Know the Effective Use of Artificial Intelligence in Cybersecurity

Bineesh Mathew | March 17, 2022 | 235 views

Know the Effective Use of Artificial Intelligence in Cybersecurity
In today's enterprise contexts, the cyber-attack area is vast, posing a serious threat to businesses. As a result, reviewing and upgrading a company's cybersecurity posture isn’t just about human involvement.

According to TechRepublic, a midsized company receives notifications for about 200,000 cyber events every day. This level of attack is overwhelming for a typical company's security team. Furthermore, as these threats go unnoticed, they will cause severe network damage.

Artificial intelligence in cybersecurity is becoming increasingly crucial as it can swiftly scan millions of data sets and find a variety of cyber threats, from malware to misconduct, that could lead to a phishing attack. In addition, AI and machine learning are constantly evolving and improving, and they will be able to identify new types of attacks that might happen today or tomorrow.

There are various advantages to using AI in cybersecurity. With today's fast-evolving assaults and rapidly proliferating devices, AI and machine learning in information security can help stay one step ahead of cybercriminals, automate threat detection, and respond more quickly than traditional software-driven or manual operations.

Artificial intelligence in Cybersecurity

As cyberattacks expand in volume and complexity, artificial intelligence (AI) in cybersecurity helps stay ahead of such cyberattacks. Cutting-edge AI technologies, such as NLP and machine learning, curate threat intelligence from millions of research papers, blogs, and news stories, providing instant insights to cut through the noise of daily alerts and substantially lower response time.

AI attempts to mimic human intelligence. It has enormous potential in the field of cybersecurity. If used correctly, artificial intelligence (AI) in cybersecurity can be trained to provide threat warnings, identify new types of malware, and protect critical data for businesses.

AI Provides Better Endpoint Protection

The number of devices used by remote workers is continuously increasing, and AI in cybersecurity will be important in protecting those endpoints.

Virtual private networks (VPNs) and antivirus software can protect against remote malware and ransomware assaults, but it typically relies on signatures. This means that if you want to stay safe from the threats that are currently present, you need to stay up-to-date on signature definitions.

This can be a serious issue if virus definitions lag, either owing to a failure in updating the antivirus solution or a lack of awareness by the software maker. As a result, if there is a new type of malware attack, signature protection may not work.

“AI-driven endpoint protection takes a different tack, by establishing a baseline of behavior for the endpoint through a repeated training process. If something out of the ordinary occurs, AI can flag it and take action — whether that’s sending a notification to a technician or even reverting to a safe state after a ransomware attack. This provides proactive protection against threats, rather than waiting for signature updates.”

Tim Brown, VP of Security Architecture, SolarWinds.

Artificial Intelligence Predicts Breach Risk

AI systems can help figure out the IT asset inventory, which is a complete and accurate list of all devices, users, and applications with different levels of access to various systems.

AI cyber security-based cybersecurity solutions can now calculate how and where you're most likely to be hacked based on your asset inventory and threat exposure (as described above), allowing you to prepare and allocate resources to the most susceptible regions.

Using AI-based cybersecurity analysis insights, you can set and modify policies and procedures to reinforce your cyber resilience.

AI Battles with Dangerous Bots

Bots account for a large amount of today's internet traffic, which is potentially harmful. Bots may pose some serious threats, ranging from account takeovers via stolen passwords to account creation fraud and data theft.

You can't defend against automated threats by relying just on manual answers. AI and machine learning in cybersecurity help identify good bots (like search engine crawlers), bad bots, and people. They also help get a complete picture of how people use a website.

AI in cybersecurity allows for the examination of large volumes of data and enables cybersecurity teams to adapt their strategy to a changing environment.

AI Helps in Detecting New Threats

Using artificial intelligence (AI), cyber security can identify threats and possibly unsafe actions. In addition, artificial intelligence can help because traditional software systems can't keep up with the massive number of new viruses released every week.

AI cybersecurity systems are trained to identify malware, perform pattern recognition, and detect even the slightest features of malware or ransomware assaults before they reach the system. This is done by using complex algorithms.

Predictive intelligence from AI in cybersecurity can be better because it can scrap articles, news, research and other information about cyber threats and curate content on its own by using natural language processing.

Opinion of the Experts on AI in Cybersecurity

Capgemini Research Institute investigated the importance of AI in cybersecurity. Their paper, Reinventing Cybersecurity with Artificial Intelligence, strongly indicates that modern organizations need to strengthen their cybersecurity defenses with AI.

Because cyberpunks are already using AI technology to perform cyberattacks, the survey's respondents (850 executives from cybersecurity, IT information security, and IT operations from 10 countries) believe that AI-enabled reaction is vital.

Below are some of the report's primary takeaways:

  • Three out of four executives believe AI helps their company  respond more quickly to security incidents.
  • 69% of businesses believe AI is required to respond to cyberattacks.
  • Three out of five companies say that AI helps cyber analysts be more accurate and efficient.

AI in cybersecurity gives better answers to an organization's cybersecurity demands as networks get more extensive and data becomes more complicated. Simply put, humans can’t keep up with the growing complexity on their own, so AI in cybersecurity will be used sooner or later.

Summing Up

In recent years, artificial intelligence (AI) has emerged as a critical tool for strengthening the work of information security teams. Cybersecurity professionals can utilize AI to deliver much-needed analysis and threat detection to decrease breaches and enhance security posture since humans can no longer adequately guard the dynamic corporate attack surface. In the field of security, AI can identify and prioritize risks, detect malware on a network quickly, lead incident response, and detect intrusions before they occur.

AI enables cybersecurity teams can establish powerful human-machine collaborations that expand knowledge, enrich lives, and drive cybersecurity in a far better way.

Frequently Asked Questions


How can AI be used in cybersecurity?

Artificial intelligence systems can help with the detection of zero-day malware, threat prioritization, and automated removal of malware.

What are some of the advantages of artificial intelligence in cybersecurity?

Some of the advantages of artificial intelligence in cybersecurity are:

  • Greater adaptability
  • Offers complete, real-time cybersecurity solutions
  • It can process massive amounts of data

Can AI be considered the future of cybersecurity?

Artificial intelligence (AI) is slowly but surely becoming a critical component of cybersecurity, supporting businesses of all sizes and sectors in enhancing their security effectiveness. Unfortunately, information technology and telecommunications have the quickest and most complex AI adoption procedures.

Spotlight

Blackbourne Worldwide

Blackbourne Worldwide is a woman owned cybersecurity services using the most elite and sophisticated attack vectors, methodologies, and processes that black-hat hackers use in order to infiltrate and maintain access in an organization. Our proprietary Social Engineering platform allows us focus on the weakest element of any system: the human. With our expert security research staff, our attacks are custom to your business, applications, and software. Our services are as real world as you can get.

OTHER ARTICLES
SOFTWARE SECURITY

The Great CISO Resignation

Article | July 6, 2022

CISOs Are Leaving in Droves The Great Resignation has been front-page news since Covid lockdowns, with many employees looking for the work-life balance they enjoyed at the time. Now, the phenomenon has spread to the role of Chief Information Security Officer (CISO) and shows no signs of letting up. In fact, industry experts predict that it is likely to worsen. A recent study from cybersecurity company BlackFog found that 32% of CISOs in the U.K. and U.S. have considered leaving and many planned to do so in just six months. The majority noted that the top reason for leaving was a lack of work-life balance. The CISO role is demanding, with firefighting and frequent changes in regulations and customer expectations taking up significant time both on and off the job. In another recent study in which 581 CISOs were surveyed, the IANS Research and Artico Search explored CISO compensation and job satisfaction. Three-fourths of CISOs are satisfied with their job, which is 7% higher than in the 2021 sample and more than double that of the 2020 sample. The main drivers of satisfaction are compensation, budget, executive visibility, and organizational support. However, despite high satisfaction numbers, the study found that as many as 44% of respondents are considering a job change. CISO Challenges LIABILITY AND EXPOSURE OF THE CISO There is a perception that CISOs face heightened liability for cyber intrusions and the response to cyber events. One extraordinary example is the recent conviction of Uber’s former security officer, which represents the first time a security executive has faced federal crime prosecution over a data security response. In this case the finding was that he obstructed justice by concealing information about a breach, destroying data, and covering up the incident. CISOs are often in the hot seat when it comes to cyber-intrusions and how they are handled. The Board of Directors (possibly including named corporate officers) in most cases are protected by being diligent about the Business Judgement Rule (BJR). Heavily adopted in Delaware case law and since adopted in various forms in many states, this “rule” stipulates that proper oversight includes demonstrating the duty of loyalty (no conflicting interests) and duty of care (make informed decisions) to be protected from liability. There are few cases (although Enron being one) where liability was found but it was for illegalities and poor business judgment. Since CISOs are not named corporate officers in most cases, BJR does not provide comfort. Similarly, liability insurance which covers legal defense fees and cash judgments often covers only directors and named corporate officers unless the CISO has been specifically included in the policy. DUTY TO REPORT Improving Board-CISO Transparency There is a mechanism found in corporate governance best-practices for ensuring that the most senior people in an organization get direct, unfiltered input from a key executive, regardless of reporting structure. It is called the executive session. This is in common use by Boards of Directors who meet individually with the Chief Financial Officer, Controller, and other key executives, notably without other management in the room. Questions are intended to be penetrating and the respondent is expected to respond openly. Now that cybersecurity has risen to a top risk for the enterprise, the CISO position should be among those who appear individually in an executive session with the highest governing body of an enterprise at least annually. This addition to governance best-practices would give Board members and State governors unfiltered information on cybersecurity matters, thereby helping to fulfil their oversight responsibility. Bob Zukis, founder and CEO of the Digital Directors Network, reports that a survey of its membership of more than 900 IT, cyber, and boardroom leaders shows nearly half of the respondents already have some form of this policy in practice. However, this is still a minority of the overall CISO population, signaling more transparency between the CISO and Board is needed. CISOs in State Governments Government organizations also face many of these issues. Evidence shows that CISOs in state governments are as vulnerable to other job offers as CISOs in the private sector. In the span of eight days in October 2022, there were several reports of state CISOs resigning, including Oklahoma, Georgia, Pennsylvania, and North Dakota. [1] Legal liability is not an issue the government CISO needs to be worried about since governments and their employees are immune from legal suits. However, government CISOs are highly concerned about shouldering blame, especially in the press, for security intrusions or their coverup. As with private industry, state governments should also institute this recommended practice. NCC recommends CISOs be called upon to appear in an executive session with agency heads and even the governor at least once a year. The State of Texas, for example, already has a version of this policy implemented in a statute and in practice. Texas Administrative Code includes provisions for: Reporting, at least annually, directly to the agency head the status and effectiveness of the security program and its controls. Informing any relevant parties in the event of noncompliance with the state agency’s information security policies Resolving the Great CISO Resignation For organizations across the public and private sectors, cybersecurity has risen to one of the top risks and has increased the importance of the role of the CISO. Most are looking to improve their work-life balance and reduce some of the stressors of the job. While many CISOs are also concerned about trends in liability and becoming headline news for decisions made on the job, requiring CISOs to appear in executive sessions with board members or state governors can help to alleviate these concerns and improve CISO job satisfaction while at the same time improving how the most senior levels of organizations fulfil their responsibilities for oversight of top risks.

Read More
DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Top 5 Application Security Trends Businesses Must Be Aware of in 2023

Article | March 29, 2023

Introduction Top 5 Trends for Businesses to Improve Their Existing Application Security 1.AppSec and Convergence 2.Adoption of Automated AI Security Capabilities 3.Emphasis on Securing the Software Supply Chain 4.Extreme 'Shift Left' 5.Upsurge in Demand for Vulnerability Prioritization Moving Forward with Application Security Introduction The proliferation of applications and their usage across the business landscape has made application security a strategic initiative that spans departments rather than an activity. Several factors are driving the rethinking of application security as a broader strategic program, including the evolving threat landscape, more incremental software development frameworks, and the adoption of nimbler. With the acceleration of software development and the greater-than-ever role of code in current business infrastructure, application security is shifting left in the process and infusing every step to ensure that the applications reaching customers' hands are secure and reliable. Top 5 Trends for Businesses to Improve Their Existing Application Security Applications serve as a doorway to servers and networks, making them an excellent target for malicious actors. Since cyber attackers constantly improve their techniques for breaking into software, it is becoming essential for businesses to gain insights into ever-evolving trends in the AppSec space. Here are some of the prominent trends that businesses should aware of to improve their existing application security. Trend 1: AppSec and CloudSec Convergence To accurately estimate attack surface and overall security posture, both application code vulnerabilities and cloud service hosting misconfigurations must be examined. The convergence of AppSec and CloudSec is becoming a critical component of modern security operations. It allows organizations to gain a comprehensive view of the attack surface and better understand the risks posed by application code and cloud service providers. By looking at these two areas cohesively, organizations can identify business-critical vulnerabilities and prioritize their remediation efforts. Trend 2: Adoption of Automated AI Security Capabilities The increasing volume and complexity of security threats pose significant challenges for organizations, causing strain on their threat detection and response capabilities. This leads to slower response times, higher costs, and a greater impact on security incidents. To address this issue, many companies are turning to security automation as a potential solution. One of such approaches involves the use of artificial intelligence (AI), which can automate data gathering, threat identification, and incident response processes. By adopting security automation, companies can optimize the use of limited security personnel and resources, enabling them to focus on high-value activities that provide maximum benefit to the organization. Trend 3: Emphasis on Securing the Software Supply Chain The software supply chain is emerging as a primary area of focus due to the heightened risks associated with software development. This urgency has been further compounded by the recent attack, such as Solarwind data breach and the Log4j attack on Apache, increasing the significance of software security measures. Companies are taking a more proactive approach for making enhancements in the software supply chain to protect their applications, including conducting Static Application Security Testing (SAST) to identify and address vulnerabilities before malicious actors can exploit them. Trend 4: Extreme 'Shift Left' The ‘shift left’ in software development has gained significant momentum in recent years. The idea behind this approach is to prioritize security and other critical aspects of software development at the earliest possible stage in the development process. By doing so, organizations can make more informed security decisions and identify and address security vulnerabilities before they cause any damage. As the pace of development continues to increase, organizations are increasingly adopting this approach in their software development processes to protect their systems and data from security risks. Trend 5: Upsurge in Demand for Vulnerability Prioritization Managing vulnerabilities in a software system requires analyzing vast amounts of data to determine issues that require immediate attention and prioritization. However, the growing presence of false positives is negatively impacting this process, resulting in decreased efficiency and wasted resources. Organizations are increasingly looking for vendors to provide vulnerability management tools that can reduce false positives, differentiate between low-priority issues and severe security threats, and offer actionable insights to mitigate them. Moving Forward with Application Security Applications security has become more critical than ever before for businesses in the current digital scape. With the attack surface constantly expanding and the frequency of threats on the rise, organizations must remain agile and employ the best effective strategies to protect their applications from potential cyberattacks. The significance of application security has not gone unnoticed. As organizations continue to invest in security measures, they are increasingly upgrading themselves as per emerging security trends to protect themselves against evolving cyber threats. This includes adopting the ‘shift left’ approach, tightening controls, and having a clear definition of remediation processes.

Read More
SOFTWARE SECURITY

Security by Sector: Improving Quality of Data and Decision-Making a Priority for Credit Industry

Article | May 18, 2022

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health sector, or the entertainment business? Are there some sectors that face greater cyber-threats and risks than others? Do some do a better job of keeping data secure, and if so, how and why?A new study of credit management professionals has revealed that improving the quality of data and decision-making will be a top priority for the credit industry in the next three years. The research, from Equifax Ingnite in collaboration with Coleman Parkes, takes a deep dive into the views of credit management pros across retail, banking, finance and debt management/recovery sectors.

Read More

3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

Article | February 12, 2020

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full effect, we saw expensive fines levied upon companies that fell victim to data privacy breaches. As we move into a new year, probably the biggest takeaway from 2019 is that being proactive and having a data privacy strategy in place is important to help mitigate the risk of a data privacy breach. The regulatory landscape continues to evolve as states and countries actively pass new expanded requirements for privacy and cybersecurity regulations. While laws in the U.S., like the California Consumer Privacy Act (CCPA), are getting significant attention, many other states and countries are actively amending their breach notification laws to include tighter restrictions.

Read More

Spotlight

Blackbourne Worldwide

Blackbourne Worldwide is a woman owned cybersecurity services using the most elite and sophisticated attack vectors, methodologies, and processes that black-hat hackers use in order to infiltrate and maintain access in an organization. Our proprietary Social Engineering platform allows us focus on the weakest element of any system: the human. With our expert security research staff, our attacks are custom to your business, applications, and software. Our services are as real world as you can get.

Related News

PLATFORM SECURITY, SOFTWARE SECURITY, API SECURITY

Traceable AI Announces the Industry’s First API Security Reference Architecture for a Zero Trust World

Businesswire | June 06, 2023

Traceable AI, the industry's leading API security company, today announced the release of the industry's first API Security Reference Architecture for Zero Trust. This groundbreaking reference architecture serves as a guide for security leaders as the industry addresses the urgency of integrating API Security into Zero Trust Security initiatives. Zero Trust, a cybersecurity framework that emphasizes continuous verification and helps to minimize the attack surface, has proven effective in enhancing security for many organizations, from large enterprises, to the US Government. However, traditional Zero Trust approaches have primarily focused on network-level controls and identity access management, neglecting the critical API layer. Traceable’s API Security Reference Architecture is aligned with the NIST Zero Trust Architecture, a publicly available, vendor-neutral framework widely adopted by government entities such as CISA, DoD, DISA, NSA, GSA and NCCoE, as well as by many leading cybersecurity vendors. By leveraging the NIST framework, Traceable ensures compatibility, interoperability, and adherence to industry standards, making it a reliable and trusted guide for organizations implementing Zero Trust for their APIs. The extensive reference architecture provides organizations with a prescriptive methodology to operationalize Zero Trust for APIs: Advanced API Security: The reference architecture gives organizations a way to implement robust security measures specifically designed for APIs, including eliminating implied or persistent trust for APIs, thereby minimizing the risk of API-related vulnerabilities, attacks, and data breaches. Comprehensive Risk Management: The reference architecture recommends incorporating automatic user authentication and authorization, granular data access policies, and asset risk assessments, can organizations can effectively manage and mitigate risks associated with API access and usage. Increased Visibility and Control: The architecture explains why organizations should obtain granular visibility, which allows organizations to monitor and record all API transactions, enabling better analysis, threat detection, and incident response capabilities. Improved Compliance and Data Protection: The automatic identification and classification of sensitive data sets ensure compliance with data protection regulations such as HIPAA, GDPR, and PCI-DSS, reducing the risk of regulatory penalties and reputational damage. Seamless Automation and Orchestration: The reference architecture recommends integration with XDR, SIEM, and SOAR solutions, so organizations can enhance their overall security posture, automate response actions, and streamline security operations. Scalability and Flexibility: The architecture offers a flexible distribution model for PEPs and data collection points, allowing organizations to scale their API security infrastructure based on their unique requirements and architecture. Future-Proofing: By aligning with the NIST Zero Trust Architecture and industry standards, organizations adopting the API Security Reference Architecture can ensure compatibility, interoperability, and the ability to evolve alongside emerging technologies and security best practices. Traceable’s API Security Reference Architecture for Zero Trust introduces a new approach to secure APIs using Zero Trust concepts, acknowledging their unique security requirements. It provides organizations with a comprehensive framework to implement Zero Trust controls specifically tailored to APIs, ensuring the protection of digital assets and mitigating the risk of data breaches. Dr. Chase Cunningham weighs in on Traceable’s approach: "APIs provide a new means of applying controls across enterprise applications, " says Dr. Cunningham, “However, the security practices for APIs have not yet matured, leaving a significant gap in the overall attack surface. Traceable has developed their own API Security Reference Architecture to help fill this gap by providing organizations with a methodical way to secure their APIs with Zero Trust principles. By combining Zero Trust strategic concepts with API-specific security measures, Traceable can help organizations protect their digital assets effectively." Throughout the past year, Traceable has continued to reaffirm its commitment to extending Zero Trust methodologies to API Security. With the addition of Zero Trust creator John Kindervag and Dr. Zero Trust, Chase Cunningham as Traceable advisors, Traceable continues to strengthen its expertise in this space. To date, Traceable has become a valuable partner to a number of large enterprises as the industry turns its eyes toward the importance of API security. With the rollout of their Zero Trust API Access solution alongside this reference architecture, Traceable continues to lead the industry toward the advancement of API security. This reference architecture is now available for organizations to explore and implement, empowering them to achieve complete API security in a Zero Trust world. About Traceable Traceable is the industry’s leading API Security company that helps organizations achieve API protection in a cloud-first, API-driven world. With an API Data Lake at the core of the platform, Traceable is the only intelligent and context-aware solution that powers complete API security – security posture management, threat protection and threat management across the entire Software Development Lifecycle – enabling organizations to minimize risk and maximize the value that APIs bring to their customers. To learn more about how API security can help your business, book a demo with a security expert.

Read More

PLATFORM SECURITY, SOFTWARE SECURITY, CLOUD SECURITY

Lacework Unifies Entitlements Management and Threat Detection for Simplified Cloud Security

Prnewswire | June 07, 2023

Lacework, the data-driven security platform, today announced new CIEM functionality that empowers teams to gain observability of all cloud identities, know precisely who can perform what actions, and easily identify which identities pose the greatest risk. Furthermore, Lacework's actionable approach to CIEM provides customers with recommendations on how to reduce their identity risk. By combining these new capabilities with cloud security posture management, attack path analysis, and threat detection into a single platform, Lacework gives customers a clear understanding of their cloud identity landscape, visibility into cloud identity and access management (IAM) misconfigurations and exposed secrets, and continuous discovery of identity threats. The benefits of public cloud come with complex challenges in managing identity risk. With over 35,000 granular permissions across hyperscale cloud providers, organizations struggle to limit unnecessary access. Most cloud users and instances are granted far more permissions than they actually need, leaving organizations highly exposed to cloud breach, account takeover, and data exfiltration. And the fact that machine identities in the cloud typically outnumber humans by an order of magnitude intensifies the issue. "Enforcing least privilege and having visibility of identities and entitlements is a top cloud security challenge for IDC clients. With this innovation from Lacework, security teams can automatically see which identities are overly-permissive, and zero in on the ones that pose the greatest risk," said Philip Bues, Research Manager for Cloud Security, at IDC. "Beyond prioritizing risks, this will also allow teams to confidently suggest policy changes and reduce their overall attack surface risk." Preventing Cloud Identity Risk with New Entitlement Management Technology Lacework dynamically discovers cloud user, resource, group and role identities and their net-effective permissions and then automatically correlates granted versus used permissions to determine identities with excessive privileges. The platform calculates a risk score for each identity, determines the riskiest identities based on attack path analysis, and auto-generates high-confidence recommendations for right-sizing permissions based on historical observations. This means Lacework not only informs customers of risky identities and entitlements, but also shows those identities that are hardly used or even need entitlements to begin with. "CIEM is a vital facet of a comprehensive cloud security strategy," said Paolo del Mundo, Director of Application Security, The Motley Fool. "It's encouraging to see Lacework incorporating this into their well-rounded CNAPP solution, potentially providing a robust response to the challenge of managing cloud access permissions effectively." Combined with Lacework's ability to prioritize risks from an attack path context, as well as detect user and entity behavior anomalies, customers are able to: Continuously comply with IAM security and regulatory compliance requirements. Identify cloud user, application and service identities, know exactly what actions each can take, and prioritize the identities that pose the greatest risk. Limit the blast radius of compromised cloud accounts, achieve least privilege, and establish trust with engineering teams. Continuously discover risky behavior, including lateral movement and privilege escalation, without needing to write rules or stitching together disparate alerts. Rapidly detect insider threats associated with malicious or accidental abuse of permissions. "Our customers need to know what entities are actually doing in their cloud and whether it's malicious or inappropriate, and it can't get in the way of their ability to move fast," said Adam Leftik, Vice President, Product, Lacework. "Now Lacework customers can address both sides of the identity security issue with a single platform that prevents identity risk exposure and detects identity threats at scale, with the context to quickly investigate, prioritize, and respond to identity alerts. It's the latest step in our mission to give enterprises the confidence to rapidly innovate in the cloud and drive their business forward." About Lacework Lacework offers the data-driven security platform for the cloud and is the leading cloud-native application protection platform (CNAPP) solution. Only Lacework can collect, analyze, and accurately correlate data — without requiring manually written rules — across an organization's AWS, Azure, Google Cloud, and Kubernetes environments, and narrow it down to the handful of security events that matter. Security and DevOps teams around the world trust Lacework to secure cloud-native applications across the full lifecycle from code to cloud. Get started at www.lacework.com.

Read More

PLATFORM SECURITY, SOFTWARE SECURITY, CLOUD SECURITY

Deepwatch and Lacework Partner to Deliver Unrivaled Cloud Security Solutions

Businesswire | June 09, 2023

Deepwatch, the leader in advanced managed detection and response (MDR) security, today announced a global strategic partnership with Lacework, the data-driven cloud security platform, to offer organizations comprehensive and proactive security solutions. This strategic partnership combines Deepwatch's MDR expertise with Lacework's advanced cloud security analytics, providing enterprises with an unmatched level of protection against modern cyber threats. With the increasing adoption of cloud technology, organizations face unique security challenges that require robust solutions. "This partnership allows us to deliver a best-in-class cloud security solution that addresses the unique challenges faced by organizations in today's cloud-centric landscape," said Wes Mullins, CTO at Deepwatch. "By combining our MDR capabilities with Lacework's advanced cloud security analytics, we empower organizations to confidently embrace the cloud while maintaining robust cybersecurity posture." Deepwatch and Lacework address these challenges head-on, offering: Complete Cloud Security: Deepwatch and Lacework deliver end-to-end cloud security solutions that cover the entire attack surface within cloud environments, including workloads, containers, Kubernetes, and serverless architectures. This partnership ensures that critical assets remain secure while organizations leverage the benefits of cloud technology. Proactive Cloud Threat Detection: By combining expert security analysts and advanced threat detection capabilities, the partnership empowers organizations with proactive identification and swift response to emerging threats targeting cloud workloads. This proactive approach mitigates potential risks, safeguarding sensitive data and critical infrastructure. Advanced Security Analytics: Deepwatch's MDR services are enhanced by Lacework's powerful cloud-native application protection platform. This integration allows for extensive cloud security telemetry collection and correlation, enabling organizations to gain deep insights into their cloud environments. With holistic visibility, organizations can enhance threat hunting, incident investigation, and overall security posture. Efficient Incident Response: In the event of a security incident, Deepwatch and Lacework streamline the incident response process. The seamless integration between the platforms facilitates quick and effective incident containment, eradication, and recovery of threats targeting cloud workloads. This minimizes disruption to business operations and mitigates potential financial and reputational damages. Industry Expertise: Deepwatch's team of experienced security analysts, supported by their SOC-as-a-Service model, provides round-the-clock monitoring and actionable insights. Lacework's cloud security expertise, complemented by their machine learning capabilities, delivers unparalleled cloud threat intelligence. Together, they offer organizations the combined strength of their specialized knowledge to combat evolving cyber threats effectively. “The new partnership of Lacework and Deepwatch empowers customers by taking the cloud security burdens off of organizations and allowing them to instead focus on innovating and achieving their business outcomes,” said Brian Lanigan, VP of World Wide Channels and Alliances from Lacework. “The combination of Lacework’s best-in-class cloud security offerings and Deepwatch’s skilled personnel and industry-leading expertise allows us to provide our customers with solutions that continue to provide greater fidelity to help manage risk and further drive our focus on simplifying security for our customers.” Deepwatch and Lacework's collaboration enables organizations to proactively detect and respond to cyber threats, ensuring the protection of critical assets within cloud environments. With this partnership, enterprises can confidently navigate their digital future while minimizing risk and safeguarding their valuable data. About Deepwatch Deepwatch is the leader in managed detection and response, protecting organizations from ever-increasing cyber threats. Powered by Deepwatch’s cloud security platform, Deepwatch provides the industry’s fastest, most comprehensive detection and automated response to cyber threats together with tailored guidance from dedicated experts 24/7/365 to reduce risk and improve security posture. The world’s leading companies, from the Fortune 100 to mid-sized enterprises, trust Deepwatch to protect their business. Visit www.deepwatch.com to learn more. About Lacework Lacework offers the data-driven security platform for the cloud and is the leading cloud-native application protection platform (CNAPP) solution. Only Lacework can collect, analyze, and accurately correlate data — without requiring manually written rules — across an organization’s cloud and Kubernetes environments, and narrow it down to the handful of security events that matter. Security and DevOps teams around the world trust Lacework to secure cloud-native applications across the full lifecycle from code to cloud. Get started at www.lacework.com.

Read More

PLATFORM SECURITY, SOFTWARE SECURITY, API SECURITY

Traceable AI Announces the Industry’s First API Security Reference Architecture for a Zero Trust World

Businesswire | June 06, 2023

Traceable AI, the industry's leading API security company, today announced the release of the industry's first API Security Reference Architecture for Zero Trust. This groundbreaking reference architecture serves as a guide for security leaders as the industry addresses the urgency of integrating API Security into Zero Trust Security initiatives. Zero Trust, a cybersecurity framework that emphasizes continuous verification and helps to minimize the attack surface, has proven effective in enhancing security for many organizations, from large enterprises, to the US Government. However, traditional Zero Trust approaches have primarily focused on network-level controls and identity access management, neglecting the critical API layer. Traceable’s API Security Reference Architecture is aligned with the NIST Zero Trust Architecture, a publicly available, vendor-neutral framework widely adopted by government entities such as CISA, DoD, DISA, NSA, GSA and NCCoE, as well as by many leading cybersecurity vendors. By leveraging the NIST framework, Traceable ensures compatibility, interoperability, and adherence to industry standards, making it a reliable and trusted guide for organizations implementing Zero Trust for their APIs. The extensive reference architecture provides organizations with a prescriptive methodology to operationalize Zero Trust for APIs: Advanced API Security: The reference architecture gives organizations a way to implement robust security measures specifically designed for APIs, including eliminating implied or persistent trust for APIs, thereby minimizing the risk of API-related vulnerabilities, attacks, and data breaches. Comprehensive Risk Management: The reference architecture recommends incorporating automatic user authentication and authorization, granular data access policies, and asset risk assessments, can organizations can effectively manage and mitigate risks associated with API access and usage. Increased Visibility and Control: The architecture explains why organizations should obtain granular visibility, which allows organizations to monitor and record all API transactions, enabling better analysis, threat detection, and incident response capabilities. Improved Compliance and Data Protection: The automatic identification and classification of sensitive data sets ensure compliance with data protection regulations such as HIPAA, GDPR, and PCI-DSS, reducing the risk of regulatory penalties and reputational damage. Seamless Automation and Orchestration: The reference architecture recommends integration with XDR, SIEM, and SOAR solutions, so organizations can enhance their overall security posture, automate response actions, and streamline security operations. Scalability and Flexibility: The architecture offers a flexible distribution model for PEPs and data collection points, allowing organizations to scale their API security infrastructure based on their unique requirements and architecture. Future-Proofing: By aligning with the NIST Zero Trust Architecture and industry standards, organizations adopting the API Security Reference Architecture can ensure compatibility, interoperability, and the ability to evolve alongside emerging technologies and security best practices. Traceable’s API Security Reference Architecture for Zero Trust introduces a new approach to secure APIs using Zero Trust concepts, acknowledging their unique security requirements. It provides organizations with a comprehensive framework to implement Zero Trust controls specifically tailored to APIs, ensuring the protection of digital assets and mitigating the risk of data breaches. Dr. Chase Cunningham weighs in on Traceable’s approach: "APIs provide a new means of applying controls across enterprise applications, " says Dr. Cunningham, “However, the security practices for APIs have not yet matured, leaving a significant gap in the overall attack surface. Traceable has developed their own API Security Reference Architecture to help fill this gap by providing organizations with a methodical way to secure their APIs with Zero Trust principles. By combining Zero Trust strategic concepts with API-specific security measures, Traceable can help organizations protect their digital assets effectively." Throughout the past year, Traceable has continued to reaffirm its commitment to extending Zero Trust methodologies to API Security. With the addition of Zero Trust creator John Kindervag and Dr. Zero Trust, Chase Cunningham as Traceable advisors, Traceable continues to strengthen its expertise in this space. To date, Traceable has become a valuable partner to a number of large enterprises as the industry turns its eyes toward the importance of API security. With the rollout of their Zero Trust API Access solution alongside this reference architecture, Traceable continues to lead the industry toward the advancement of API security. This reference architecture is now available for organizations to explore and implement, empowering them to achieve complete API security in a Zero Trust world. About Traceable Traceable is the industry’s leading API Security company that helps organizations achieve API protection in a cloud-first, API-driven world. With an API Data Lake at the core of the platform, Traceable is the only intelligent and context-aware solution that powers complete API security – security posture management, threat protection and threat management across the entire Software Development Lifecycle – enabling organizations to minimize risk and maximize the value that APIs bring to their customers. To learn more about how API security can help your business, book a demo with a security expert.

Read More

PLATFORM SECURITY, SOFTWARE SECURITY, CLOUD SECURITY

Lacework Unifies Entitlements Management and Threat Detection for Simplified Cloud Security

Prnewswire | June 07, 2023

Lacework, the data-driven security platform, today announced new CIEM functionality that empowers teams to gain observability of all cloud identities, know precisely who can perform what actions, and easily identify which identities pose the greatest risk. Furthermore, Lacework's actionable approach to CIEM provides customers with recommendations on how to reduce their identity risk. By combining these new capabilities with cloud security posture management, attack path analysis, and threat detection into a single platform, Lacework gives customers a clear understanding of their cloud identity landscape, visibility into cloud identity and access management (IAM) misconfigurations and exposed secrets, and continuous discovery of identity threats. The benefits of public cloud come with complex challenges in managing identity risk. With over 35,000 granular permissions across hyperscale cloud providers, organizations struggle to limit unnecessary access. Most cloud users and instances are granted far more permissions than they actually need, leaving organizations highly exposed to cloud breach, account takeover, and data exfiltration. And the fact that machine identities in the cloud typically outnumber humans by an order of magnitude intensifies the issue. "Enforcing least privilege and having visibility of identities and entitlements is a top cloud security challenge for IDC clients. With this innovation from Lacework, security teams can automatically see which identities are overly-permissive, and zero in on the ones that pose the greatest risk," said Philip Bues, Research Manager for Cloud Security, at IDC. "Beyond prioritizing risks, this will also allow teams to confidently suggest policy changes and reduce their overall attack surface risk." Preventing Cloud Identity Risk with New Entitlement Management Technology Lacework dynamically discovers cloud user, resource, group and role identities and their net-effective permissions and then automatically correlates granted versus used permissions to determine identities with excessive privileges. The platform calculates a risk score for each identity, determines the riskiest identities based on attack path analysis, and auto-generates high-confidence recommendations for right-sizing permissions based on historical observations. This means Lacework not only informs customers of risky identities and entitlements, but also shows those identities that are hardly used or even need entitlements to begin with. "CIEM is a vital facet of a comprehensive cloud security strategy," said Paolo del Mundo, Director of Application Security, The Motley Fool. "It's encouraging to see Lacework incorporating this into their well-rounded CNAPP solution, potentially providing a robust response to the challenge of managing cloud access permissions effectively." Combined with Lacework's ability to prioritize risks from an attack path context, as well as detect user and entity behavior anomalies, customers are able to: Continuously comply with IAM security and regulatory compliance requirements. Identify cloud user, application and service identities, know exactly what actions each can take, and prioritize the identities that pose the greatest risk. Limit the blast radius of compromised cloud accounts, achieve least privilege, and establish trust with engineering teams. Continuously discover risky behavior, including lateral movement and privilege escalation, without needing to write rules or stitching together disparate alerts. Rapidly detect insider threats associated with malicious or accidental abuse of permissions. "Our customers need to know what entities are actually doing in their cloud and whether it's malicious or inappropriate, and it can't get in the way of their ability to move fast," said Adam Leftik, Vice President, Product, Lacework. "Now Lacework customers can address both sides of the identity security issue with a single platform that prevents identity risk exposure and detects identity threats at scale, with the context to quickly investigate, prioritize, and respond to identity alerts. It's the latest step in our mission to give enterprises the confidence to rapidly innovate in the cloud and drive their business forward." About Lacework Lacework offers the data-driven security platform for the cloud and is the leading cloud-native application protection platform (CNAPP) solution. Only Lacework can collect, analyze, and accurately correlate data — without requiring manually written rules — across an organization's AWS, Azure, Google Cloud, and Kubernetes environments, and narrow it down to the handful of security events that matter. Security and DevOps teams around the world trust Lacework to secure cloud-native applications across the full lifecycle from code to cloud. Get started at www.lacework.com.

Read More

PLATFORM SECURITY, SOFTWARE SECURITY, CLOUD SECURITY

Deepwatch and Lacework Partner to Deliver Unrivaled Cloud Security Solutions

Businesswire | June 09, 2023

Deepwatch, the leader in advanced managed detection and response (MDR) security, today announced a global strategic partnership with Lacework, the data-driven cloud security platform, to offer organizations comprehensive and proactive security solutions. This strategic partnership combines Deepwatch's MDR expertise with Lacework's advanced cloud security analytics, providing enterprises with an unmatched level of protection against modern cyber threats. With the increasing adoption of cloud technology, organizations face unique security challenges that require robust solutions. "This partnership allows us to deliver a best-in-class cloud security solution that addresses the unique challenges faced by organizations in today's cloud-centric landscape," said Wes Mullins, CTO at Deepwatch. "By combining our MDR capabilities with Lacework's advanced cloud security analytics, we empower organizations to confidently embrace the cloud while maintaining robust cybersecurity posture." Deepwatch and Lacework address these challenges head-on, offering: Complete Cloud Security: Deepwatch and Lacework deliver end-to-end cloud security solutions that cover the entire attack surface within cloud environments, including workloads, containers, Kubernetes, and serverless architectures. This partnership ensures that critical assets remain secure while organizations leverage the benefits of cloud technology. Proactive Cloud Threat Detection: By combining expert security analysts and advanced threat detection capabilities, the partnership empowers organizations with proactive identification and swift response to emerging threats targeting cloud workloads. This proactive approach mitigates potential risks, safeguarding sensitive data and critical infrastructure. Advanced Security Analytics: Deepwatch's MDR services are enhanced by Lacework's powerful cloud-native application protection platform. This integration allows for extensive cloud security telemetry collection and correlation, enabling organizations to gain deep insights into their cloud environments. With holistic visibility, organizations can enhance threat hunting, incident investigation, and overall security posture. Efficient Incident Response: In the event of a security incident, Deepwatch and Lacework streamline the incident response process. The seamless integration between the platforms facilitates quick and effective incident containment, eradication, and recovery of threats targeting cloud workloads. This minimizes disruption to business operations and mitigates potential financial and reputational damages. Industry Expertise: Deepwatch's team of experienced security analysts, supported by their SOC-as-a-Service model, provides round-the-clock monitoring and actionable insights. Lacework's cloud security expertise, complemented by their machine learning capabilities, delivers unparalleled cloud threat intelligence. Together, they offer organizations the combined strength of their specialized knowledge to combat evolving cyber threats effectively. “The new partnership of Lacework and Deepwatch empowers customers by taking the cloud security burdens off of organizations and allowing them to instead focus on innovating and achieving their business outcomes,” said Brian Lanigan, VP of World Wide Channels and Alliances from Lacework. “The combination of Lacework’s best-in-class cloud security offerings and Deepwatch’s skilled personnel and industry-leading expertise allows us to provide our customers with solutions that continue to provide greater fidelity to help manage risk and further drive our focus on simplifying security for our customers.” Deepwatch and Lacework's collaboration enables organizations to proactively detect and respond to cyber threats, ensuring the protection of critical assets within cloud environments. With this partnership, enterprises can confidently navigate their digital future while minimizing risk and safeguarding their valuable data. About Deepwatch Deepwatch is the leader in managed detection and response, protecting organizations from ever-increasing cyber threats. Powered by Deepwatch’s cloud security platform, Deepwatch provides the industry’s fastest, most comprehensive detection and automated response to cyber threats together with tailored guidance from dedicated experts 24/7/365 to reduce risk and improve security posture. The world’s leading companies, from the Fortune 100 to mid-sized enterprises, trust Deepwatch to protect their business. Visit www.deepwatch.com to learn more. About Lacework Lacework offers the data-driven security platform for the cloud and is the leading cloud-native application protection platform (CNAPP) solution. Only Lacework can collect, analyze, and accurately correlate data — without requiring manually written rules — across an organization’s cloud and Kubernetes environments, and narrow it down to the handful of security events that matter. Security and DevOps teams around the world trust Lacework to secure cloud-native applications across the full lifecycle from code to cloud. Get started at www.lacework.com.

Read More

Events