Important cybersecurity statistics for 2019

January 20, 2019 | 122 views

Digital economy is growing everywhere in the world. Technology is changing our livelihoods in unprecedented ways. We cannot imagine life without internet or without using technology in our day-to-day chores. It has certainly altered the nature’s way of evolution, but it also means that there is a very different kind of warfare happening all the time. Cyber attacks have been in the news in past decade and they only seem to increase causing more damage to businesses, raking more money for the exploits. Here are some facts to look at- Cybersecurity Facts. In 2017 alone, 70% of organizations believed their security risk increased massively. (Ponemon Institute). Just the number of passwords used by bots as well as humans would grow to 300 billion. (SC Media). Small business is more vulnerable to cyber attacks, almost 43 percent. (Small Business Trends). Almost 200,000 new variants of malware are produced each day and likely the number is growing every year (Panda Security).

Spotlight

QBIT Ltd

QBIT is the UK’s leading provider of training for software testers, having trained over 24,000 testing professionals for major organizations in industry, government, finance and media since 1998. QBIT’s parent company, Sogeti (a CapGemini company) is the largest provider of Testing and Quality Assurance services in the world, employing over 18,000 testing professionals.

OTHER ARTICLES
PLATFORM SECURITY

The Great CISO Resignation

Article | July 12, 2022

CISOs Are Leaving in Droves The Great Resignation has been front-page news since Covid lockdowns, with many employees looking for the work-life balance they enjoyed at the time. Now, the phenomenon has spread to the role of Chief Information Security Officer (CISO) and shows no signs of letting up. In fact, industry experts predict that it is likely to worsen. A recent study from cybersecurity company BlackFog found that 32% of CISOs in the U.K. and U.S. have considered leaving and many planned to do so in just six months. The majority noted that the top reason for leaving was a lack of work-life balance. The CISO role is demanding, with firefighting and frequent changes in regulations and customer expectations taking up significant time both on and off the job. In another recent study in which 581 CISOs were surveyed, the IANS Research and Artico Search explored CISO compensation and job satisfaction. Three-fourths of CISOs are satisfied with their job, which is 7% higher than in the 2021 sample and more than double that of the 2020 sample. The main drivers of satisfaction are compensation, budget, executive visibility, and organizational support. However, despite high satisfaction numbers, the study found that as many as 44% of respondents are considering a job change. CISO Challenges LIABILITY AND EXPOSURE OF THE CISO There is a perception that CISOs face heightened liability for cyber intrusions and the response to cyber events. One extraordinary example is the recent conviction of Uber’s former security officer, which represents the first time a security executive has faced federal crime prosecution over a data security response. In this case the finding was that he obstructed justice by concealing information about a breach, destroying data, and covering up the incident. CISOs are often in the hot seat when it comes to cyber-intrusions and how they are handled. The Board of Directors (possibly including named corporate officers) in most cases are protected by being diligent about the Business Judgement Rule (BJR). Heavily adopted in Delaware case law and since adopted in various forms in many states, this “rule” stipulates that proper oversight includes demonstrating the duty of loyalty (no conflicting interests) and duty of care (make informed decisions) to be protected from liability. There are few cases (although Enron being one) where liability was found but it was for illegalities and poor business judgment. Since CISOs are not named corporate officers in most cases, BJR does not provide comfort. Similarly, liability insurance which covers legal defense fees and cash judgments often covers only directors and named corporate officers unless the CISO has been specifically included in the policy. DUTY TO REPORT Improving Board-CISO Transparency There is a mechanism found in corporate governance best-practices for ensuring that the most senior people in an organization get direct, unfiltered input from a key executive, regardless of reporting structure. It is called the executive session. This is in common use by Boards of Directors who meet individually with the Chief Financial Officer, Controller, and other key executives, notably without other management in the room. Questions are intended to be penetrating and the respondent is expected to respond openly. Now that cybersecurity has risen to a top risk for the enterprise, the CISO position should be among those who appear individually in an executive session with the highest governing body of an enterprise at least annually. This addition to governance best-practices would give Board members and State governors unfiltered information on cybersecurity matters, thereby helping to fulfil their oversight responsibility. Bob Zukis, founder and CEO of the Digital Directors Network, reports that a survey of its membership of more than 900 IT, cyber, and boardroom leaders shows nearly half of the respondents already have some form of this policy in practice. However, this is still a minority of the overall CISO population, signaling more transparency between the CISO and Board is needed. CISOs in State Governments Government organizations also face many of these issues. Evidence shows that CISOs in state governments are as vulnerable to other job offers as CISOs in the private sector. In the span of eight days in October 2022, there were several reports of state CISOs resigning, including Oklahoma, Georgia, Pennsylvania, and North Dakota. [1] Legal liability is not an issue the government CISO needs to be worried about since governments and their employees are immune from legal suits. However, government CISOs are highly concerned about shouldering blame, especially in the press, for security intrusions or their coverup. As with private industry, state governments should also institute this recommended practice. NCC recommends CISOs be called upon to appear in an executive session with agency heads and even the governor at least once a year. The State of Texas, for example, already has a version of this policy implemented in a statute and in practice. Texas Administrative Code includes provisions for: Reporting, at least annually, directly to the agency head the status and effectiveness of the security program and its controls. Informing any relevant parties in the event of noncompliance with the state agency’s information security policies Resolving the Great CISO Resignation For organizations across the public and private sectors, cybersecurity has risen to one of the top risks and has increased the importance of the role of the CISO. Most are looking to improve their work-life balance and reduce some of the stressors of the job. While many CISOs are also concerned about trends in liability and becoming headline news for decisions made on the job, requiring CISOs to appear in executive sessions with board members or state governors can help to alleviate these concerns and improve CISO job satisfaction while at the same time improving how the most senior levels of organizations fulfil their responsibilities for oversight of top risks.

Read More
DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Top 5 Application Security Trends Businesses Must Be Aware of in 2023

Article | August 12, 2022

Introduction Top 5 Trends for Businesses to Improve Their Existing Application Security 1.AppSec and Convergence 2.Adoption of Automated AI Security Capabilities 3.Emphasis on Securing the Software Supply Chain 4.Extreme 'Shift Left' 5.Upsurge in Demand for Vulnerability Prioritization Moving Forward with Application Security Introduction The proliferation of applications and their usage across the business landscape has made application security a strategic initiative that spans departments rather than an activity. Several factors are driving the rethinking of application security as a broader strategic program, including the evolving threat landscape, more incremental software development frameworks, and the adoption of nimbler. With the acceleration of software development and the greater-than-ever role of code in current business infrastructure, application security is shifting left in the process and infusing every step to ensure that the applications reaching customers' hands are secure and reliable. Top 5 Trends for Businesses to Improve Their Existing Application Security Applications serve as a doorway to servers and networks, making them an excellent target for malicious actors. Since cyber attackers constantly improve their techniques for breaking into software, it is becoming essential for businesses to gain insights into ever-evolving trends in the AppSec space. Here are some of the prominent trends that businesses should aware of to improve their existing application security. Trend 1: AppSec and CloudSec Convergence To accurately estimate attack surface and overall security posture, both application code vulnerabilities and cloud service hosting misconfigurations must be examined. The convergence of AppSec and CloudSec is becoming a critical component of modern security operations. It allows organizations to gain a comprehensive view of the attack surface and better understand the risks posed by application code and cloud service providers. By looking at these two areas cohesively, organizations can identify business-critical vulnerabilities and prioritize their remediation efforts. Trend 2: Adoption of Automated AI Security Capabilities The increasing volume and complexity of security threats pose significant challenges for organizations, causing strain on their threat detection and response capabilities. This leads to slower response times, higher costs, and a greater impact on security incidents. To address this issue, many companies are turning to security automation as a potential solution. One of such approaches involves the use of artificial intelligence (AI), which can automate data gathering, threat identification, and incident response processes. By adopting security automation, companies can optimize the use of limited security personnel and resources, enabling them to focus on high-value activities that provide maximum benefit to the organization. Trend 3: Emphasis on Securing the Software Supply Chain The software supply chain is emerging as a primary area of focus due to the heightened risks associated with software development. This urgency has been further compounded by the recent attack, such as Solarwind data breach and the Log4j attack on Apache, increasing the significance of software security measures. Companies are taking a more proactive approach for making enhancements in the software supply chain to protect their applications, including conducting Static Application Security Testing (SAST) to identify and address vulnerabilities before malicious actors can exploit them. Trend 4: Extreme 'Shift Left' The ‘shift left’ in software development has gained significant momentum in recent years. The idea behind this approach is to prioritize security and other critical aspects of software development at the earliest possible stage in the development process. By doing so, organizations can make more informed security decisions and identify and address security vulnerabilities before they cause any damage. As the pace of development continues to increase, organizations are increasingly adopting this approach in their software development processes to protect their systems and data from security risks. Trend 5: Upsurge in Demand for Vulnerability Prioritization Managing vulnerabilities in a software system requires analyzing vast amounts of data to determine issues that require immediate attention and prioritization. However, the growing presence of false positives is negatively impacting this process, resulting in decreased efficiency and wasted resources. Organizations are increasingly looking for vendors to provide vulnerability management tools that can reduce false positives, differentiate between low-priority issues and severe security threats, and offer actionable insights to mitigate them. Moving Forward with Application Security Applications security has become more critical than ever before for businesses in the current digital scape. With the attack surface constantly expanding and the frequency of threats on the rise, organizations must remain agile and employ the best effective strategies to protect their applications from potential cyberattacks. The significance of application security has not gone unnoticed. As organizations continue to invest in security measures, they are increasingly upgrading themselves as per emerging security trends to protect themselves against evolving cyber threats. This includes adopting the ‘shift left’ approach, tightening controls, and having a clear definition of remediation processes.

Read More
DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Security by Sector: Improving Quality of Data and Decision-Making a Priority for Credit Industry

Article | March 29, 2023

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and risks than others? Do some do a better job of keeping data secure, and if so, how and why?A new study of credit management professionals has revealed that improving the quality of data and decision-making will be a top priority for the credit industry in the next three years. The research, from Equifax Ingnite in collaboration with Coleman Parkes, takes a deep dive into the views of credit management pros across retail, banking, finance and debt management/recovery sectors.

Read More

3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

Article | February 12, 2020

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full effect, we saw expensive fines levied upon companies that fell victim to data privacy breaches. As we move into a new year, probably the biggest takeaway from 2019 is that being proactive and having a data privacy strategy in place is important to help mitigate the risk of a data privacy breach. The regulatory landscape continues to evolve as states and countries actively pass new expanded requirements for privacy and cybersecurity regulations. While laws in the U.S., like the California Consumer Privacy Act (CCPA), are getting significant attention, many other states and countries are actively amending their breach notification laws to include tighter restrictions.

Read More

Spotlight

QBIT Ltd

QBIT is the UK’s leading provider of training for software testers, having trained over 24,000 testing professionals for major organizations in industry, government, finance and media since 1998. QBIT’s parent company, Sogeti (a CapGemini company) is the largest provider of Testing and Quality Assurance services in the world, employing over 18,000 testing professionals.

Related News

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Centripetal Expands Internationally with the Launch of its European Cyber Intelligence Centre of Excellence

Businesswire | May 29, 2023

Centripetal, the global leader in intelligence powered cybersecurity, today announced that it has opened its Galway based European Cyber Intelligence Centre of Excellence to address cybersecurity opportunities in the UK, Ireland and across Europe. Additionally, the company is enabling cloud-based deployments of its CleanINTERNET® solution for total enterprise protection. Centripetal is headquartered in the US and has plans to create 50 jobs in Galway. The project is supported by the Government of Ireland through IDA Ireland. According to the International Trade Administration, the cybersecurity market in Ireland is thriving, valued at €280 million. However, with economic crime and fraud on the rise in recent years, cybercrime is extremely disruptive in how it impacts the business community. Grant Thornton Ireland reports that the cost of cybercrime in Ireland exceeded €9.6 billion in 2020. With the opening of Centripetal’s European Cyber Intelligence Centre of Excellence, the company will bring its innovative, patented technologies to the European market to protect organizations from every known cyberthreat. Centripetal’s European Cyber Intelligence Centre of Excellence will serve as the central hub where new and existing customers can work with Centripetal to gain insight on the current European and global threat landscape and how they might be affected. Customers will have access to Centripetal’s global cyber intelligence operations analyst team, who continuously analyze emerging threats, highlighting critical risks and applying global threat intelligence. “Today’s jobs announcement is yet another vote of confidence in Galway, in our available skilled workforce and in our city and county as a great place to work and live. Galway was home to a number of significant investment announcements last year including Fidelity Investment, Genesys, SAP and Diligent, so Centripetal are certainly in good company,” said Minister Hildegarde Naughton TD. “Congratulations again to the entire team at Centripetal and thank you for choosing not only Galway but the people of Galway.” ‘’The news that Centripetal is to open a European Cyber Intelligence Centre of Excellence in Galway is great news for the West Region and this investment will support the development of the wider technology ecosystem in Ireland for cyber,” said Anne-Marie Tierney Le-Roux, Head of Department Enterprise Technology at IDA Ireland. “The creation of 50 jobs is a vote of confidence in the talent and skill set that our regional locations in Ireland have to offer. I would like to wish Centripetal every success as they scale operations.’’ To give customers the ability to access intelligence powered cybersecurity everywhere, Centripetal’s CleanINTERNET® CLOUD is now available for deployment. The CleanINTERNET® service is a revolutionary approach to defending a company’s assets from cyber threats by leveraging dynamic threat intelligence on a mass scale. The solution can be deployed to protect assets running in cloud environments, providing unparalleled cyber defense and removing the need for more costly cybersecurity infrastructure. The addition of AWS cloud support extends CleanINTERNET® to protect all enterprise assets whether on premises, remote or in the cloud. Centripetal will additionally provide CleanINTERNET® on Azure and Google Cloud Platform in late 2023. “Centripetal is the only cybersecurity vendor that delivers intelligence powered protection that neutralizes every known cyberattack at the network level while simultaneously driving down the cost of security operations,” said Jonathan Rogers, Chief Operating Officer for Centripetal. “Our innovative technology is an industry first and we’re thrilled to be partnering with the IDA to bring our solution to Ireland and the UK to not only provide unparalleled protection for our customers but also valuable employment opportunities for the country.” Centripetal uses threat intelligence to shield organizations from 99% of known cyberthreats globally with CleanINTERNET®. This uniquely managed cyber defense service provides greater effectiveness, lower costs, and enhanced security expertise to defend networks from attacks. Centripetal goes beyond traditional threat intelligence methods and pushes the industry forward by operationalizing the world's largest collection of threat intelligence: With over 250 Threat Intelligence providers, CleanINTERNET® applies over 100 billion indicators of compromise from real-time intelligence feeds, updated every 15 minutes, to protect its customers' networks. Centripetal defends customers networks by providing the fastest packet filtering technology on the planet, applying millions of threat intelligence based rules to incoming and outgoing datastreams with zero latency. Centripetal’s elite team of highly trained intelligence operations analysts acts as an extension of its customer’s internal cybersecurity team, who monitor and analyze emerging threats. This mitigates the skills gap and reduces the burden on overworked IT resources. For more information on Centripetal’s offering and its latest global European expansion, visit www.centripetal.ai/centripetal-ireland/ ABOUT CENTRIPETAL Centripetal, a global leader in intelligence powered cybersecurity, is operationalizing the world’s largest collection of threat intelligence, in real-time, to protect organizations from every known cyberthreat through its innovative patented technologies. Through its CleanINTERNET® service, Centripetal delivers a highly effective solution leveraging the latest computing technology and skilled intelligence operators at a significantly lower cost. We are experts in intelligence, with a team comprised of cryptologists, and security analysts from the U.S. Intelligence & Defense community who have protected the most sensitive assets in the world. Centripetal is based in Reston, VA with offices in Portsmouth, NH and Galway, Ireland. For more information, visit www.centripetal.ai.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

NordLocker introduces easier secure sharing option

Globenewswire | May 26, 2023

NordLocker has launched a new feature that allows users to securely share a password-protected locker, otherwise known as a folder, of files. In order to receive the sent files, the recipient doesn’t even need to be a NordLocker user. This convenient sharing feature is incredibly easy to use. The files are shared via a link, and the recipient needs a password to access the files. For security purposes, once the set expiration date passes, the link becomes inaccessible. Thanks to NordLocker’s end-to-end encryption, files are fully protected throughout their journey. “Whether it’s holiday videos or a client contract – here at NordLocker we believe that all files should be shared securely. With this new feature, we make secure sharing that much easier,” says Aivaras Vencevicius, head of product at NordLocker. Currently, this feature is available on NordLocker’s web application. Other improvements In addition, NordLocker has introduced biometrics on iOS, which allows a more convenient and quicker login. iOS users are now also able to download NordLocker application logs for more information on their app. As privacy is at NordLocker’s core, it’s worth noting that these activity logs are encrypted and stored on the customer’s side. NordLocker’s customer support can only see it if the user decides to share it with the NordLocker team. “With cybercrime rising every year, file encryption is becoming essential. We see that threats are becoming more sophisticated – phishing emails are becoming harder to detect, and malware is becoming more dangerous and advanced. Therefore I strongly recommend to treat your digital belongings just like you’d treat your physical assets – keep them locked up and secure,” says Aivaras Vencevicius, head of product at NordLocker. ABOUT NORDLOCKER NordLocker is the world’s first end-to-end file encryption tool with a private cloud. It was created by the cybersecurity experts behind NordVPN – one of the most advanced VPN service providers in the world. NordLocker is available for Windows, macOS, Android, iOS, supports all file types, offers a fast and intuitive interface, and guarantees secure sync between devices. With NordLocker, files are protected from hacking, surveillance, and data collection. For more information: nordlocker.com.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Blackpoint Launches New Product Expanding Security Ecosystem

Prnewswire | May 26, 2023

Blackpoint Cyber, the elite technology-focused cybersecurity company providing its streamlined security suite via managed service providers (MSPs), announced today the launch of its newest product, Managed Application Control, continuing Blackpoint's investment in building out the most comprehensive MSP security ecosystem available. The new solution goes beyond traditional approaches to application control, simplifying security management and improving productivity for MSPs and the businesses they serve. Threat actors often evade endpoint protection systems by "living off the land," or misusing legitimate IT tools native to the target environment. Managed Application Control protects from these attacks with a uniquely curated, constantly updated block list of applications by Blackpoint's threat intelligence team. The approach stands in contrast to pure zero-trust or deny-all methods of application control, which produce operational bottlenecks. With Managed Application Control, organizations can still create custom rules and allow exceptions. But with Blackpoint's newest offering, IT administrators can reduce time spent on allowlists and endless verification requests. "Our team knows the attacker tradecraft, so introducing another layer of security to our already robust ecosystem through Managed Application Control, at no additional cost, just makes sense," said Jon Murchison, CEO and founder of Blackpoint Cyber. "Protecting our partners and their customers is our primary goal, and we are committed to providing MSPs with an easily accessible bundle of solutions. It comes down to providing our partners with the most value on the market, including this new product, so they can protect their customers and focus on their margins and operations. It's extra productivity with no extra cost." Blackpoint's team of top-tier experts and products focus on blocking risky and malicious applications. When an application is blocked, Blackpoint's security operations center (SOC) intervenes to investigate and stop any intrusion attempts, providing unparalleled protection and peace of mind for MSPs and their clients. "At Blackpoint, we have always focused on threat actor mentality so we can stop threats as early in the attack cycle as possible," said David Rushmer, director of Blackpoint Cyber's Adversary Pursuit Group. "With Managed Application Control, the ability to dynamically respond to potential intrusions across the threat landscape means improved protection for our customers." The offering is the latest addition to Blackpoint Response, a packaged bundle of integrated cybersecurity solutions that includes Managed Detection and Response (MDR), Managed Defender for Endpoint, Vulnerability Management, and Cloud Response for a unified defense against cyber threats. ABOUT BLACKPOINT CYBER Blackpoint Cyber offers a world-class, nation-state-grade cybersecurity ecosystem serving the MSP community. Using its own software and Security Operations Center (SOC), Blackpoint's true 24/7 Managed Detection & Response (MDR) service not only detects breaches earlier than any other solution on the market, but also provides an actual response rather than just an alert to keep MSPs and their clients' networks safe from widespread damage.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Centripetal Expands Internationally with the Launch of its European Cyber Intelligence Centre of Excellence

Businesswire | May 29, 2023

Centripetal, the global leader in intelligence powered cybersecurity, today announced that it has opened its Galway based European Cyber Intelligence Centre of Excellence to address cybersecurity opportunities in the UK, Ireland and across Europe. Additionally, the company is enabling cloud-based deployments of its CleanINTERNET® solution for total enterprise protection. Centripetal is headquartered in the US and has plans to create 50 jobs in Galway. The project is supported by the Government of Ireland through IDA Ireland. According to the International Trade Administration, the cybersecurity market in Ireland is thriving, valued at €280 million. However, with economic crime and fraud on the rise in recent years, cybercrime is extremely disruptive in how it impacts the business community. Grant Thornton Ireland reports that the cost of cybercrime in Ireland exceeded €9.6 billion in 2020. With the opening of Centripetal’s European Cyber Intelligence Centre of Excellence, the company will bring its innovative, patented technologies to the European market to protect organizations from every known cyberthreat. Centripetal’s European Cyber Intelligence Centre of Excellence will serve as the central hub where new and existing customers can work with Centripetal to gain insight on the current European and global threat landscape and how they might be affected. Customers will have access to Centripetal’s global cyber intelligence operations analyst team, who continuously analyze emerging threats, highlighting critical risks and applying global threat intelligence. “Today’s jobs announcement is yet another vote of confidence in Galway, in our available skilled workforce and in our city and county as a great place to work and live. Galway was home to a number of significant investment announcements last year including Fidelity Investment, Genesys, SAP and Diligent, so Centripetal are certainly in good company,” said Minister Hildegarde Naughton TD. “Congratulations again to the entire team at Centripetal and thank you for choosing not only Galway but the people of Galway.” ‘’The news that Centripetal is to open a European Cyber Intelligence Centre of Excellence in Galway is great news for the West Region and this investment will support the development of the wider technology ecosystem in Ireland for cyber,” said Anne-Marie Tierney Le-Roux, Head of Department Enterprise Technology at IDA Ireland. “The creation of 50 jobs is a vote of confidence in the talent and skill set that our regional locations in Ireland have to offer. I would like to wish Centripetal every success as they scale operations.’’ To give customers the ability to access intelligence powered cybersecurity everywhere, Centripetal’s CleanINTERNET® CLOUD is now available for deployment. The CleanINTERNET® service is a revolutionary approach to defending a company’s assets from cyber threats by leveraging dynamic threat intelligence on a mass scale. The solution can be deployed to protect assets running in cloud environments, providing unparalleled cyber defense and removing the need for more costly cybersecurity infrastructure. The addition of AWS cloud support extends CleanINTERNET® to protect all enterprise assets whether on premises, remote or in the cloud. Centripetal will additionally provide CleanINTERNET® on Azure and Google Cloud Platform in late 2023. “Centripetal is the only cybersecurity vendor that delivers intelligence powered protection that neutralizes every known cyberattack at the network level while simultaneously driving down the cost of security operations,” said Jonathan Rogers, Chief Operating Officer for Centripetal. “Our innovative technology is an industry first and we’re thrilled to be partnering with the IDA to bring our solution to Ireland and the UK to not only provide unparalleled protection for our customers but also valuable employment opportunities for the country.” Centripetal uses threat intelligence to shield organizations from 99% of known cyberthreats globally with CleanINTERNET®. This uniquely managed cyber defense service provides greater effectiveness, lower costs, and enhanced security expertise to defend networks from attacks. Centripetal goes beyond traditional threat intelligence methods and pushes the industry forward by operationalizing the world's largest collection of threat intelligence: With over 250 Threat Intelligence providers, CleanINTERNET® applies over 100 billion indicators of compromise from real-time intelligence feeds, updated every 15 minutes, to protect its customers' networks. Centripetal defends customers networks by providing the fastest packet filtering technology on the planet, applying millions of threat intelligence based rules to incoming and outgoing datastreams with zero latency. Centripetal’s elite team of highly trained intelligence operations analysts acts as an extension of its customer’s internal cybersecurity team, who monitor and analyze emerging threats. This mitigates the skills gap and reduces the burden on overworked IT resources. For more information on Centripetal’s offering and its latest global European expansion, visit www.centripetal.ai/centripetal-ireland/ ABOUT CENTRIPETAL Centripetal, a global leader in intelligence powered cybersecurity, is operationalizing the world’s largest collection of threat intelligence, in real-time, to protect organizations from every known cyberthreat through its innovative patented technologies. Through its CleanINTERNET® service, Centripetal delivers a highly effective solution leveraging the latest computing technology and skilled intelligence operators at a significantly lower cost. We are experts in intelligence, with a team comprised of cryptologists, and security analysts from the U.S. Intelligence & Defense community who have protected the most sensitive assets in the world. Centripetal is based in Reston, VA with offices in Portsmouth, NH and Galway, Ireland. For more information, visit www.centripetal.ai.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

NordLocker introduces easier secure sharing option

Globenewswire | May 26, 2023

NordLocker has launched a new feature that allows users to securely share a password-protected locker, otherwise known as a folder, of files. In order to receive the sent files, the recipient doesn’t even need to be a NordLocker user. This convenient sharing feature is incredibly easy to use. The files are shared via a link, and the recipient needs a password to access the files. For security purposes, once the set expiration date passes, the link becomes inaccessible. Thanks to NordLocker’s end-to-end encryption, files are fully protected throughout their journey. “Whether it’s holiday videos or a client contract – here at NordLocker we believe that all files should be shared securely. With this new feature, we make secure sharing that much easier,” says Aivaras Vencevicius, head of product at NordLocker. Currently, this feature is available on NordLocker’s web application. Other improvements In addition, NordLocker has introduced biometrics on iOS, which allows a more convenient and quicker login. iOS users are now also able to download NordLocker application logs for more information on their app. As privacy is at NordLocker’s core, it’s worth noting that these activity logs are encrypted and stored on the customer’s side. NordLocker’s customer support can only see it if the user decides to share it with the NordLocker team. “With cybercrime rising every year, file encryption is becoming essential. We see that threats are becoming more sophisticated – phishing emails are becoming harder to detect, and malware is becoming more dangerous and advanced. Therefore I strongly recommend to treat your digital belongings just like you’d treat your physical assets – keep them locked up and secure,” says Aivaras Vencevicius, head of product at NordLocker. ABOUT NORDLOCKER NordLocker is the world’s first end-to-end file encryption tool with a private cloud. It was created by the cybersecurity experts behind NordVPN – one of the most advanced VPN service providers in the world. NordLocker is available for Windows, macOS, Android, iOS, supports all file types, offers a fast and intuitive interface, and guarantees secure sync between devices. With NordLocker, files are protected from hacking, surveillance, and data collection. For more information: nordlocker.com.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Blackpoint Launches New Product Expanding Security Ecosystem

Prnewswire | May 26, 2023

Blackpoint Cyber, the elite technology-focused cybersecurity company providing its streamlined security suite via managed service providers (MSPs), announced today the launch of its newest product, Managed Application Control, continuing Blackpoint's investment in building out the most comprehensive MSP security ecosystem available. The new solution goes beyond traditional approaches to application control, simplifying security management and improving productivity for MSPs and the businesses they serve. Threat actors often evade endpoint protection systems by "living off the land," or misusing legitimate IT tools native to the target environment. Managed Application Control protects from these attacks with a uniquely curated, constantly updated block list of applications by Blackpoint's threat intelligence team. The approach stands in contrast to pure zero-trust or deny-all methods of application control, which produce operational bottlenecks. With Managed Application Control, organizations can still create custom rules and allow exceptions. But with Blackpoint's newest offering, IT administrators can reduce time spent on allowlists and endless verification requests. "Our team knows the attacker tradecraft, so introducing another layer of security to our already robust ecosystem through Managed Application Control, at no additional cost, just makes sense," said Jon Murchison, CEO and founder of Blackpoint Cyber. "Protecting our partners and their customers is our primary goal, and we are committed to providing MSPs with an easily accessible bundle of solutions. It comes down to providing our partners with the most value on the market, including this new product, so they can protect their customers and focus on their margins and operations. It's extra productivity with no extra cost." Blackpoint's team of top-tier experts and products focus on blocking risky and malicious applications. When an application is blocked, Blackpoint's security operations center (SOC) intervenes to investigate and stop any intrusion attempts, providing unparalleled protection and peace of mind for MSPs and their clients. "At Blackpoint, we have always focused on threat actor mentality so we can stop threats as early in the attack cycle as possible," said David Rushmer, director of Blackpoint Cyber's Adversary Pursuit Group. "With Managed Application Control, the ability to dynamically respond to potential intrusions across the threat landscape means improved protection for our customers." The offering is the latest addition to Blackpoint Response, a packaged bundle of integrated cybersecurity solutions that includes Managed Detection and Response (MDR), Managed Defender for Endpoint, Vulnerability Management, and Cloud Response for a unified defense against cyber threats. ABOUT BLACKPOINT CYBER Blackpoint Cyber offers a world-class, nation-state-grade cybersecurity ecosystem serving the MSP community. Using its own software and Security Operations Center (SOC), Blackpoint's true 24/7 Managed Detection & Response (MDR) service not only detects breaches earlier than any other solution on the market, but also provides an actual response rather than just an alert to keep MSPs and their clients' networks safe from widespread damage.

Read More

Events