Honeywell | September 11, 2023
Honeywell has announced that it's the first company to incorporate quantum-computing-hardened encryption keys into smart utility meters, protecting end-user data from advanced cybersecurity threats.
Quantinuum's Quantum Origin provides an advantage over conventional solutions by generating keys with quantum-computing-enhanced randomness.
Honeywell's new Smart Energy and Thermal Solution products powered with Quantum Origin are now available to North American and European customers.
Honeywell recently made a groundbreaking announcement that it is the first company to incorporate quantum-computing-hardened encryption keys into smart utility meters, a move that provides advanced protection for end-user data against cyber threats. To achieve this, Honeywell will leverage Quantinuum's Quantum Origin technology to not only enhance data security but also contribute to building greater reliability and trust in the evolving utility sector.
The enhanced security utility meters establish a new standard for safeguarding against data breaches and ensuring the uninterrupted operation of water, gas, and electricity utility infrastructure for both commercial and residential applications.
Quantinuum's Quantum Origin provides an advantage over conventional solutions by generating keys with quantum-computing-enhanced randomness, thereby rendering them truly unpredictable and substantially enhancing the data security of utilities' end users.
No other organizations in the smart meter market presently offer quantum-hardened encryption protection. The incorporation of this technology into Honeywell's Smart Energy and Thermal Solutions' products will assist in addressing the industry's expanding data security requirements, especially as they pertain to critical infrastructure.
President of Smart Energy and Thermal Solutions at Honeywell, Hamed Heyhat, said,
By integrating Quantinuum's quantum-computing-hardened encryption technology into our smart meters, we are advancing data security for our customers and helping to shape the dialogue on how the utility industries should approach cybersecurity in the quantum era.
[Source – Cision PR Newswire]
Hamed Heyhat emphasized the significance of continuous innovation in enabling customers to stay ahead of the ever-changing threat landscape. It was noted that such a level of protection is crucial in our progressively digital and interconnected world.
Tony Uttley, President and COO of Quantinuum, mentioned,
Our work with Honeywell demonstrates the importance of using the power of today's quantum computers to create a more resilient cyber infrastructure to better protect customers.
[Source – Cision PR Newswire]
Smart Energy and Thermal Solution products from Honeywell with Quantum Origin are now available to North American and European customers. The collaboration will strengthen Honeywell's position as an industry-leading provider of innovative and secure solutions for the utilities industry.
Data Security, Platform Security, Software Security
Businesswire | June 30, 2023
Immuta, a data security leader, today announced at Snowflake’s annual user conference, Snowflake Summit 2023, the launch of its latest platform enhancements to deliver simplified data security and monitoring in Snowflake so that joint customers can unlock more value, reduce costs, and speed up innovation. These new features include strengthened data mesh support, enhanced security for AI workloads in Snowpark, and advanced Data Security Posture Management (DSPM).
The partnership between Immuta and Snowflake continues to have strong momentum, fueled by the growing adoption of their solutions at organizations across industries, including JB Hunt, Roche, and Thomson Reuters. In the last year, Snowflake has awarded Immuta with competency recognitions in the Healthcare & Life Sciences and Financial Services sectors. Earlier this week at Snowflake Summit, Immuta was also presented with the prestigious Data Security Partner of the Year Award by Snowflake.
"Immuta has been pivotal in mitigating risk and optimizing operational efficiencies, allowing us to support self-service analytics and distributed data stewardship. We are innovating more and worrying less about security," said Paul Rankin, Head of Data Management Platforms at Roche.
“As data volumes and AI-initiatives expand in the cloud, and more data teams adopt data mesh architectures, so too does the attack and risk surface,” said Steve Touw, CTO, Immuta. “As we extend our leadership in the data security category, we continue to collaborate with Snowflake to ensure our joint users can access their data securely at scale and continuously monitor usage to ensure security and compliance.”
Securely Deploy New Data Products With Data Mesh
Data mesh architectures promote decentralized data ownership to facilitate data management and help data owners build scalable and secure data-as-a-service products. However, the decentralized nature of a data mesh makes consistent data access control and policy enforcement difficult for organizations to manage at scale.
Data mesh relies on four key pillars – domain-centric ownership and architecture, data-as-a-product, self-service data platform, and federated computational governance. Immuta’s built-in support for federated governance enhances Snowflake’s data governance capabilities to include scoping permissions through logical domain separation. Immuta’s support for data-as-a-product allows for granular permissioning of roles within individual data domains, and helps data owners securely innovate, build and deploy new data products, while eliminating centralized IT bottlenecks and accelerating their data mesh vision.
Enhanced Security for AI Workloads in Snowpark
Organizations are leveraging AI and ML to build advanced data science solutions for fraud detection, sentiment analysis, next-best-offer, predictive maintenance, and more. These solutions access a variety of data with speed and organizations must ensure the data is protected and in compliance with usage requirements. By leveraging Immuta, organizations can now enforce access controls and maintain compliance to effectively safeguard their data and AI workloads accessed via Snowpark.
Advanced Data Security Posture Management with Immuta Detect
Data is more available and distributed than ever, however the likelihood of a data breach is also at an all time high. In response, Data Security Posture Management (DSPM) has emerged as a new category of solutions aimed at discovering and mapping data flows and repositories to address new cloud data security and privacy challenges.
Immuta Detect, now available to Snowflake customers, provides timely insights into data access, user activity and data controls, enabling data security posture management and risk remediation with the Immuta Data Security Platform. Users can now view a continuous data security posture management dashboard that shows a concise overview of data access insights, increasing awareness of attack indicators and risk vectors so that security teams can take action to improve data security. In addition, Immuta’s new Dynamic Query Classification (DQC) automatically classifies queries according to content and sensitivity level to provide security teams with better insight into what sensitive data is being accessed from unanticipated data combinations that are breaching confidentiality and potentially being exfiltrated.
“Customers rely on Snowflake to maximize the value of their data, and to do so they’re building new architectures like data mesh and supporting new use cases using AI. To accomplish these initiatives, the data must be secured and security teams must have visibility into how the data is used in order to ensure compliance,” said Tarik Dwiek, Head of Technology Alliances at Snowflake. “Immuta is a key data security partner, and we’re thrilled to work with them as they roll out these new capabilities to provide great customer experiences.”
Learn more about Immuta and Snowflake’s partnership here.
Be sure to check out the Snowflake Summit 2023 keynotes live or on-demand here and stay on top of the latest news and announcements from Snowflake on LinkedIn and Twitter.
Immuta enables organizations to unlock value from their cloud data by protecting it and providing secure access. The Immuta Data Security Platform provides sensitive data discovery, security and access control, data activity monitoring, and has deep integrations with the leading cloud data platforms. Immuta is now trusted by Fortune 500 companies and government agencies around the world to secure their data. Founded in 2015, Immuta is headquartered in Boston, MA.
Enterprise Security, Platform Security, Software Security
Business Wire | August 10, 2023
Abnormal Security, the leading behavioral AI-based email security platform, today announced CheckGPT, used to detect AI-generated attacks. The new capability determines when email threats, including business email compromise (BEC) and other socially-engineered attacks, have likely been created using generative AI tools.
Cybercriminals are constantly evolving their attack tactics to evade detection by security defenses, and generative AI is the newest weapon in their arsenal. Using tools like ChatGPT or its malicious cousin WormGPT, threat actors can now write increasingly convincing emails, scaling their attacks in both volume and sophistication. In its latest research report, Abnormal observed a 55% increase in BEC attacks over the previous six months—with the potential for volumes to increase exponentially as generative AI becomes more widely adopted.
“The degree of email attack sophistication is going to significantly increase as bad actors leverage generative AI to create novel campaigns,” said Karl Mattson, chief information security officer at Noname Security. “It's not reasonable that each company can become an AI security specialty shop, so we're putting our trust in Abnormal to lead the way in that kind of advanced email attack detection.”
Unlike traditional email security solutions, Abnormal takes a radically different approach to stopping advanced email attacks, making it particularly well-suited to the challenge of blocking AI-generated attacks. The unique API architecture ingests thousands of diverse signals to build a baseline of the known-good behavior of every employee and vendor in an organization based on communication patterns, sign-in events and thousands of other attributes. It then applies advanced AI models including natural language processing (NLP) to detect abnormalities in email behavior that indicate a potential attack.
After initial email processing, the Abnormal platform expands upon this classification by further processing email attacks to understand their intent and origin. The CheckGPT tool leverages a suite of open source large language models (LLMs) to analyze how likely it is that a generative AI model created the message. The system first analyzes the likelihood that each word in the message has been generated by an AI model, given the context that precedes it. If the likelihood is consistently high, it’s a strong potential indicator that text was generated by AI.
The system then combines this indicator with an ensemble of AI detectors to make a final determination on whether an attack was likely to be generated by AI. As a result of this new detection capability, Abnormal recently released research showing a number of emails that contained language strongly suspected to be AI-generated, including business email compromise and credential phishing attacks.
“As the adoption of generative AI tools rises, bad actors will increasingly use AI to launch attacks at higher volumes and with more sophistication,” said Evan Reiser, chief executive officer at Abnormal Security. “Security leaders need to combat the threat of AI by investing in AI-powered security solutions that ingest thousands of signals to learn their organization’s unique user behavior, apply advanced models to precisely detect anomalies, and then block attacks before they reach employees. While it’s important to understand whether an email was generated by a human or AI to understand and stay ahead of evolving threats, the right system will detect and block attacks no matter how they were created.”
About Abnormal Security
Abnormal Security provides the leading behavioral AI-based email security platform that leverages machine learning to stop sophisticated inbound email attacks and dangerous email platform attacks that evade traditional solutions. The anomaly detection engine leverages identity and context to analyze the risk of every cloud email event, preventing inbound email attacks, detecting compromised accounts, and remediating emails and messages in milliseconds—all while providing visibility into configuration drifts across your environment. You can deploy Abnormal in minutes with an API integration for Microsoft 365 or Google Workspace and experience the full value of the platform instantly, with additional protection available for Slack, Teams, and Zoom. More information is available at abnormalsecurity.com.