about the Lookout Cloud Security Platform, visit www.lookout.com and follow Lookout on our blog, LinkedIn and Twitter. © 2023 Lookout, Inc. LOOKOUT®, the Lookout Shield Design®, LOOKOUT with Shield Design®, and SIGNAL FLARE® are registered trademarks of Lookout, Inc. in the United States and other countries. DAY OF SHECURITY®, LOOKOUT MOBILE SECURITY®, and POWERED BY LOOKOUT® are registered trademarks of Lookout, Inc. in the United States. Lookout, Inc. maintains common law trademark rights in EVERYTHING IS OK, PROTECTED BY LOOKOUT, CIPHERCLOUD, SCREAM, the 4 Bar Shield Design, and the Lookout multi-color/multi-shaded Wingspan design.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

New KnowBe4 SecurityCoach Integrates With Bitdefender GravityZone

PRWeb | May 22, 2023

KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, today announced that its new SecurityCoach product integrates with Bitdefender GravityZone, a leading next-generation endpoint protection platform for threat prevention, detection and response. The new partnership and product integration between the two cybersecurity leaders will help reduce risky behavior, support real-time security coaching and help organizations become more cyber resilient. SecurityCoach helps IT/security professionals develop a strong security culture by enabling real-time security coaching of their users in response to risky security behavior. Leveraging an organization’s existing security stack, IT/security professionals can configure their real-time coaching campaigns to immediately deliver a SecurityTip to their users related to a detected event. “Bitdefender joins our ecosystem of technology partners, which is growing rapidly, to enrich the support we provide to our customers and fortify their organization’s human firewall,” said Stu Sjouwerman, CEO, KnowBe4. “KnowBe4 is proud to partner with Bitdefender to provide a seamless integration with our new SecurityCoach product, which aims to deliver real-time security coaching and advice to help end users enhance their cybersecurity knowledge and strengthen their role in contributing to a strong security culture. KnowBe4 is actively working with Bitdefender to provide an API-based integration to connect our platform with systems that IT/security professionals already utilize, making rolling out new products to their teams an easy and unified process.” “We are pleased to partner with KnowBe4 to integrate Bitdefender GravityZone with SecurityCoach,” said Daniel Daraban, senior director of product management at Bitdefender Business Solutions Group. “Businesses and organizations are under constant assault from ransomware, trojans, and other malware infecting systems. This integration leverages GravityZone’s behavioral analytics, machine learning, and root cause analysis for contextualized alerts resulting in actionable SecurityTips that help minimize risky user behavior.” KnowBe4 will provide step-by-step instructions and recommendations to help IT/security professionals achieve quick and pain-free integration and data syncing during the implementation process. KnowBe4 now integrates or partners with over 20 of the world's top cybersecurity platforms across Endpoint, Network, Identity, Cloud and Data Security https://www.knowbe4.com/integrations. For more information on SecurityCoach, visit http://www.knowbe4.com/securitycoach. About Bitdefender Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, enterprise, and government environments, Bitdefender is one of the industry’s most trusted experts for eliminating threats, protecting privacy, digital identity and data, and enabling cyber resilience. With deep investments in research and development, Bitdefender Labs discovers hundreds of new threats each minute and validates billions of threat queries daily. The company has pioneered breakthrough innovations in antimalware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 180 of the world’s most recognized technology brands. Founded in 2001, Bitdefender has customers in 170+ countries with offices around the world. For more information, visit https://www.bitdefender.com. About KnowBe4 KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, is used by more than 56,000 organizations around the globe. Founded by IT and data security specialist Stu Sjouwerman, KnowBe4 helps organizations address the human element of security by raising awareness about ransomware, CEO fraud and other social engineering tactics through a new-school approach to awareness training on security. Kevin Mitnick, an internationally recognized cybersecurity specialist and KnowBe4's Chief Hacking Officer, helped design the KnowBe4 training based on his well-documented social engineering tactics. Tens of thousands of organizations rely on KnowBe4 to mobilize their end users as their last line of defense.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Skyflow launches Skyflow GPT Privacy Vault

Businesswire | May 22, 2023

Today, Skyflow, the data privacy vault company, unveiled Skyflow GPT Privacy Vault, a robust privacy solution that enables organizations to safely and securely leverage the full power of large language models such as GPT. Companies are rushing to adopt AI, whether to increase productivity, enhance decision-making powered by data-driven insights, or to improve customer experience. However, privacy concerns hinder organizations from fully embracing AI. The Skyflow GPT Privacy Vault can provide enterprises with unparalleled data protection throughout the entire lifecycle of GPT models, and offers a comprehensive range of features tailored to meet the evolving needs of enterprises: Data Privacy and Security: Skyflow GPT Privacy Vault establishes a secure environment for sensitive data, protecting it from unauthorized access, breaches, and data leaks. Granular Data Control: Organizations can maintain strict control over sensitive data, ensuring that only authorized individuals or entities can access specific data sets or functionalities within GPT systems. Privacy-Preserving AI: Sensitive data is redacted and anonymized during data collection, model training, and interactions, enabling organizations to maximize AI capabilities without compromising privacy. Compliance and Regulatory Requirements: With Skyflow GPT Privacy Vault, global companies can leverage AI while complying with data residency requirements, such as GDPR, LGPD, and others. Here’s how organizations can leverage Skyflow GPT Privacy Vault: Data Collection and Preparation: Redact or tokenize sensitive information as it flows through GPT without lessening the value of the output. Skyflow’s proprietary polymorphic encryption technique enables the model to seamlessly handle protected data as if it were plaintext. Model Training: Safely train GPT models on content where sensitive data is redacted and anonymized. Robust multi-party training is also available, so that two or more entities can share anonymized datasets and safely use AI to unlock substantial insights. Interaction with GPT Models: De-identify sensitive data during interactions with GPT models, ensuring that privacy is preserved throughout the entire user interaction process. Secure Deployment and Integration: Seamlessly integrate Skyflow GPT Privacy Vault into existing data infrastructures to add a robust layer of data protection. Skyflow GPT Privacy Vault will protect all sensitive data flowing into GPT models and only reveal sensitive information to authorized parties once it has been processed by the model and returned. Skyflow GPT Privacy Vault delivers significant value across industries. Here are two specific use cases: Pharmaceutical Research: Pharmaceutical companies rely on Skyflow GPT Privacy Vault to protect sensitive data throughout the drug development lifecycle. It ensures the privacy and security of clinical trial data, safeguards proprietary research and intellectual property, and enables secure collaborations with external partners. Additionally, it supports personalized medicine initiatives by preserving the privacy of genetic data. Online Travel Booking: Online travel booking companies utilize Skyflow GPT Privacy Vault to protect customer data while leveraging AI models for personalized recommendations and enhanced customer experiences. It allows them to anonymize and protect personally identifiable information (PII) and payment data, ensuring compliance with privacy regulations while delivering superior travel experiences. “Generative AI can be a powerful tool for teams to maximize their output and scale their products. But the risk of a sensitive data leak is high, and with other providers, the cost of deploying a private GPT can be 10x what it is in a shared environment,” said Anshu Sharma, co-founder and CEO of Skyflow. “Skyflow can offer world-class data privacy throughout the lifecycle of GPT models, seamlessly and affordably.” The Global Partner in Cybersecurity and Privacy at Infosys, Joseph Williams, said, "Companies are eager to adopt ChatGPT and other generative AI platforms but they need to solve for privacy and regulatory compliance. Like we laid out in our seminal paper on the future of privacy engineering, data privacy vault architecture is a right way to go about this." Read more about Skyflow for GPT here. About Skyflow Skyflow is a data privacy vault company built to radically simplify how companies isolate, protect and govern their customers’ most sensitive data. With its global network of data privacy vaults, Skyflow helps companies meet complex data localization requirements. Skyflow customers span verticals like fintech, retail, travel, and healthcare. Skyflow is headquartered in Palo Alto, California and was founded in 2019. For more information, visit www.skyflow.com or follow on Twitter and LinkedIn.

Read More

ENTERPRISE IDENTITY, SOFTWARE SECURITY, CLOUD SECURITY

Lookout Announces the Successful Divestiture of Its Consumer Mobile Security Business Segment

Businesswire | June 05, 2023

Lookout, Inc., the endpoint-to-cloud security company, today announced it has closed the previously announced sale of its consumer mobile security business to F-Secure, a global provider of consumer security products and services. With this strategic divestiture Lookout will focus on expanding its core enterprise business, built around the Lookout Cloud Security Platform. The sale of Lookout’s consumer mobile security business represents a deliberate and strategic decision to optimize its enterprise product portfolio and concentrate its product innovation and go-to-market on the expansion of these core competencies. The divestiture sets Lookout up for long-term growth and further positions the Company to address the security transformation impacting organizations today, including the increase in remote work, the shift to cloud-based delivery models and the transition to zero trust architectures. “We are pleased to announce the successful divestiture of our mobile consumer security business, which represents a significant milestone in our strategic transformation to become a pure-play enterprise cybersecurity company,” Jim Dolce, CEO at Lookout. “With this refined focus, we will continue to drive innovation, invest in the development of cutting-edge solutions and drive greater value for our customers.” Lookout’s core enterprise business includes Lookout Mobile Endpoint Security and its security services edge (SSE) cloud-native solution, the Lookout Cloud Security Platform. The Company entered the cloud security market through its acquisition of CipherCloud in March 2021. Its Cloud Security Platform was recently scored among the highest three vendors in the 2023 Gartner Critical Capabilities for Security Service Edge (SSE)1 report in each of the four use cases. The Gartner Critical Capabilities for SSE – an essential companion to the Gartner Magic Quadrant™ for SSE2 in which Lookout was named a Visionary for the second year in a row – is a comparative analysis that scores products or services against a set of critical differentiators that every business needs, as identified by Gartner. These four use cases include Secure Web and Cloud Usage, Detect and Mitigate Threats, Connect and Secure Remote Workers and Identify and Protect Sensitive Information. As part of the sale agreement, F-Secure acquires all of the Lookout consumer mobile security products and technology and assumes all responsibility for ongoing operations and customer relationships. Additionally, the Company’s consumer employees will become part of F-Secure. About Lookout Lookout, Inc. is the endpoint-to-cloud cybersecurity company that delivers zero trust security by reducing risk and protecting data wherever it goes, without boundaries or limits. Our unified, cloud-native platform safeguards digital information across devices, apps, networks and clouds and is as fluid and flexible as the modern digital world. Lookout is trusted by enterprises and government agencies of all sizes to protect the sensitive data they care about most, enabling them to work and connect freely and safely. To learn more about the Lookout Cloud Security Platform, visit www.lookout.com and follow Lookout on our blog, LinkedIn and Twitter. © 2023 Lookout, Inc. LOOKOUT®, the Lookout Shield Design®, LOOKOUT with Shield Design®, and SIGNAL FLARE® are registered trademarks of Lookout, Inc. in the United States and other countries. DAY OF SHECURITY®, LOOKOUT MOBILE SECURITY®, and POWERED BY LOOKOUT® are registered trademarks of Lookout, Inc. in the United States. Lookout, Inc. maintains common law trademark rights in EVERYTHING IS OK, PROTECTED BY LOOKOUT, CIPHERCLOUD, SCREAM, the 4 Bar Shield Design, and the Lookout multi-color/multi-shaded Wingspan design.

Read More

Events