SOFTWARE SECURITY

Aimei Wei of Stellar Cyber is a Cyber Security Award Finalist.

businesswire | December 07, 2020

Heavenly Cyber, the main insightful cutting edge security activities stage fueled by Open XDR, declared today that its originator and SVP Engineering Aimei Wei was named a finalist for the Cyber Security Award for Woman of the Year. The Cyber Security Award is a global rivalry, and Aimei was named a finalist from among many ladies that submitted.

The Cyber Security Awards were set up in 2014 to remunerate the best people, groups and organizations inside the network safety industry. An absolutely free occasion, the Cyber Security Awards isn't partnered with any magazines, associations, or items, so its appointed authorities settle on the entirety of their choices on legitimacy alone.

Heavenly Cyber's examination, discovery and reaction stage gives investigators 360-degree perceivability over the whole assault surface through standardized and improved metadata from ANY source. It diminishes assault recognition time from days to continuous, permitting improved asset allotment for different undertakings. Pre-constructed detections improve investigator skillsets, empowering them to distinguish and react to complex dangers and making them unquestionably more profitable by drastically decreasing alarm weariness. It is likewise simple to utilize, fusing numerous local security abilities through a solitary comfort with an instinctive client experience, and empowers clients to nightfall independent apparatuses to diminish authorizing expenses and unpredictability.

“Our solution helps security operations professionals stop, block and remediate cyberthreats wherever they occur, helping to eliminate alert fatigue and allowing them to be more productive with other projects as well as reducing the time hackers are in their environment,” said Aimei Wei, co-founder and EVP Engineering at Stellar Cyber. “I’m happy to have been named a finalist for this award.”

Spotlight

The year of 2022 presented both new and evolving trends. We primarily recognized significant activity in five main areas – Russia’s war in Ukraine and its underground implications, the continued popularity and evolution of ransomware, the rise and endurance of initial access brokers (IABs), developments in the malware threat lan

Spotlight

The year of 2022 presented both new and evolving trends. We primarily recognized significant activity in five main areas – Russia’s war in Ukraine and its underground implications, the continued popularity and evolution of ransomware, the rise and endurance of initial access brokers (IABs), developments in the malware threat lan

Related News

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Tenable Delivers Cloud Security Posture Management for Multi-cloud and Hybrid Environments

GlobeNewswire | March 23, 2023

Tenable®, the Exposure Management company, today announced significant advancements to Tenable Cloud Security, a unified and scalable Cloud Security Posture Management (CSPM) and vulnerability management solution delivered on the Tenable One exposure management platform, and expanded availability of Tenable Agentless Assessment for Microsoft Azure. Hybrid and multi-cloud strategies enable organizations to satisfy unique business requirements and accelerate innovation. But managing highly complex and distributed cloud environments – each with its own security tools, processes and specialized skill requirements – is neither easy nor straightforward. As a result, security issues such as simple misconfigurations and excessive privileges – the root cause of the majority of cloud breaches – can go unseen. Tenable Cloud Security enables organizations to achieve consistent cloud security and compliance by bringing all cloud vulnerabilities, misconfigurations and drift across multi-cloud and cloud-native environments to the forefront, providing organizations with a unified cloud security solution that simplifies and scales cloud security posture management. Tenable Cloud Security’s built-in best practices consistently enforce security posture and compliance across environments, detecting and preventing risky configurations from ever reaching cloud runtimes. When deployed as part of Tenable One, customers gain advanced vulnerability prioritization capabilities and automated remediation workflows, enabling security and DevOps teams to prioritize remediation efforts where they can have the biggest impact on security and compliance posture. “Cloud environments are in a constant state of change, meaning that security, compliance and governance is a ‘never-done’ job,” said Nico Popp, chief product officer, Tenable. “With more than half of data breaches occurring in the cloud, organizations are racing against the clock and cannot afford for weak code to go into runtime. To effectively scale security at the speed and scale of the cloud, the pendulum must swing from reactive threat detection and response to exposure management and preventive cloud security posture management.” Additional new and enhanced CSPM features include: Continuous Discovery and Assessment - Improved cloud account onboarding enables organizations to continuously discover and assess both managed and unmanaged cloud accounts, limiting blind spots and minimizing risks. Most Comprehensive Policy Portal, Views and Content - New policy portal makes it easy to view and customize over 1,500 out-of-the-box policies spanning 20 industry benchmarks and regulations. Enriched by the expertise and speed of Tenable Research, including the industry’s most comprehensive library of 71,000 known vulnerabilities, Tenable Cloud Security has 2.6 times more cloud Center for Internet Security (CIS) certifications than any other cloud security vendor. Organizations can visualize misconfiguration details, impacted resources and all the context needed to quickly remediate issues. With the new low code policy group editor, organizations can create custom policy groups enabling security teams to build custom policy groups leveraging existing policies. Automated Cloud-to-Cloud Drift Detection - New drift detection enables organizations to maintain compliance by detecting configuration drift in runtime and between Infrastructure-as-Code (IaC), automating pull requests including corrected code or step-by-step instructions to the right owner, or applying remediation code automatically to significantly reduce mean-time-to-remediation. Enhanced Reporting and Collaboration: Enhanced reporting capabilities enable security teams to accurately report on key metrics to executive leadership while increasing cross functional collaboration between security operations and compliance teams. Report and share security posture findings by role, function or by industry benchmarks and regulatory frameworks – such as CIS, SOC 2 and 20+ others. About Tenable Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies.

Read More

NETWORK THREAT DETECTION, PLATFORM SECURITY, SOFTWARE SECURITY

Deepwatch Enhances SecOps Platform to Detect and Contain Identity Threats

Deepwatch | February 08, 2023

On February 08, 2023, Deepwatch, the industry leader in advanced managed detection and response (MDR) security, announced new service offerings and enhancements to the Deepwatch SecOps Platform to enhance threat detection and containment across the organization. The introduction of Deepwatch MXDR for Identity enables enhanced detection and response to rising identity-based threats; Deepwatch MXDR for Endpoint now supports Microsoft Windows Defender, which allows automatic response capabilities on Windows endpoints; and Deepwatch SecOps Platform, user interface upgrades, provide customers with greater visibility into the efficacy of their security operations program – from practitioner dashboards to self-service, board-level metrics and reporting. Deepwatch offers comprehensive detection and automated reaction to cyber threats, as well as customized security recommendations from experienced professionals. The 24/7/365 protection provided by the Deepwatch SecOps Platform eliminates the risk and significantly enhances security posture. Based on advanced threat analytics, integrations with top security tools, and dynamic content libraries, Deepwatch's managed detection and response services (MXDR, MDR, and others) provide customers with an "always on" modern SOC that continuously adapts to the combat ever-changing threat landscape. Wesley Mullins, CTO at Deepwatch, said, "Deepwatch provides security teams the expertise, flexibility, user experience and support to rapidly accelerate their extended detection and response strategies to defend against threats targeting enterprises." He also added, "With the addition of Deepwatch MXDR for Identity, we can do more than shut down the endpoint or make a firewall rule on the fly. We can respond to a threat at every level across the customer's attack surface whether its network, cloud or identity." (Source – Business Wire) About Deepwatch Based in Florida, Deepwatch is the industry leader in managed security services, guarding businesses 24/7/365 from evolving cyber threats. Deepwatch, which is powered by Deepwatch's cloud security platform, provides the industry's quickest, most exhaustive detection and automatic response to cyber threats, along with customized advice from dedicated experts to mitigate risks and significantly improve security posture. Deepwatch is trusted by the world's biggest corporations, from the Fortune 100 to mid-sized businesses, to defend their businesses.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Immuta Announces the Release of Immuta Detect for Continuous Security Monitoring

Immuta | January 20, 2023

On January 19, 2023, Immuta, a leading data security firm, announced the launch of its latest product, Immuta Detect. Immuta Detect notifies data and security teams about unsafe data access behavior with its continuous data security monitoring capabilities, therby enabling faster and more accurate risk response and improved data security posture management across advanced and modern cloud data platforms. The product is the new vital component of Immuta's comprehensive Data Security Platform that offers security and access control, data activity monitoring and sensitive data discovery. The platform uniquely integrates with the leading cloud data platforms along with existing SIEM and Managed Detection and Response (MDR) tools. As data sources and users in modern cloud settings increase, monitoring data usage and responding to threats becomes more challenging. This is critical for safeguarding against insider threats and adhering to rules and regulations. Existing strategies to solve these problems include manual and time-consuming audits of millions of log data records housed in disparate data sources. To stay up with business demands, data and security teams need improved ways for monitoring data access, address issues precisely, and quickly adjust to shifting risk appetites. With Immuta Detect, customers can swiftly surface and prioritize data usage risks, decrease time to risk mitigation, and maintain data security by utilizing the following new features: Advanced access behavior analytics - Immuta Detect consolidates data access logs, allowing data and security teams to continuously monitor and evaluate changes in user behavior and data access entitlements by source, user activity or query, as well as get insight into changes in data classification and security configuration. Sensitive data views and indicators – The company offers a detailed analysis of each user and data activity in depth, summarizing activity across multiple criteria such as time frame, data access event categorization, sensitive data indicators, and most active data sources. Risk severity detection and scoring - It automatically scores data based on its sensitivity and security, thereby enabling data and security teams to prioritize risks and receive real-time notifications about potential security incidents. About Immuta Founded in 2015 and headquartered in Boston, MA, Immuta is a leading cloud data access control provider. It offers data engineering and operations teams a unified platform for controlling access to analytical data sets in the cloud. Additionally, it helps businesses extract value from their cloud data by securing it and giving secure access. It automates access control for any type of data on any cloud service and across any computing infrastructure. The company is now trusted for data security by Fortune 500 organizations and government agencies all around the world.

Read More