‘Data and analytics play a crucial role in shaping our advertising strategies,' asserts Aleksander Groshev

Leadership style combines a bottom-up approach
Aleksander Groshev is the CEO and Co-Founder of Autobahn Security. Previously he was Vice President of Product responsible for the product development of the SaaS platform. Before joining Autobahn Security he held the position of Head of Product at Fincite, a wealth management B2B platform.

Personalizing the content, highlighting benefits, and ensuring consistency across channels helps us connect with our audience and build trust.

Media 7: Can you provide an overview of your professional journey and how you reached the position of CEO and Co-Founder of Autobahn Security?
Aleksander Groshev: My journey began as one of the first employees at Secucloud (acquired by Aryaka), an IT security startup, where I was responsible for transforming the venture into a leading SASE platform provider. During my tenure as the Head of Product at Fincite, a leading B2B FinTech firm specializing in Digital Wealth Management, I had the privilege of spearheading product strategy and roadmap, as well as managing the growth of product development. At Fincite we have developed a wealth management B2B platform that empowers over 7,000 investment advisors worldwide. In my current mission at Autobahn Security, I transitioned from the role of VP of Product into CEO & late Co-Founder, and I am determined to elevate the company to new heights as the foremost platform for vulnerability prioritization and remediation.

M7: What inspired the creation of Autobahn Security, and what sets it apart from other SaaS platforms in the cybersecurity industry?
AK:
While advising Fortune Global 500 companies, we have found that the fear of hacking attacks creates tremendous pressure on businesses. To address the threat, companies were forced to invest in a variety of tools - but this investment alone was not enough. The information generated by the tools is overly complex and must be interpreted to derive recommendations for action. However, there are not enough cyber security experts available to process the immense flood of data and respond with the right measures. By deploying traditional scanning tools, which show the sheer number of vulnerabilities and often prioritize them incorrectly, companies' anxiety has even further increased.

To get companies out of the uncertainty cycle, we have developed a cybersecurity platform that aggregates data generated by cloud assets and scanning tools as well as re-evaluates it from a hacker perspective. This allows organizations to ensure that those vulnerabilities that are of the most interest to cyber criminals receive the most attention. The vulnerabilities found are automatically clustered and prioritized, helping IT teams focus on essential tasks - fixing vulnerabilities rather than analyzing them.
Through our signature Hackability Score, which is a unique KPI, organizations can benchmark their security levels against others, allocate budgets, and track progress. These can be achieved with our cyber fitness workouts. They provide easy-to-understand and easy-to-implement guidance that enables IT teams to close security gaps without in-depth expertise. Each of the action items is curated by our teams of security experts to provide organizations with the best possible guidance on their security journey.

M7: What are your predictions for the future of the IT industry? Do you anticipate any emerging trends or innovative tools that will reshape the field? Additionally, what significant opportunities and obstacles do you foresee in the upcoming years?
AK:
When it comes to predicting the future of the IT industry, it's important to acknowledge that the landscape is constantly evolving. Based on current trends, I can share some insights into what we might expect in the coming years.

Firstly, the continued growth and adoption of artificial intelligence (AI) and machine learning (ML) will significantly shape the IT industry. These technologies have already demonstrated their potential in various sectors, and we can anticipate further advancements in areas such as natural language processing, computer vision, and autonomous systems. As AI becomes more integrated into business processes, it will unlock new opportunities for automation, data analysis, and enhanced decision-making.

Cloud computing will continue to play a pivotal role in the IT industry. As organizations increasingly rely on cloud services, we can expect to see the emergence of more specialized cloud solutions tailored to specific industries and use cases. This will enable businesses to optimize their operations, improve flexibility, and reduce costs.

The Internet of Things (IoT) will also have a profound impact on the IT industry. As more devices become connected, generating vast amounts of data, there will be a growing need for efficient data management, security, and analytics. The integration of IoT with AI and ML will lead to advancements in areas like smart homes, autonomous vehicles, industrial automation, and healthcare.

Furthermore, cybersecurity will remain a critical concern. With the increasing digitization of businesses and society as a whole, the risk of cyber threats and data breaches will continue to grow. This creates a demand for innovative cybersecurity solutions, including advanced threat detection systems, encryption technologies, and robust authentication methods.

However, along with all the opportunities, there will be many obstacles to overcome. One of the major challenges is managing and analyzing the vast amounts of data generated by emerging technologies. This requires robust and scalable infrastructures, and skilled data scientists. Organizations will need to invest in building the necessary data infrastructure and fostering a data-driven culture. Lastly, the IT industry will need to address ever growing skills gap. As technology advances day by day, the shortage of professionals with the required expertise in these areas grows. Organizations and educational institutions must collaborate to bridge this gap through upskilling programs, training initiatives, and fostering a culture of lifelong learning.

Read more: Content is a crucial aspect of your online presence as it essentially represents your brand,' says Michael Cichon


The integration of IoT with AI and ML will lead to advancements in areas like smart homes, autonomous vehicles, industrial automation, and healthcare.

M7: What are some of the best practices that IT teams should consider when it comes to network security?
AK:
In the realm of network security and cybersecurity in general, several key terms come to mind, each representing a crucial aspect of safeguarding companies.

Patching, the process of updating, fixing, or enhancing software, lies at the heart of network security. Through diligent patching practices, IT teams ensure that vulnerabilities are addressed, enabling the creation of more secure and reliable software systems. With each patch, potential security flaws are resolved, reinforcing the robustness of the software.

In parallel, the concept of hardening emerges as a fundamental principle in fortifying computer systems. It entails the implementation of various security measures to shield against unauthorized access, attacks, and malicious activities. By hardening a system, organizations fortify their defenses, creating barriers against potential threats and intrusions.

Identity management tools further contribute to the overall security posture by making it increasingly challenging for hackers to compromise identities. For instance, the implementation of Two-Factor Authentication (2FA) adds an extra layer of protection, reducing the risk of unauthorized access to sensitive information. Through effective identity management, organizations bolster their security infrastructure, mitigating the potential impact of identity-related breaches.

To complement these measures, vulnerability management emerges as a vital practice in maintaining a secure environment. By systematically identifying, understanding, and addressing vulnerabilities across the organization's network, proactive steps are taken to prevent potential security incidents. Vulnerability management serves as a continuous process, ensuring that vulnerabilities are promptly detected and mitigated - reducing the likelihood of successful cyberattacks.

Finally, the Endpoint Detection and Response (EDR) system takes center stage in the ongoing battle against cyber threats. Operating at the user device level, EDR systems vigilantly monitor for any signs of malicious activities or intrusions. By swiftly detecting and responding to emerging threats, EDR systems contribute to the overall resilience of an organization's security architecture, minimizing the potential impact of cyber incidents.

These interconnected components—patching, hardening, identity management, vulnerability management, and EDR systems—represent critical pillars. By adopting these practices, organizations fortify their defenses, fostering a secure and resilient technological landscape and letting them win the race against hackers.

M7: What role does data and analytics play in shaping your advertising strategies? How do you leverage customer insights and market trends to optimize advertising campaigns and drive better results?
AK:
Data and analytics play a crucial role in shaping our advertising strategies. We leverage customer insights and market trends to optimize campaigns and drive better results. Insights from our customer success and sales teams shape our ad strategy, and we closely monitor campaign performance for necessary adjustments. By analyzing data and staying informed about market trends, we ensure our ads are targeted, relevant, and effective.

M7: How do you tailor your messaging in the context of content creation and syndication to resonate with the specific needs and challenges of your audience?
AK:
In tailoring our messaging for content creation and syndication, our Product, Customer Success, and Sales teams begin by gaining a deep understanding of our audience's pain points through interactions and feedback. We directly address these challenges in our messaging while highlighting the potential results our product offers. Personalizing the content, highlighting benefits, and ensuring consistency across channels helps us connect with our audience and build trust. We actively seek continuous feedback to refine our approach over time.

M7: Could you explain how Autobahn Security's Cyber Fitness Workouts function and how they enable IT teams to efficiently address vulnerabilities?
AK:
The primary objective of our signature Cyber Fitness Workouts is to facilitate IT departments with comprehensive and user-friendly remediation guides that can be utilized by individuals without extensive security expertise.
Our process begins with thorough research, where we delve into multiple technical sources to ensure the accuracy and validity of the proposed remediation steps. By conducting extensive exploration, we gather information that serves as the foundation for our guides.

Next, we proceed with analysis and simplification. This stage involves a careful examination of complex technical procedures, which we then restructure and break down into a concise set of user-friendly steps. Our objective is to transform intricate processes into easily understandable actions, enabling IT professionals to navigate through them with ease. As we understand that different situations may call for alternative approaches, our guides are enriched with a range of options, providing IT professionals with flexibility based on their specific requirements or preferences.
In cases where existing resources lack necessary remediation steps, we take the initiative to fill those gaps. We create and incorporate the missing steps in our guides, ensuring comprehensive coverage of the cybersecurity landscape. By doing so, we address any potential limitations in available resources and provide IT professionals with comprehensive and reliable guidance.

To guarantee the effectiveness and reliability of our proposed fixes and remediation steps, we rigorously verify and test them. Our team carries out assessments to ensure that the suggested solutions are robust and capable of addressing the identified issues.

Through our research, analysis, enrichment of alternative approaches, creation of missing steps, and rigorous verification and testing, we make the lives of security analysts and IT professionals easier and empower them with the tools and knowledge to tackle cybersecurity concerns efficiently and effectively

Read more: ‘Security solutions need to be consistent, regardless of geography or technical stack,’ emphasizes Nishant Kaushik


The continued growth and adoption of artificial intelligence (AI) and machine learning (ML) will significantly shape the IT industry.

M7: What is your leadership style and how do you foster a culture of collaboration, creativity, and accountability within the organizations of all industries?
AK:
I would say that my leadership style combines a bottom-up approach, involving key stakeholders in decision-making, combined with a top-down approach that sets clear expectations and goals. This usually fosters collaboration, creativity, and accountability. I encourage open communication, idea-sharing, and empower individuals at all levels. By emphasizing planning, execution, evaluation, and adjustment, we stay agile and continuously improve.

M7: In your opinion, how should the marketing strategy of a new product or service be developed?
AK: When developing a marketing strategy for a new product or service, we try following a few key steps:
 
  • Understand our target market: we conduct thorough market research to identify their needs and preferences.
  • Define our unique selling proposition (USP) for the new product or service: Determine what sets our offering apart from competitors.
  • Set clear objectives: Align our marketing goals with oour overall business objectives.
  • Craft a compelling value proposition: Clearly communicate the value our product or service it delivers.
  • Select the right marketing channels: Choose channels that effectively reach our target audience.
  • Build relationships and trust: Train our teams to engage with prospects and establish long-term partnerships.
  • Monitor and adapt: Continuously track performance, make data-driven decisions, and adapt as needed.

M7: Lastly, being a leading organization in the cybersecurity industry, how do you see thought leadership playing a role in driving innovation and shaping the future of network security? How does Autobahn Security strive to establish itself as a thought leader in the industry?
AK:
Thought leadership serves as a catalyst for innovation by fostering an environment of continuous learning and exploration. It allows us to anticipate emerging trends, identify potential threats, and develop proactive solutions that address the evolving challenges in network security. By actively engaging in thought leadership, we can contribute to the advancement of the field and drive meaningful change.

One of the key aspects that sets Autobahn Security apart is our Chief Scientist & Founder, Dr. Karsten Nohl, who is widely recognized as a world-renowned ethical hacker and cyber security researcher. With his extensive experience spanning over 12 years, Karsten has consistently been at the forefront of cybersecurity advancements. His insights and expertise have been instrumental in shaping the foundation of our products and services.

At Autobahn Security, we strive to establish ourselves as thought leaders in the industry by actively sharing our industry insights with our clients and prospects. We understand the importance of open communication and knowledge sharing to foster collaboration and growth. We leverage various communication channels and tools to disseminate our expertise, including whitepapers, blog posts, webinars, and speaking engagements at industry conferences. Furthermore, we actively participate in industry forums and collaborate with other thought leaders, researchers, and organizations. By engaging in meaningful discussions and partnerships, we contribute to collective knowledge and push the boundaries of cyber security.

ABOUT AUTOBAHN SECURITY

Autobahn Security is a SaaS platform that aggregates, filters and prioritizes vulnerabilities from multiple scanners and turns them easy-to-understand remediation guides. To know more, please visit https://autobahn-security.com/

More C-Suite on deck

‘Security solutions need to be consistent, regardless of geography or technical stack,’ emphasizes Nishant Kaushik

Media 7 | June 16, 2023

Nishant Kaushik is an excellent technologist with strategic foresight and tactical know-how to manage technology-driven businesses and security expansion plans. He has successfully led cross-functional and highly focused teams to achieve business objectives that align with customer needs. Read this interview to discover Nishant’s expertise and unique perspective on omnichannel security and risk management.

Read More

‘In the industry, we've observed fragmentation, especially among larger organizations,’ says Chris Fisher

Media 7 | October 16, 2023

Chris Fisher is a seasoned marketing professional who specializes in digital marketing and demand generation to fuel business growth. I integrate product messaging and innovative strategies with data-driven marketing to achieve quantifiable outcomes. Read on to know his thoughts about safeguarding the layers of Cyber-security.

Read More

'Content is a crucial aspect of your online presence as it essentially represents your brand,' says Michael Cichon

Media 7 | June 15, 2023

Michael Cichon is a seasoned B2B marketer specializing in digital and content marketing for identity-based online fraud detection and advanced email security solutions. With an expertise in product and digital marketing, he excels in developing brand narratives, driving integrated demand generation campaigns, and connecting with customers on a personal level to inspire action. Read on to know his ideas on the importance of content syndication practices in information security industry.

Read More

‘Security solutions need to be consistent, regardless of geography or technical stack,’ emphasizes Nishant Kaushik

Media 7 | June 16, 2023

Nishant Kaushik is an excellent technologist with strategic foresight and tactical know-how to manage technology-driven businesses and security expansion plans. He has successfully led cross-functional and highly focused teams to achieve business objectives that align with customer needs. Read this interview to discover Nishant’s expertise and unique perspective on omnichannel security and risk management.

Read More

‘In the industry, we've observed fragmentation, especially among larger organizations,’ says Chris Fisher

Media 7 | October 16, 2023

Chris Fisher is a seasoned marketing professional who specializes in digital marketing and demand generation to fuel business growth. I integrate product messaging and innovative strategies with data-driven marketing to achieve quantifiable outcomes. Read on to know his thoughts about safeguarding the layers of Cyber-security.

Read More

'Content is a crucial aspect of your online presence as it essentially represents your brand,' says Michael Cichon

Media 7 | June 15, 2023

Michael Cichon is a seasoned B2B marketer specializing in digital and content marketing for identity-based online fraud detection and advanced email security solutions. With an expertise in product and digital marketing, he excels in developing brand narratives, driving integrated demand generation campaigns, and connecting with customers on a personal level to inspire action. Read on to know his ideas on the importance of content syndication practices in information security industry.

Read More

Related News

Software Security

Palo Alto Networks Intends to Acquire Talon Cyber Security

Palo Alto Networks | November 08, 2023

Palo Alto Networks plans to acquire Talon Cyber Security to enhance its Secure Access Service Edge (SASE) solution. Talon's Enterprise Browser technology, when integrated with Prisma SASE, will provide secure access to business applications. The acquisition reflects the importance of adapting SASE solutions to ensure consistent security for unmanaged devices. Palo Alto Networks, a global cybersecurity leader, has announced its intent to acquire Talon Cyber Security, an enterprise browser technology pioneer, to enhance its Secure Access Service Edge (SASE) solution and provide comprehensive protection for managed and unmanaged devices. In today's digital landscape, unmanaged devices often connect to enterprise applications without adequate security measures, making them susceptible entry points for attackers seeking to access sensitive information. Lee Klarich, Chief Product Officer of Palo Alto Networks, emphasized the importance of securing all work activity through an Enterprise Browser without compromising device privacy to protect users and applications effectively. He continued that the integration of Talon's technology with Prisma SASE aims to provide consistent security for all users and devices. Anand Oswal, SVP and GM at Palo Alto Networks highlighted the significance of securing unmanaged devices with the same robust security as managed devices, especially in today's dynamic threat landscape. HE further stated that the combination of Prisma SASE and Talon's Enterprise Browser is poised to revolutionize security measures in modern digital environments. Talon Cyber Security's Enterprise Browser technology offers an innovative solution that, when integrated with Prisma SASE, will enable users to securely access business applications from any device, including non-corporate devices, while ensuring a seamless user experience. This strategic move by Palo Alto Networks addresses the evolving security challenges in a connected world. Talon's Co-Founder and CEO, Ofer Ben-Noon, acknowledged the shifting work models and user preferences and the need for powerful last-mile security solutions. Talon's Enterprise Browser is designed to offer familiar user experiences with enterprise-grade protection. Ben emphasized that partnership with Palo Alto Networks is seen as a catalyst to accelerate its mission of delivering superior outcomes for customers. Talon, founded by Ofer Ben-Noon and Ohad Bobrov, secured the RSA Conference's Innovation Sandbox contest in 2022. The co-founders will continue to lead their teams within the Prisma SASE team at Palo Alto Networks upon the completion of the acquisition. Anand Oswal, Senior Vice President and General Manager at Palo Alto Networks, highlighted the advantages and security risks associated with Bring Your Own Device (BYOD) policies. He noted that Talon's Enterprise Browser provided security teams enhanced visibility and control over work-related Software as a Service (SaaS) and web activity across all devices, including personal and unmanaged endpoints. Anand emphasized the need for Secure Access Service Edge (SASE) solutions to adapt in order to secure unmanaged devices with the same consistent security measures applied to managed devices. This would enable users to access business applications securely from any device and location.

Read More

Network Threat Detection

Fortinet expands its Universal SASE offering to securely connect any user to any application

iTWire | October 30, 2023

Fortinet, the global cybersecurity leader driving the convergence of networking and security, has announced the expansion of its Universal SASE offering to empower today’s hybrid workforce with FortiOS everywhere. Ken Xie, founder, chairman of the board, and chief executive officer, said, The Fortinet operating system, FortiOS, is the industry’s only enterprise-grade converged operating system able to support all secure access service edge (SASE) functions, including firewall, software-defined wide area network (SD-WAN), secure web gateway, encryption/decryption, cloud access security broker (CASB), data loss prevention (DLP), and zero trust network access (ZTNA), whether deployed in an appliance or cloud-delivered from Fortinet. “This approach enables over 30 converged networking and security functions to be managed through a single console. Fourteen of these functions are accelerated when deployed on our new FortiASIC Security Processor 5-based FortiGate 120G SASE appliance.” Expanding Fortinet Universal SASE Single-vendor SASE provides flexible access to critical resources and applications for users and devices. However, most enterprises rely on different vendors for each SASE function, which introduces significant challenges of controlling different operating system functionality and management consoles. Fortinet Universal SASE takes traditional single-vendor SASE one step further, providing consistent policies and controls on-prem and in the cloud while delivering seamless integration across all functions and deployments to better support today’s hybrid workforce while reducing information technology (IT) overhead. FortiOS runs the full SASE stack, including a bi-directional firewall, SD-WAN, secure web gateway, encryption/decryption, CASB, DLP, and ZTNA. It also has the flexibility to run on an appliance in accelerated mode as well as in the FortiSASE cloud, providing consistent networking, security, and policy management for every edge. This is further enhanced by FortiGuard artificial intelligence (AI)-powered security services, such as intrusion prevention system (IPS), domain name system (DNS) filtering, URL filtering, anti-malware, sandboxing, and more. This news expands Fortinet’s investment in Universal SASE by expanding the reach of its SASE stack in three key areas of the portfolio: Worldwide coverage of FortiSASE cloud locations FortiSASE, built on a global, scalable cloud network, delivers the same SASE stack as FortiGate appliances through its regional FortiSASE cloud locations. To deliver the best user experience and higher service availability, Fortinet now delivers over 100 FortiSASE cloud locations globally. Bringing accelerated SASE to the campus and branch To bring the full SASE stack to campus and branch locations, Fortinet is announcing the new FortiGate 120G SASE appliance. Because it is powered by Fortinet’s patented security processor 5 (SP5) custom application-specific integrated circuit (ASIC), it can accelerate many elements of the SASE stack, such as delivering three gigabits per second (Gbps) of secure sockets layer (SSL) inspection—an average of six times faster than the industry average—for visibility into encrypted traffic at scale. The following Secure Compute Rating table provides a comparison between equivalent solutions: Flexible consumption extended to Universal SASE FortiFlex, Fortinet’s flexible consumption program, has now been extended to Fortinet Universal SASE solutions. The entire SASE stack from Fortinet can be consumed as part of FortiFlex, whether customers want to use on-prem or FortiSASE cloud-based services. FortiFlex offers usage-based licensing across cloud, hybrid cloud, and on-premises deployments to give IT teams the flexibility to continually right-size their deployments, reduce excessive procurement cycles for new security solutions, simplify the deployment and provisioning of new services, and maximise budget and return on investment by enabling IT teams to scale down or pause services as needed.

Read More

Software Security

SCYTHE Latest Version 4.1 Introduces Enhanced Deployment Flexibility and AI-Driven Productivity Boost

Business Wire | November 02, 2023

SCYTHE, a leading provider of cybersecurity solutions, announces the release of SCYTHE 4.1, the latest evolution in its cutting-edge cyber resilience offering. This release brings new and enhanced features to empower organizations in their continuous efforts to strengthen their cybersecurity posture. SaaS Offering for Unparalleled Flexibility SCYTHE 4.1 introduces its initial Software as a Service (SaaS) offering, providing organizations with newfound deployment flexibility. This SaaS option offers the same robust capabilities as the on-premises version, ensuring that teams can choose the deployment model that best suits their needs without pricing changes. SCYTHE's commitment to flexibility ensures that organizations can secure their infrastructure on their terms. Advanced Agent Support with Scheduling for Continuous Testing To unlock even greater control over security testing, SCYTHE 4.1 introduces advanced agent support with scheduling. This feature allows organizations to perform continuous testing by automating the deployment and execution of security assessments at specified intervals. With the power of scheduling, teams can proactively identify threats, assess controls, and evaluate their readiness to respond to cyber threats. SCYTHE empowers organizations to maintain the highest level of cyber resilience without manual intervention. Cloppy - Your AI-Powered Security Analyst In a significant leap forward, SCYTHE unveils the early access beta release of "Cloppy," its supervised machine learning (ML)-based AI analyst chatbot. Cloppy enhances team productivity, job satisfaction, and cybersecurity capabilities by delivering instant insights and recommendations. This AI-driven assistant will leverage private knowledge base instances, ensuring sensitive information stays secure. Cloppy is poised to become a trusted companion for security professionals, providing real-time guidance and augmenting their decision-making processes. As cyber threats continue to evolve, so must our approach to cybersecurity. SCYTHE 4.1 represents our commitment to innovation and empowering organizations to stay ahead of cyber adversaries, said Marc Brown, Head of Product at SCYTHE. With our SaaS offering, advanced agent support, and the introduction of Cloppy, we're equipping organizations with the tools they need to enhance their cyber resilience while simplifying offensive security. SCYTHE 4.1 Platform is now available for both new and existing customers. For more information on SCYTHE's comprehensive cyber resilience solutions, please visit https://scythe.io. About SCYTHE SCYTHE represents a paradigm shift in cybersecurity risk management, empowering organizations to Attack, Detect, and Respond efficiently. The SCYTHE platform enables collaboration between red, blue, and purple teams to build and emulate real-world adversarial campaigns. SCYTHE's innovative dual-deployment options and comprehensive features ensure a proactive cybersecurity approach. Headquartered in Arlington, VA, SCYTHE is privately funded by distinguished partners dedicated to shaping a more resilient cybersecurity landscape.

Read More

Software Security

Palo Alto Networks Intends to Acquire Talon Cyber Security

Palo Alto Networks | November 08, 2023

Palo Alto Networks plans to acquire Talon Cyber Security to enhance its Secure Access Service Edge (SASE) solution. Talon's Enterprise Browser technology, when integrated with Prisma SASE, will provide secure access to business applications. The acquisition reflects the importance of adapting SASE solutions to ensure consistent security for unmanaged devices. Palo Alto Networks, a global cybersecurity leader, has announced its intent to acquire Talon Cyber Security, an enterprise browser technology pioneer, to enhance its Secure Access Service Edge (SASE) solution and provide comprehensive protection for managed and unmanaged devices. In today's digital landscape, unmanaged devices often connect to enterprise applications without adequate security measures, making them susceptible entry points for attackers seeking to access sensitive information. Lee Klarich, Chief Product Officer of Palo Alto Networks, emphasized the importance of securing all work activity through an Enterprise Browser without compromising device privacy to protect users and applications effectively. He continued that the integration of Talon's technology with Prisma SASE aims to provide consistent security for all users and devices. Anand Oswal, SVP and GM at Palo Alto Networks highlighted the significance of securing unmanaged devices with the same robust security as managed devices, especially in today's dynamic threat landscape. HE further stated that the combination of Prisma SASE and Talon's Enterprise Browser is poised to revolutionize security measures in modern digital environments. Talon Cyber Security's Enterprise Browser technology offers an innovative solution that, when integrated with Prisma SASE, will enable users to securely access business applications from any device, including non-corporate devices, while ensuring a seamless user experience. This strategic move by Palo Alto Networks addresses the evolving security challenges in a connected world. Talon's Co-Founder and CEO, Ofer Ben-Noon, acknowledged the shifting work models and user preferences and the need for powerful last-mile security solutions. Talon's Enterprise Browser is designed to offer familiar user experiences with enterprise-grade protection. Ben emphasized that partnership with Palo Alto Networks is seen as a catalyst to accelerate its mission of delivering superior outcomes for customers. Talon, founded by Ofer Ben-Noon and Ohad Bobrov, secured the RSA Conference's Innovation Sandbox contest in 2022. The co-founders will continue to lead their teams within the Prisma SASE team at Palo Alto Networks upon the completion of the acquisition. Anand Oswal, Senior Vice President and General Manager at Palo Alto Networks, highlighted the advantages and security risks associated with Bring Your Own Device (BYOD) policies. He noted that Talon's Enterprise Browser provided security teams enhanced visibility and control over work-related Software as a Service (SaaS) and web activity across all devices, including personal and unmanaged endpoints. Anand emphasized the need for Secure Access Service Edge (SASE) solutions to adapt in order to secure unmanaged devices with the same consistent security measures applied to managed devices. This would enable users to access business applications securely from any device and location.

Read More

Network Threat Detection

Fortinet expands its Universal SASE offering to securely connect any user to any application

iTWire | October 30, 2023

Fortinet, the global cybersecurity leader driving the convergence of networking and security, has announced the expansion of its Universal SASE offering to empower today’s hybrid workforce with FortiOS everywhere. Ken Xie, founder, chairman of the board, and chief executive officer, said, The Fortinet operating system, FortiOS, is the industry’s only enterprise-grade converged operating system able to support all secure access service edge (SASE) functions, including firewall, software-defined wide area network (SD-WAN), secure web gateway, encryption/decryption, cloud access security broker (CASB), data loss prevention (DLP), and zero trust network access (ZTNA), whether deployed in an appliance or cloud-delivered from Fortinet. “This approach enables over 30 converged networking and security functions to be managed through a single console. Fourteen of these functions are accelerated when deployed on our new FortiASIC Security Processor 5-based FortiGate 120G SASE appliance.” Expanding Fortinet Universal SASE Single-vendor SASE provides flexible access to critical resources and applications for users and devices. However, most enterprises rely on different vendors for each SASE function, which introduces significant challenges of controlling different operating system functionality and management consoles. Fortinet Universal SASE takes traditional single-vendor SASE one step further, providing consistent policies and controls on-prem and in the cloud while delivering seamless integration across all functions and deployments to better support today’s hybrid workforce while reducing information technology (IT) overhead. FortiOS runs the full SASE stack, including a bi-directional firewall, SD-WAN, secure web gateway, encryption/decryption, CASB, DLP, and ZTNA. It also has the flexibility to run on an appliance in accelerated mode as well as in the FortiSASE cloud, providing consistent networking, security, and policy management for every edge. This is further enhanced by FortiGuard artificial intelligence (AI)-powered security services, such as intrusion prevention system (IPS), domain name system (DNS) filtering, URL filtering, anti-malware, sandboxing, and more. This news expands Fortinet’s investment in Universal SASE by expanding the reach of its SASE stack in three key areas of the portfolio: Worldwide coverage of FortiSASE cloud locations FortiSASE, built on a global, scalable cloud network, delivers the same SASE stack as FortiGate appliances through its regional FortiSASE cloud locations. To deliver the best user experience and higher service availability, Fortinet now delivers over 100 FortiSASE cloud locations globally. Bringing accelerated SASE to the campus and branch To bring the full SASE stack to campus and branch locations, Fortinet is announcing the new FortiGate 120G SASE appliance. Because it is powered by Fortinet’s patented security processor 5 (SP5) custom application-specific integrated circuit (ASIC), it can accelerate many elements of the SASE stack, such as delivering three gigabits per second (Gbps) of secure sockets layer (SSL) inspection—an average of six times faster than the industry average—for visibility into encrypted traffic at scale. The following Secure Compute Rating table provides a comparison between equivalent solutions: Flexible consumption extended to Universal SASE FortiFlex, Fortinet’s flexible consumption program, has now been extended to Fortinet Universal SASE solutions. The entire SASE stack from Fortinet can be consumed as part of FortiFlex, whether customers want to use on-prem or FortiSASE cloud-based services. FortiFlex offers usage-based licensing across cloud, hybrid cloud, and on-premises deployments to give IT teams the flexibility to continually right-size their deployments, reduce excessive procurement cycles for new security solutions, simplify the deployment and provisioning of new services, and maximise budget and return on investment by enabling IT teams to scale down or pause services as needed.

Read More

Software Security

SCYTHE Latest Version 4.1 Introduces Enhanced Deployment Flexibility and AI-Driven Productivity Boost

Business Wire | November 02, 2023

SCYTHE, a leading provider of cybersecurity solutions, announces the release of SCYTHE 4.1, the latest evolution in its cutting-edge cyber resilience offering. This release brings new and enhanced features to empower organizations in their continuous efforts to strengthen their cybersecurity posture. SaaS Offering for Unparalleled Flexibility SCYTHE 4.1 introduces its initial Software as a Service (SaaS) offering, providing organizations with newfound deployment flexibility. This SaaS option offers the same robust capabilities as the on-premises version, ensuring that teams can choose the deployment model that best suits their needs without pricing changes. SCYTHE's commitment to flexibility ensures that organizations can secure their infrastructure on their terms. Advanced Agent Support with Scheduling for Continuous Testing To unlock even greater control over security testing, SCYTHE 4.1 introduces advanced agent support with scheduling. This feature allows organizations to perform continuous testing by automating the deployment and execution of security assessments at specified intervals. With the power of scheduling, teams can proactively identify threats, assess controls, and evaluate their readiness to respond to cyber threats. SCYTHE empowers organizations to maintain the highest level of cyber resilience without manual intervention. Cloppy - Your AI-Powered Security Analyst In a significant leap forward, SCYTHE unveils the early access beta release of "Cloppy," its supervised machine learning (ML)-based AI analyst chatbot. Cloppy enhances team productivity, job satisfaction, and cybersecurity capabilities by delivering instant insights and recommendations. This AI-driven assistant will leverage private knowledge base instances, ensuring sensitive information stays secure. Cloppy is poised to become a trusted companion for security professionals, providing real-time guidance and augmenting their decision-making processes. As cyber threats continue to evolve, so must our approach to cybersecurity. SCYTHE 4.1 represents our commitment to innovation and empowering organizations to stay ahead of cyber adversaries, said Marc Brown, Head of Product at SCYTHE. With our SaaS offering, advanced agent support, and the introduction of Cloppy, we're equipping organizations with the tools they need to enhance their cyber resilience while simplifying offensive security. SCYTHE 4.1 Platform is now available for both new and existing customers. For more information on SCYTHE's comprehensive cyber resilience solutions, please visit https://scythe.io. About SCYTHE SCYTHE represents a paradigm shift in cybersecurity risk management, empowering organizations to Attack, Detect, and Respond efficiently. The SCYTHE platform enables collaboration between red, blue, and purple teams to build and emulate real-world adversarial campaigns. SCYTHE's innovative dual-deployment options and comprehensive features ensure a proactive cybersecurity approach. Headquartered in Arlington, VA, SCYTHE is privately funded by distinguished partners dedicated to shaping a more resilient cybersecurity landscape.

Read More

Spotlight

Autobahn Security

Autobahn Security

Autobahn Security is a SaaS platform that saves IT security experts time and empowers IT teams to make networks more secure. Our platform serves as the single pane of glass that aggregates, filters and prioritizes vulnerabilities from different scanners and turns them into easy-to-understand remedia...

Events

Resources