Identity and Access Management for the Real World Access Management

NONE | 115 views

In an ideal world, we'd have the budget and time we need to get things done. And tomorrow would be predictable. But that's simply not the case, especially in the IT universe. As you well know, the world of identity and access management (IAM) is one of constant change, shrinking deadlines, minuscule budgets, overtaxed staff and unmerciful regulations. Unfortunately, this historical approach to IAM involves piecing together "half solutions" in hope that tomorrow's solutions will address real world needs.

Spotlight

REDLattice Inc

REDLattice is a provider of advanced cyber capabilities across the government and Fortune 500 markets. Our experience ranges from basic and applied research to operations and deployment. Our team consists of recognized leaders in the design, development and implementation of cutting-edge applications and engineering services. Our core cyber capabilities include: Vulnerability assessment. Malware analysis.

OTHER ARTICLES
PLATFORM SECURITY

Active Directory Recovery and Its Impact on ROI

Article | June 28, 2022

Active Directory manages users, apps, and resources and handles user authorization and authentication. Cyberattacks are on the rise throughout every sector, disrupting consumer goods and services, organizations, and endangering public safety. Businesses that haven't been attacked can have trouble justifying a cyber-first business recovery strategy. However, as more cyberattacks make headlines and the cost of ransom payments and cyber insurance grows, corporate leaders must prioritize building a proven cyber-first business recovery strategy. The first step is to safeguard the Active Directory (AD), which is most businesses’ primary identity database globally. Active Directory is the primary access point for cybercriminals: 90% of the cyberattacks Mandiant reported, include Active Directory as the first attack vector or the gateway to elevated access. Most attacks in recent years, including SolarWinds, included compromised credentials. Cyberattack victims soon realize that every minute matters during a breach. Failure to effectively restore Active Directory would lead to a second assault using the same strategies as the first. The issue is not whether a company can afford a rapid, cyber-first Active Directory approach. The question is how Active Directory can help businesses safeguard their data and also boost their ROI. What Benefits Does Active Directory Hold for Businesses? There are several ways in which Active Directory can help businesses: Centralized Data Repository In a multi-master database, Active Directory holds the identification information of apps, users, and resources. The Active Directory database stores data as objects and has a capacity of 2 billion objects. Users can use this identification data to access resources from anywhere on the network. Administrators can handle corporate application authentication and permission from a centralized place. Identity would be copied across numerous systems without directory services, making it impossible for administrators to oversee operations. Minimized Data Replication Multiple domain controllers are necessary for complicated business needs like branch offices. Sub-domain controllers are aware of changes made to the Active Directory database if identities are controlled from a centralized approach. With a centralized domain controller, Active Directory can delegate duties across the business, as well as tools and utilities for adding, removing, and modifying active identities and objects. It employs a synchronization method to guarantee that data is consistent across all domain controllers. As a result, it enables making company-wide adjustments with a few mouse clicks. Security Auditing Capabilities Regular audits assist you in understanding new security dangers. Active Directory enables the collection and auditing of identity infrastructure events like authentication, directory service changes, and access violations. It also facilitates the collection of data from a centralized place for the purpose of debugging authentication and authorization difficulties that users can encounter. Network Security Active Directory improves security across an organization. Higher-level management authorities can delegate authorization for resources and apps to other administrators or users through delegation. Active Directory items are linked in a hierarchical manner. Permissions are inherited by an object in the AD tree from its parent objects. These features guarantee that users are uniquely and securely recognized. Administrators can build and update permissions from a single database, decreasing the possibility of inaccurate or outdated configuration. Calculating Your Active Directory Recovery ROI Although every IT manager or administrator understands that an effective Active Directory recovery plan is a critical component of any business-developed standard, assessing the practical ROI (return on investment) of an optimized Active Directory recovery plan is frustratingly complex. Here are important ways: Operational Losses It's probable that a significant portion of your operations depend on Active Directory to authenticate users as the foundation for delivering access to apps, systems, and data. How much money or productivity will your company lose for every hour Active Directory is down? How many hours, days, or weeks would it require before the company reaches a point of no return and is unable to recover financially? Remember the City of Baltimore's ransomware attack? Their operational recovery took several months and cost more than $18 million. Lack of Plan That Includes AD If your company is mature enough, it has a BC/DR strategy to restore business activities after an outage. Most disaster plans account for the loss of infrastructure or location. Few organizations have a strategy for recovering operations following a hack, particularly ransomware. How you restore Active Directory depends on what hackers changed in Active Directory. How far back must you go to get a known secure Active Directory version? What Active Directory-dependent systems, services, and apps won't work if Active Directory is recovered to an earlier state? Do you have a recent malware-free backup to restore? Without a strategy or understanding of what changed in Active Directory before recovery, your company will spend immeasurable time correcting all the issues. Recovery Might Not Be an Answer If all the modifications performed by the bad dudes during an assault are, say, adding an account to the Domain Admins group, then restoring Active Directory to a few days ago or last month would not be the best solution. Instead, perhaps a less expensive approach would be to monitor changes in Active Directory and have the option to either prevent changes to "protected" accounts (such as the Domain Admins group) or immediately return a change to a sanctioned configuration. Closing Lines In other words, the ROI of Active Directory recovery is significantly more dependent on your present capacity to return to a known-productive and known-secure state post-attack than it is on an online ROI calculation that ignores the various factors involved in a ransomware attack. By running through certain situations and considering your present recovery capabilities, you will uncover expenses that can be avoided by implementing a suitable Active Directory recovery solution—one that is intended to guard against, prevent, and recover from malicious modifications to Active Directory. QNA How to restore the Active Directory? Restart the server From the boot menu, press F8 to access advanced settings Scroll down to the Directory Services Restore Mode option Press the Enter key to restart the computer in safe mode. It will not launch the directory services How can I restore a failed domain controller? Restoring a Domain Controller in non-authoritarian mode In the GUI, choose the Restore wizard Find the required DC From the recovery menu, choose Restore Entire VM Then, choose a recovery point Select whether the restoration should take place in the original location or a new one Complete the steps necessary to complete the procedure. For Active Directory, what is "Recovery Manager"? The Recovery Manager for Active Directory allows you to automate backups and easily compare a backup to the present value of Active Directory to identify changes and restore data immediately.

Read More
ENTERPRISE SECURITY

Cryptographic Management Trends Around the Globe

Article | August 2, 2022

Digital transformation has become a mission-critical strategy as organizations are adopting new ways of scaling their business, remaining agile to meet demand, and innovating for the future. Cryptographic management goes hand in hand with digital transformation, as organizations must evolve and future-proof their end-to-end cryptographic environments to ensure they are secure, compliant, and highly available to protect and secure their data, assets, and transactions. I spoke with members of the global Futurex team — including Mark Howland, EMEA business development; Ruchin Kumar, vice president, South Asia; and Santos Campa, vice president, LAC — for their insights and perspectives on what cryptographic management challenges organizations are facing, implementation trends, and how they are future-proofing their systems. There are common themes across industries and countries: cryptographic management is challenging, organizations are keenly interested in agility and scalability, cloud migration is happening everywhere, and the compliance checklist is ever important. 1 EMEA: Future-Proofing with Virtualization When it comes to cryptographic management, the large financial institutions and major high-street banks have significant internal knowledge, best practices and their own ways of working and methodology. Across other organizations, we see the gamut: some are looking at new ways of doing things, such as HSM virtualization and cloud HSMs, while some are struggling with the skillset to configure and manage their existing systems. Throughout Europe, getting into data centers during the pandemic was difficult, resulting in challenges with on-premises cryptographic deployments and remote management. There are progressive thinkers, many working at startups, who are future-proofing their systems and looking into load balancing, remote management, and virtualization. While others, who have always worked with on-premises cryptographic equipment, are slower to move to the cloud with questions around latency, regulations, and availability. Howland speculates about what’s ahead: “Cryptography-as-a-service and virtualization will be expected.” Virtualization and the cloud enable organizations to be fluid in their services and abilities, accounting for scalability and growth without taking up rack space and being carbon neutral. “You have to scale for your worst-case scenario. If you have virtual HSMs, you can literally spin them up and down, so you're not having to manage 20 HSMs when, for 360 days of the year, you only need five. When you then look at the costs, administrative costs, power, it makes a good business case to virtualize rather than use hardware,” states Howland. Virtualization accounts for the ebb and flow of retailers, such as handling demand for Black Friday, Cyber Monday, and the holiday season. 2 LAC: Compliance and Cloud and Beyond Overall, organizations are looking to be compliant, secure, scalable, and flexible. “For the financial HSM industry, it seems that, in most cases, everything is moving to the cloud,” says Campa. Moving to the cloud is financially motivating and empowers customers with an agile business case. Campa sees three cryptographic implementation trends across Latin America: 1. The need to implement cryptographic infrastructure as soon as possible. 2. The need to grow the current infrastructure. Organizations want to make sure that they are investing in an infrastructure that is scalable and used for the long term. 3. Security reliability and compliance In Latin America, every financial customer needs to comply with PCI. In addition to PCI, there are regional compliance requirements to adhere to; for example, Mexico requires compliance with Comisión Nacional Bancaria y de Valores (CNBV) and Asociación de Bancos de Mexico (ABM). As a result, organizations prefer to invest in technologies that will be compliant with the next compliance regulations, including PCI and the next FIPS, to future-proof their cryptographic investments. Beyond point-to-point encryption and PCI DSS support, we are seeing customers adopting tokenization, remote key loading, and contactless payments on COTS (CPoC) — and increasing features and functionality one at a time. In parallel, some customers have decided to increase the ROI of their HSM investment by using general-purpose features to comply with government and local security requirements and regulations. Futurex is hosting the Futurex Summit: Mexico City 2022, July 19-21, 2022, an opportunity for attendees to learn how to streamline their encryption infrastructures. 3 South Asia: Trends in Multi-Purpose HSM, Cloud The cryptographic infrastructure has become an important part of the overall deployment of any project in organizations, and Kumar cites the lack of a centralized strategy as the main challenge. In India, he sees silos in most organizations, with overburdened budgets and resources. Data-centric security best practices can help organizations pass various security audits and mitigate unknown risks. Another pain point is around compliance and mandates from regulators. As with many countries, cryptography is deeply embedded in the information technology laws of India to provide confidentiality and integrity to critical information like personal identifiable information (PII) and financial information. Adhering to these regulations is mandatory for each and every project within enterprises, banking, and government. “India is running quite ahead in HSM and key management. Organizations are well versed in the subject,” acknowledges Kumar. Kumar sees many organizations interested in a single unified HSM platform that can handle both general purpose and payment functionalities to reduce implementation hassles. Additionally, as is common around the world, Kumar sees an interest in cloud migration and cryptography-as-a-service in South Asia. Many organizations are keen to outsource cryptographic management to a managed service provider or a cloud service provider to bring down the CAPEX cost for the customer, outsource complex cryptography operations to experts, and address regulatory compliance issues such as data localization and key localization. As we’re seeing in the United States and around the globe post-pandemic, many organizations are looking at digital transformation strategies and future-proofing their cryptographic management investments, including cloud enablement, redundancy and agility, and hybrid deployments — all of which will help to both maintain a strong security posture while adapting and embracing new challenges and opportunities.

Read More
PLATFORM SECURITY

Security-as-a-Service (SECaaS): A Cost-Effective Way of Cybersecurity

Article | August 12, 2022

Cybersecurity threats are growing by the day. Many businesses are unintentionally exposed to hackers and should investigate the possibilities of Security as a Service (SECaaS). While investing in a firewall, anti-virus software, physical office security, an intruder alarm, and CCTV could be insufficient. Unfortunately, in today's ever-changing digital world, this is not enough to keep today's cyber criminals at bay. Malware, ransomware, phishing, viruses, denial of service, distributed denial of service, man-in-the-middle, and brute force attacks are all examples of cybercrime. These are just a few of the methods cybercriminals utilize to attempt to undermine your network security. One of the simplest solutions to securing your system and network is to use security as a service, or SECaas. Why Should Businesses Deploy SECaaS? Depending on your company's demands, your SECaaS provider can build a customized security solution that protects your data, keeps your internal systems safe, and provides you with peace of mind at an affordable price. Cost Saving One of the most significant advantages of a Security-as-a-Service model is that it saves a company money. A cloud-delivered service is often provided in subscription levels with many upgrade possibilities, allowing businesses to pay for just what they need when they want it. It also eliminates the requirement for specialist skills. Updated Security Tools When you use SECaaS, you get access to the most up-to-date security technologies and resources. To be successful, anti-virus and other security solutions must be kept up-to-date with the most recent updates and virus definitions. These upgrades are handled for you on every server, PC, and mobile device by implementing SECaaS across your business. Greater Agility and Better Provisioning One of the most appealing aspects of as-a-service solutions is that your consumers can have rapid access to these products. SECaaS solutions can be scaled up or down as needed, and they are available on-demand where and when you need them. That means no more uncertainties about deployment or upgrades since everything is handled for you by your SECaaS supplier and accessible through a web-enabled dashboard. Make Resources Available When security provisions are maintained outside, your IT employees can concentrate on what matters most to your firm. SECaaS frees up resources, provides comprehensive visibility through management dashboards, and offers you the assurance that your IT security is being handled effectively by an outsourced security team. If you choose, you can delegate management of security procedures to your IT staff, who will handle all policy and system updates through a web interface. Consistent Security As new technology emerges, the provider's databases and protection software will be constantly updated and enhanced. Moreover, it will help in continually monitoring the network for threats using our innovative AI technology to offer round-the-clock security. A fully human-powered team cannot detect every danger, but AI augments human capabilities to give better protection. What Can SECaaS Safeguard Against? It's essential to know what Security-as-a-Service can defend against but also WHERE it will protect you. Your data is now everywhere; on laptops, mobile phones, tablets, local servers, edge servers, cloud services, and each platform has to be protected. SECaaS protects local network devices, edge services, cloud services, WiFi, mobile phones, and tablets. Some of the viruses from which SECaaS protects you are: Malware Ransomware Phishing Virus Denial of service (DoS) Distributed denial-of-service (DDoS) Man-in-the-middle Brute force attacks Closing Lines SECaaS has become the preferred company security approach due to its advantages. SECaaS decreases hardware costs, outsources and streamlines security administration, and eliminates the need for costly security professionals. Since many businesses are embracing cloud technology but are unsure about security, they require their service providers to handle it. SECaaS providers can solve cloud security challenges, including data breaches, DDoS assaults, and phishing.

Read More
SOFTWARE SECURITY

Secure your organization’s critical data and increase your bottom line through Vertex’s Managed Security Operations Centre (SOC) Services

Article | June 6, 2022

Over the last two years, cybersecurity has seen a tectonic upheaval as digital transformation efforts have been accelerated, the workforce has become more diverse, and threats have continued to evolve. Security teams are under looming pressure to neutralize more threats with the same number of resources as firms across industries face new cybersecurity concerns. Many security teams are stretched too thin to identify genuine threats quickly due to the never-ending deluge of warnings and vast volumes of log data to comb through daily. As a result, businesses must make updating their Security Operations Centers (SOC) a top priority. Modernizing the SOC plan involves directing resources into boosting security maturity and cybersecurity, with the goal of lowering the organization’s total risk. The best plan must be scalable enough to handle the changing and broad spectrum of security risks while also being adapted to the company’s specific requirements. As a consequence, threat detection and response across the whole environment has improved, as has visibility and team silos. Although each company’s route to SOC transformation is unique, there are a few critical aspects that all businesses should keep in mind when getting started. Let us look at a few of those in detail. Aligning Security Measures with Business Objectives. Beginning the process by aligning security priorities with corporate objectives. This stage is critical because it stops businesses from simply relying on technology. Budget, industry-specific rules and reporting requirements, and the company’s general risk tolerance are all factors to consider while developing these objectives. Considering this isn’t a one-and-done procedure, the Chief Information Security Officer (CISO) must maintain direct contact with the CEO and other top management officials to guarantee ongoing alignment. CISOs must be realistic about the biggest possible dangers to the firm when engaging with leadership about what is needed for SOC modernization and why, without resorting to negative tactics like spreading fear of threats. Team Vertex can help you align your corporate objectives with necessary security measures required to setup an SOC so your firm is prepared in the event of a cyber threat. Establishing a Security Readiness Standard Following the establishment of essential business goals with executive participation, the next stage in improving the overall security measure is to examine the SOC’s strengths and weaknesses. Security operations should be viewed as a crucial business function by companies. The operational efficacy of the SOC must be measured, just like any other critical business component, by examining which key performance indicators (KPIs) and service-level agreements (SLAs) are being satisfied. This standard offers a clear image of the most critical use cases as well as any gaps in the cybersecurity strategy that need to be addressed. It might be difficult to figure out how to make this list at first. However, security teams will have a clearer view of where opportunities to develop their operations exist if they measure against metrics like mean time to detect (MTTD) and mean time to respond (MTTR) to cyber-attacks. Team Vertex’s proficient team of analysts can help you analyze and identify the potential gaps in the system and examine the above-mentioned KPIs and SLAs. Incorporating a Cybersecurity Framework Now it is time to map an operating framework to connect your strategy with particular tactics, techniques, and procedures after you have clearly determined the most important gaps and set timescales and personnel needs. By employing these constantly developing libraries of threat actor tactics, security teams may pinpoint the business’s largest possible threats and assess their protection priorities carefully. Another paradigm to consider is zero trust. Rather than focusing on the corporate perimeter, it stresses an identity-centric paradigm that focuses on safeguarding resources (such as data, identities, and services) regardless of where they are located. Strengthen your defense by beefing up your SOC. The SOC is at the heart of a company’s offensive and defensive strategies against possible attackers. Organizations that do not have the capability to allocate a function or form an in-house team to handle SOC must resort to third party outsourced solutions. Vertex can be that third-party SOC solutions provider by providing an outsourced security operations center, or managed SOC. This permits your security logs to be aggregated into a separate location where our experienced team can examine them and identify the activities necessary to maintain your organization’s security infrastructure and remediate any incidents. Penetration testing, gap analysis, and better compliance are also available. Although no single solution can cure all your security issues, having all of the necessary components in place will help your firm weather the next digital storm, regardless of its source.

Read More

Spotlight

REDLattice Inc

REDLattice is a provider of advanced cyber capabilities across the government and Fortune 500 markets. Our experience ranges from basic and applied research to operations and deployment. Our team consists of recognized leaders in the design, development and implementation of cutting-edge applications and engineering services. Our core cyber capabilities include: Vulnerability assessment. Malware analysis.

Related News

SOFTWARE SECURITY

GrammaTech and T.E.N. Announce Call for Nominations for Product Security Executive of the Year Awards

GrammaTech | August 16, 2022

GrammaTech, a leading provider of application security testing products and software research services, and T.E.N., founder of the Information Security Executive® (ISE®) of the Year Awards, today announced the Product Security Executive (PSE) of the Year Awards. This annual competition will recognize individuals whose contributions have delivered advancements in security for embedded or commercial software products. Nominations are now being accepted through October 10, 2022 at The judging panel includes: Edna Conway, Vice President, Security & Risk Officer, Cloud Infrastructure at Microsoft, former CSO, Cisco Global Value Chain and a member of the Executive Committee of the U.S. Department of Homeland Security Task Force on ICT Supply Chain Risk Management. Malcolm Harkins, Chief Security & Trust Officer with Epiphany Systems, former Chief Security and Privacy Officer (CSPO) and the first CISO at Intel Corporation. Troy Rydman, Senior Practice Leader - Global Strategic Accounts, Security, Risk, & Compliance for Amazon Web Services (AWS) and former cybersecurity executive with Silicon Valley Bank, with fourteen years of increasing cybersecurity leadership. “In a world of increasingly autonomous products, from cars to appliances to robots, managing the integrity of the software that enables our connected world is critical. The Product Security Executives who drive quality, security and safety of our many devices are pivotal to the digital economy. “It is time to recognize these individuals and the significant contributions they make in securing the software at the heart of our hyper-connected world.” Edna Conway, VP, Security & Risk Officer, Microsoft Cloud Infrastructure Eligibility U.S.-based executives, including those with director, vice president, chief product security officer or similar titles, who are responsible for product security management are eligible for consideration. This includes individuals overseeing security at all stages of the product development lifecycle for software, firmware and/or embedded code; as well as secure product design, risk and vulnerability management and standards/regulatory compliance. There is no cost to enter. “There’s an increased emphasis on maintaining the safety and security of embedded software across virtually all industries, which is becoming the responsibility of a Product Security Executive whether or not the title exists,” said Andrew Meyer, Chief Marketing Officer for GrammaTech. “We collaborated with T.E.N. to create this award competition and recognize the men and women on the front lines of this new discipline, honor their accomplishments and share their best practices with the industry.” “The number of IoT devices is in the billions and we will continue to see an ever-growing number of devices become smart and connected,” explains Marci McCarthy, CEO and President of T.E.N. “Every device is at risk for cyberattacks, and threat actors are taking advantage of every opportunity to exploit product security vulnerabilities. Demand for product security has thus grown across multiple industries, especially consumer electronics, automotive and healthcare. Because product security is a relatively new concept whose time has come, we are thrilled to partner with GrammaTech to recognize individuals for advancements and innovations leading to more secure products going to market.” About T.E.N. T.E.N. is an award-winning technology and security networking and marketing firm that hosts relationship-building events between top Information Security executives, industry pioneers and innovative solution providers within the cybersecurity industry. Its flagship program, the nationally acclaimed Information Security Executive® (ISE®) of the Year Program Series and Awards, is North America’s largest leadership recognition and networking program for security professionals, honoring both leading executives and deserving project teams. About GrammaTech GrammaTech is a leading global provider of application security testing (AST) solutions used by the world’s most security conscious organizations to detect, measure, analyze and resolve vulnerabilities for software they develop or use. The company is also a trusted cybersecurity and artificial intelligence research partner for the nation’s civil, defense, and intelligence agencies. GrammaTech has corporate headquarters in Bethesda MD, a Research and Development Center in Ithaca NY, and publishes Shift Left Academy, an educational resource for software developers.

Read More

NETWORK THREAT DETECTION

Chariton Valley Commits To Protecting All Customers From Growing Cybersecurity Threats With Calix ProtectIQ Home Network Security

Calix | July 15, 2022

Calix, Inc. (NYSE: CALX) announced today that Chariton Valley Telephone Corporation (Chariton Valley) expects to double its customer connections after providing ProtectIQ® home network security to all customers at no cost. Chariton Valley leverages the full power of Calix Revenue EDGE to transform its value proposition and improve the customer experience. In May, the 70-year-old broadband service provider (BSP) launched ProtectIQ, part of Calix Revenue EDGE Suites, as it continues to roll out GigaSpire® BLAST systems across its Midwestern communities. In a climate of increased cybersecurity concerns, Chariton Valley has equipped all GigaSpire BLAST customers with effortless access to robust home network security. In doing so, the BSP increases customer loyalty across rural regions and nearby cities in north-central and northeast Missouri. Many Chariton Valley customers have sophisticated internet habits—half identify as gamers and almost 40 percent work from home. By evolving its value proposition, the innovative BSP has also fortified itself against billion-dollar market cap competition in Palmyra and Hannibal. In its first two months of offering ProtectIQ to all customers, Chariton Valley blocked more than 48,000 web threats, intrusions, malware, and viruses from entering home networks—proving the immediate value of its investments. The comprehensive Revenue EDGE platform enables BSPs of all sizes to easily and quickly launch differentiating turnkey, managed offerings. Chariton Valley continues to evolve its value proposition and strengthen its growing customer connections by: Transforming its business to help communities thrive for decades. Chariton Valley is on track to complete a historic five-year, $42 million fiber-to-the-home (FTTH) buildout in its member service territory, and another $40 million in expansion opportunities next year by leveraging the secure broadband access network platform, Calix Intelligent Access EDGE™. In May, it began rolling out turnkey, managed offerings in EDGE Suites, starting with ProtectIQ, recently recognized by the cybersecurity industry as “Best in Anti-Phishing, Network Security & Management,” at no cost to its customers. As a result, Chariton Valley blocked thousands of web threats in only two months—further proving the value of its investment in the region. Creating internet experiences that grow with customers’ needs. After the successful rollout of ProtectIQ, Chariton Valley is now taking a targeted approach to introduce its second EDGE Suite, the advanced parental controls in ExperienceIQ®. Calix-partnered BSPs have seen a 178 percent increase in people using ExperienceIQ since the beginning of the year. Both ProtectIQ and ExperienceIQ are accessed through the BSP’s branded subscriber-facing mobile app, built on CommandIQ®, giving customers more control over their home networks. Leveraging data and insights to offer services that meet each customer’s unique needs. Using the insights and analytics in Calix Marketing Cloud (Marketing Cloud), even a small BSP like Chariton Valley can successfully leverage data for segmenting and targeting. For example, Chariton Valley uses Marketing Cloud to uncover which of its customers are most likely to need the advanced parental controls of ExperienceIQ. Now their marketing team can quickly identify the right people for the new service. This enables Chariton Valley to get maximum ROI from every dollar invested in marketing. “As a member-owned organization, the customer experience informs everything we do,” said Kirby J. Underberg, president and chief executive officer at Chariton Valley. “Chariton Valley is committed to the region’s future—the investment we made building a secure fiber network will benefit people living in north-central and northeast Missouri for the next three decades. However, we also understand that we are responsible for protecting our customers from the increasing threat of digital dangers that come along with the positive generational impact of secure, fast Wi-Fi. By adding critical services like home network security and advanced parental controls, we will continue to invest in our customers by providing superior internet experiences long after the latest deals from our competitors expire.” Along with ProtectIQ and ExperienceIQ, EDGE Suites also includes connected home camera security systems (Arlo Secure). Additionally, Calix is launching two new managed offerings this summer: social media monitoring (Bark) and connected device protection (Servify Care). “Chariton Valley’s incredible first two months offering ProtectIQ to all customers underlines why today’s successful broadband business must be about more than just fast Wi-Fi, ProtectIQ has helped BSPs of all sizes block millions of digital threats in 2022. The Missouri-based market leader competes against a billion-dollar market cap company and wins because it leverages the full power of the Revenue EDGE platform to easily and quickly launch turnkey, managed offerings like ProtectIQ that improve the customer experience. We look forward to supporting Chariton Valley’s continued growth as they evolve their value proposition to reflect their commitment to protecting customers in north-central and northeast Missouri.” Matt Collins, executive vice president of commercial operations and chief marketing officer at Calix About Calix Calix, Inc. Calix cloud and software platforms enable service providers of all types and sizes to innovate and transform. Our customers utilize the real-time data and insights from Calix platforms to simplify their businesses and deliver experiences that excite their subscribers. The resulting growth in subscriber acquisition, loyalty, and revenue create more value for their businesses and communities. This is the Calix mission: to enable broadband service providers of all sizes to simplify, excite, and grow. This press release contains forward-looking statements that are based upon management’s current expectations and are inherently uncertain. Forward-looking statements are based upon information available to us as of the date of this release, and we assume no obligation to revise or update any such forward-looking statement to reflect any event or circumstance after the date of this release, except as required by law. Actual results and the timing of events could differ materially from current expectations based on risks and uncertainties affecting Calix’s business. The reader is cautioned not to rely on the forward-looking statements contained in this press release. Additional information on potential factors that could affect Calix’s results and other risks and uncertainties are detailed in its quarterly reports on Form 10-Q and Annual Report on Form 10-K filed with the SEC.

Read More

DATA SECURITY

ControlCase Partners with ConnectWise & FifthWall Solutions to Increase MSP Cybersecurity Maturity & Bridge Access to Cyber Insurance.

ControlCase | July 11, 2022

ControlCase, a leading provider of IT Security Certifications and Continuous Compliance Services announced its recent partnership with ConnectWise and FifthWall Solutions. Under this partnership, Managed Service Providers (MSPs) can now access the ConnectWise MSP+ security best practices framework from the ControlCase Compliance HubTM platform for both self-assessment and verification by ControlCase. This partnership also provides the rate-quote-bind assistance required for procuring insurance. ConnectWise’s MSP+ framework is derived from the NIST CSF framework and aims to help MSPs strengthen their cybersecurity program, increase cybersecurity maturity, and ultimately lower their risk of a data breach. MSP+ provides an affordable compliance framework that can be used as the foundation for an MSPs cybersecurity program. The MSP+ program is split into 3 parts: 1. MSP+ Self Assessment – Allows the MSP to access the framework and start implementing controls and closing gaps at their own pace. 2. MSP+ Advanced – Includes assistance with remediation and final verification by ControlCase. 3. MSP+ Mastery – Demonstrates a mature cybersecurity program and is also verified by ControlCase. “This partnership is a gamechanger for MSPs,” said Mike Jenner, CEO at ControlCase. “Security incidents involving MSPs, and their clients continue to rise. This rise necessitates stringent security controls to be implemented and the MSP+ framework provides a great place for MSPs to start learning about cybersecurity and implementing necessary controls.” Speaking on the achievement, Raffael Marty, General Manager -Cybersecurity at ConnectWise said “Cyber insurance is a critical element to help partners protect their legacy by building a more cyber-resilient business. This partnership will help MSPs increase their cybersecurity maturity, prepare for and procure insurance; eliminating dozens of steps they and their customers would otherwise have to take.” The ControlCase Compliance HubTM platform is integrated with ConnectWise Manage. MSPs can complete their MSP+ assessments without ever leaving their PSA. The MSP+ Advanced and Mastery offerings also include real-time compliance status and vital statistics such as risk rating and security milestone planning. “FifthWall is excited to be the dedicated Cyber Insurance & Risk Management Solution Provider,” said Reid Wellock, President, FifthWall Solutions. “We work with 35+ insurers to limit clients’ cyber exposure and give peace of mind for businesses of any size.” This partnership greatly simplifies MSPs and their clients' access to insurance.” For more information on this partnership and the related offerings, please contact Kimberly Simon at ksimon@controlcase.com About ControlCase ControlCase is a global provider of certification, cybersecurity, and continuous compliance services. ControlCase is committed to empowering organizations to develop and deploy strategic information security and compliance programs that are simplified, cost-effective, and comprehensive in both on-premises and cloud environments. ControlCase offers certifications and a broad spectrum of cyber security services that meet the needs of companies required to certify to PCI DSS, HITRUST, SOC 2 Type II, ISO 27001, PCI PIN, PCI P2PE, PCI TSP, PA DSS, CSA STAR, HIPAA, GDPR, SWIFT, and FedRAMP. About FifthWall Solutions FifthWall works with 35+ carriers to limit your clients’ cyber exposure and give peace of mind for businesses of any size. With our policies, MSPs and their clients are covered from business interruptions, cyber crimes, and several of the consequences that follow. With breach prevention and response tools, MSPs and their clients avoid risk and minimize impact in the event of a security incident.

Read More

SOFTWARE SECURITY

GrammaTech and T.E.N. Announce Call for Nominations for Product Security Executive of the Year Awards

GrammaTech | August 16, 2022

GrammaTech, a leading provider of application security testing products and software research services, and T.E.N., founder of the Information Security Executive® (ISE®) of the Year Awards, today announced the Product Security Executive (PSE) of the Year Awards. This annual competition will recognize individuals whose contributions have delivered advancements in security for embedded or commercial software products. Nominations are now being accepted through October 10, 2022 at The judging panel includes: Edna Conway, Vice President, Security & Risk Officer, Cloud Infrastructure at Microsoft, former CSO, Cisco Global Value Chain and a member of the Executive Committee of the U.S. Department of Homeland Security Task Force on ICT Supply Chain Risk Management. Malcolm Harkins, Chief Security & Trust Officer with Epiphany Systems, former Chief Security and Privacy Officer (CSPO) and the first CISO at Intel Corporation. Troy Rydman, Senior Practice Leader - Global Strategic Accounts, Security, Risk, & Compliance for Amazon Web Services (AWS) and former cybersecurity executive with Silicon Valley Bank, with fourteen years of increasing cybersecurity leadership. “In a world of increasingly autonomous products, from cars to appliances to robots, managing the integrity of the software that enables our connected world is critical. The Product Security Executives who drive quality, security and safety of our many devices are pivotal to the digital economy. “It is time to recognize these individuals and the significant contributions they make in securing the software at the heart of our hyper-connected world.” Edna Conway, VP, Security & Risk Officer, Microsoft Cloud Infrastructure Eligibility U.S.-based executives, including those with director, vice president, chief product security officer or similar titles, who are responsible for product security management are eligible for consideration. This includes individuals overseeing security at all stages of the product development lifecycle for software, firmware and/or embedded code; as well as secure product design, risk and vulnerability management and standards/regulatory compliance. There is no cost to enter. “There’s an increased emphasis on maintaining the safety and security of embedded software across virtually all industries, which is becoming the responsibility of a Product Security Executive whether or not the title exists,” said Andrew Meyer, Chief Marketing Officer for GrammaTech. “We collaborated with T.E.N. to create this award competition and recognize the men and women on the front lines of this new discipline, honor their accomplishments and share their best practices with the industry.” “The number of IoT devices is in the billions and we will continue to see an ever-growing number of devices become smart and connected,” explains Marci McCarthy, CEO and President of T.E.N. “Every device is at risk for cyberattacks, and threat actors are taking advantage of every opportunity to exploit product security vulnerabilities. Demand for product security has thus grown across multiple industries, especially consumer electronics, automotive and healthcare. Because product security is a relatively new concept whose time has come, we are thrilled to partner with GrammaTech to recognize individuals for advancements and innovations leading to more secure products going to market.” About T.E.N. T.E.N. is an award-winning technology and security networking and marketing firm that hosts relationship-building events between top Information Security executives, industry pioneers and innovative solution providers within the cybersecurity industry. Its flagship program, the nationally acclaimed Information Security Executive® (ISE®) of the Year Program Series and Awards, is North America’s largest leadership recognition and networking program for security professionals, honoring both leading executives and deserving project teams. About GrammaTech GrammaTech is a leading global provider of application security testing (AST) solutions used by the world’s most security conscious organizations to detect, measure, analyze and resolve vulnerabilities for software they develop or use. The company is also a trusted cybersecurity and artificial intelligence research partner for the nation’s civil, defense, and intelligence agencies. GrammaTech has corporate headquarters in Bethesda MD, a Research and Development Center in Ithaca NY, and publishes Shift Left Academy, an educational resource for software developers.

Read More

NETWORK THREAT DETECTION

Chariton Valley Commits To Protecting All Customers From Growing Cybersecurity Threats With Calix ProtectIQ Home Network Security

Calix | July 15, 2022

Calix, Inc. (NYSE: CALX) announced today that Chariton Valley Telephone Corporation (Chariton Valley) expects to double its customer connections after providing ProtectIQ® home network security to all customers at no cost. Chariton Valley leverages the full power of Calix Revenue EDGE to transform its value proposition and improve the customer experience. In May, the 70-year-old broadband service provider (BSP) launched ProtectIQ, part of Calix Revenue EDGE Suites, as it continues to roll out GigaSpire® BLAST systems across its Midwestern communities. In a climate of increased cybersecurity concerns, Chariton Valley has equipped all GigaSpire BLAST customers with effortless access to robust home network security. In doing so, the BSP increases customer loyalty across rural regions and nearby cities in north-central and northeast Missouri. Many Chariton Valley customers have sophisticated internet habits—half identify as gamers and almost 40 percent work from home. By evolving its value proposition, the innovative BSP has also fortified itself against billion-dollar market cap competition in Palmyra and Hannibal. In its first two months of offering ProtectIQ to all customers, Chariton Valley blocked more than 48,000 web threats, intrusions, malware, and viruses from entering home networks—proving the immediate value of its investments. The comprehensive Revenue EDGE platform enables BSPs of all sizes to easily and quickly launch differentiating turnkey, managed offerings. Chariton Valley continues to evolve its value proposition and strengthen its growing customer connections by: Transforming its business to help communities thrive for decades. Chariton Valley is on track to complete a historic five-year, $42 million fiber-to-the-home (FTTH) buildout in its member service territory, and another $40 million in expansion opportunities next year by leveraging the secure broadband access network platform, Calix Intelligent Access EDGE™. In May, it began rolling out turnkey, managed offerings in EDGE Suites, starting with ProtectIQ, recently recognized by the cybersecurity industry as “Best in Anti-Phishing, Network Security & Management,” at no cost to its customers. As a result, Chariton Valley blocked thousands of web threats in only two months—further proving the value of its investment in the region. Creating internet experiences that grow with customers’ needs. After the successful rollout of ProtectIQ, Chariton Valley is now taking a targeted approach to introduce its second EDGE Suite, the advanced parental controls in ExperienceIQ®. Calix-partnered BSPs have seen a 178 percent increase in people using ExperienceIQ since the beginning of the year. Both ProtectIQ and ExperienceIQ are accessed through the BSP’s branded subscriber-facing mobile app, built on CommandIQ®, giving customers more control over their home networks. Leveraging data and insights to offer services that meet each customer’s unique needs. Using the insights and analytics in Calix Marketing Cloud (Marketing Cloud), even a small BSP like Chariton Valley can successfully leverage data for segmenting and targeting. For example, Chariton Valley uses Marketing Cloud to uncover which of its customers are most likely to need the advanced parental controls of ExperienceIQ. Now their marketing team can quickly identify the right people for the new service. This enables Chariton Valley to get maximum ROI from every dollar invested in marketing. “As a member-owned organization, the customer experience informs everything we do,” said Kirby J. Underberg, president and chief executive officer at Chariton Valley. “Chariton Valley is committed to the region’s future—the investment we made building a secure fiber network will benefit people living in north-central and northeast Missouri for the next three decades. However, we also understand that we are responsible for protecting our customers from the increasing threat of digital dangers that come along with the positive generational impact of secure, fast Wi-Fi. By adding critical services like home network security and advanced parental controls, we will continue to invest in our customers by providing superior internet experiences long after the latest deals from our competitors expire.” Along with ProtectIQ and ExperienceIQ, EDGE Suites also includes connected home camera security systems (Arlo Secure). Additionally, Calix is launching two new managed offerings this summer: social media monitoring (Bark) and connected device protection (Servify Care). “Chariton Valley’s incredible first two months offering ProtectIQ to all customers underlines why today’s successful broadband business must be about more than just fast Wi-Fi, ProtectIQ has helped BSPs of all sizes block millions of digital threats in 2022. The Missouri-based market leader competes against a billion-dollar market cap company and wins because it leverages the full power of the Revenue EDGE platform to easily and quickly launch turnkey, managed offerings like ProtectIQ that improve the customer experience. We look forward to supporting Chariton Valley’s continued growth as they evolve their value proposition to reflect their commitment to protecting customers in north-central and northeast Missouri.” Matt Collins, executive vice president of commercial operations and chief marketing officer at Calix About Calix Calix, Inc. Calix cloud and software platforms enable service providers of all types and sizes to innovate and transform. Our customers utilize the real-time data and insights from Calix platforms to simplify their businesses and deliver experiences that excite their subscribers. The resulting growth in subscriber acquisition, loyalty, and revenue create more value for their businesses and communities. This is the Calix mission: to enable broadband service providers of all sizes to simplify, excite, and grow. This press release contains forward-looking statements that are based upon management’s current expectations and are inherently uncertain. Forward-looking statements are based upon information available to us as of the date of this release, and we assume no obligation to revise or update any such forward-looking statement to reflect any event or circumstance after the date of this release, except as required by law. Actual results and the timing of events could differ materially from current expectations based on risks and uncertainties affecting Calix’s business. The reader is cautioned not to rely on the forward-looking statements contained in this press release. Additional information on potential factors that could affect Calix’s results and other risks and uncertainties are detailed in its quarterly reports on Form 10-Q and Annual Report on Form 10-K filed with the SEC.

Read More

DATA SECURITY

ControlCase Partners with ConnectWise & FifthWall Solutions to Increase MSP Cybersecurity Maturity & Bridge Access to Cyber Insurance.

ControlCase | July 11, 2022

ControlCase, a leading provider of IT Security Certifications and Continuous Compliance Services announced its recent partnership with ConnectWise and FifthWall Solutions. Under this partnership, Managed Service Providers (MSPs) can now access the ConnectWise MSP+ security best practices framework from the ControlCase Compliance HubTM platform for both self-assessment and verification by ControlCase. This partnership also provides the rate-quote-bind assistance required for procuring insurance. ConnectWise’s MSP+ framework is derived from the NIST CSF framework and aims to help MSPs strengthen their cybersecurity program, increase cybersecurity maturity, and ultimately lower their risk of a data breach. MSP+ provides an affordable compliance framework that can be used as the foundation for an MSPs cybersecurity program. The MSP+ program is split into 3 parts: 1. MSP+ Self Assessment – Allows the MSP to access the framework and start implementing controls and closing gaps at their own pace. 2. MSP+ Advanced – Includes assistance with remediation and final verification by ControlCase. 3. MSP+ Mastery – Demonstrates a mature cybersecurity program and is also verified by ControlCase. “This partnership is a gamechanger for MSPs,” said Mike Jenner, CEO at ControlCase. “Security incidents involving MSPs, and their clients continue to rise. This rise necessitates stringent security controls to be implemented and the MSP+ framework provides a great place for MSPs to start learning about cybersecurity and implementing necessary controls.” Speaking on the achievement, Raffael Marty, General Manager -Cybersecurity at ConnectWise said “Cyber insurance is a critical element to help partners protect their legacy by building a more cyber-resilient business. This partnership will help MSPs increase their cybersecurity maturity, prepare for and procure insurance; eliminating dozens of steps they and their customers would otherwise have to take.” The ControlCase Compliance HubTM platform is integrated with ConnectWise Manage. MSPs can complete their MSP+ assessments without ever leaving their PSA. The MSP+ Advanced and Mastery offerings also include real-time compliance status and vital statistics such as risk rating and security milestone planning. “FifthWall is excited to be the dedicated Cyber Insurance & Risk Management Solution Provider,” said Reid Wellock, President, FifthWall Solutions. “We work with 35+ insurers to limit clients’ cyber exposure and give peace of mind for businesses of any size.” This partnership greatly simplifies MSPs and their clients' access to insurance.” For more information on this partnership and the related offerings, please contact Kimberly Simon at ksimon@controlcase.com About ControlCase ControlCase is a global provider of certification, cybersecurity, and continuous compliance services. ControlCase is committed to empowering organizations to develop and deploy strategic information security and compliance programs that are simplified, cost-effective, and comprehensive in both on-premises and cloud environments. ControlCase offers certifications and a broad spectrum of cyber security services that meet the needs of companies required to certify to PCI DSS, HITRUST, SOC 2 Type II, ISO 27001, PCI PIN, PCI P2PE, PCI TSP, PA DSS, CSA STAR, HIPAA, GDPR, SWIFT, and FedRAMP. About FifthWall Solutions FifthWall works with 35+ carriers to limit your clients’ cyber exposure and give peace of mind for businesses of any size. With our policies, MSPs and their clients are covered from business interruptions, cyber crimes, and several of the consequences that follow. With breach prevention and response tools, MSPs and their clients avoid risk and minimize impact in the event of a security incident.

Read More

Events