DATA SECURITY

Argus partners with Microsoft to provide Microsoft Azure IoT end-to-end Cyber Security Cloud solution for car manufacturers.

Argus | March 30, 2021

Argus Cyber Security, a global pioneer in the field of cyber automotive security, cooperated with Microsoft Azure IoT to help car manufacturers to track, identify, and mitigate cloud attacks.

Argus Fleet Protection, an Automotive Security Operation Center (ASOC) solution, in-vehicle insights from Argus Connected ECU Protection, and update capability with Argus Software Updates Over-the-Air comprise the Argus cybersecurity package for automotive applications, which is combined with Azure IoT. (OTA). The complete end-to-end cloud solution is one of the first to provide car manufactures with on-board and off-board tracking for the cyber wellbeing of their fleet.

This automotive collaboration allows car manufacturers better access to security-related in-vehicle information as well as extensive coverage of security incidents. Argus Connected ECU Protection detects operating system irregularities and unusual behavior in the vehicle using customer-defined hazard models and is implemented on connected ECUs such as telematics, infotainment centers, and ADAS systems. Threat models may be built on UNECE R 155 (WP.29), the MITRE Attack structure, or some other model that is selected. Vehicle warnings are sent to Argus Fleet Protection, where they are paired with information from other sources in dedicated automotive hazard hunting and investigation modules. Vehicle manufacturers will create a more reliable, all-encompassing cyber intelligence picture by combining end-to-end automotive cyber protection with Microsoft Azure IoT.

Furthermore, using Argus Delta OTA update technologies, car manufactures will immediately incorporate security upgrades to minimize vulnerability to cyber threats while reducing vehicle downtimes and deployment costs.

"We are thrilled to be joining the world's leading businesses on Microsoft Azure. It represents a significant step forward for vehicle manufacturers looking to minimize their exposure to cyber risk while still adhering to applicable requirements and regulations such as UNR 155 (WP.29) "said Miki Hakak, Argus Cyber Security's VP Marketing, and Business Development. "By collaborating with a global leader like Microsoft, we're making it easier for vehicle manufacturers to cost-effectively incorporate cyber protection into their vehicles without disrupting manufacturing cycles or project risk."

"Cybersecurity is a critical component in the transition to connected and autonomous vehicles," said Avijit Sinha, Microsoft's general manager for Azure Mobility. "Argus offers robust and flexible tools to ensure security through a vehicle's diverse computing resources and networks, whether it's avoiding attacks on safety-critical functions or personal data theft. The partnership of Argus and Microsoft Azure IoT offers a roadmap for automakers aiming to achieve their target of stable connected and autonomous vehicles."

ABOUT ARGUS CYBER SECURITY
To secure connected cars and commercial vehicles from cyber-attacks, Argus, a world pioneer in automotive cyber protection, offers in-vehicle solutions, consulting services, and an automotive security operation center (ASOC). Customers include automakers, retailers, and fleet managers.

Argus products and services, which are currently in development, assist in the prevention, tracking, and reaction to cyber threats on in-vehicle components, networks, and post-production fleets. Via a suite of customized advisory services that help incorporate data security standards and procedures into the whole product lifecycle, Argus professional services assist its clients in complying with applicable guidelines and regulations, such as UNECE R 155 (WP. 29). Argus' groundbreaking approaches and solutions are based on decades of cybersecurity and automotive research, which has resulted in more than 70 awarded and pending patents.

Argus was founded in 2013 in Tel Aviv, Israel, and has offices in Michigan, Stuttgart, Tokyo, Shanghai, and Korea. Argus is a wholly-owned subsidiary of Elektrobit, a multinational supplier of automotive products and services.

Spotlight

NetWall USG provides access to real-time OT data and enables secure data transfer to the OT environment without compromising the security and integrity of your critical production systems.

Spotlight

NetWall USG provides access to real-time OT data and enables secure data transfer to the OT environment without compromising the security and integrity of your critical production systems.

Related News

ENTERPRISE SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

AWS Clients Globally Can Now Use Apiiro Cloud Application Security Platform

Apiiro | January 04, 2023

Apiiro, the market leader in Cloud-Native Application Security, announced that its award-winning security platform is now accessible on AWS Marketplace. Apiiro's solution intends to assist developers and security engineers in resolving significant risks across the software supply chain before launching apps to the cloud. Instead of a single vulnerability or misconfiguration, multiple isolated and unconnected findings are scattered throughout the source code, configurations, open-source packages, and cloud infrastructure that, when combined with appropriate context, form a Risk Story that attackers can exploit. Its Risk Graph technology integrates these endless elements with actionable information to provide developers and security teams with an entirely new way to fix problems. Apiiro has introduced a whole new approach to application security by offering complete visibility into code bases, analyzing risks from design to code to the cloud, and proactively addressing actual vulnerabilities that attackers can exploit before they even get released to the cloud. By connecting to their source control managers via API, Fortune 500 businesses can cut operational costs and risks at scale while ensuring seamless deployment. Now that it is accessible in the AWS marketplace, customers may deploy Apiiro's Cloud Application Security Platform through their AWS Marketplace accounts, enabling them to quickly secure everything they develop and deliver to the cloud by proactively resolving risks with actionable context. About Apiiro Apiiro is a Cloud Application Security Platform that provides comprehensive insight and actionable context to security and development teams to proactively fix risks before releasing them to the cloud. It also assists them in addressing threats throughout the software supply chain. Since its inception, the Apiiro Cloud-Native Application Security Platform has been deployed by developers and security experts in the world's biggest organizations to handle critical threats across more than 1 million code repositories, CI/CD pipelines, and cloud infrastructures.

Read More

DATA SECURITY, ENTERPRISE SECURITY, SOFTWARE SECURITY

Edgio Enhances Its Security Platform Capabilities to Improve Edge Security

Edgio | February 28, 2023

On February 27, 2023, Edgio, Inc. announced major enhancements to its security platform to enable enterprises to better identify and respond to emerging threats while ensuring the integrity, confidentiality, and availability of their data and applications. The platform's new capabilities aim to reduce the damage caused by the upsurge in the severity of Distributed Denial of Service (DDoS) and other advanced application attacks. Edgio's DDoS scrubbing solution delivers dedicated DDoS mitigation capacity that safeguards all protocols and direct-to-origin attacks, complementing Edgio's 250+ Tbps edge network to provide full-spectrum DDoS protection. Furthermore, the new enhancements to its Web Application and API Protection (WAAP) capabilities include advanced outbound data leak prevention, rule customizer, enhanced configurability, proxy detection and region code support to help customers comply with geographical compliance rules. DDoS attacks are on the rise, and according to the 2022 Verizon Data Breach Investigations Report, the top security threat is a DDoS attack. The addition of Edgio's DDoS scrubbing solution ensures maximum resiliency and uptime of customers' networks and applications by providing full-spectrum protection against all networks and applications, including direct-to-origin network attacks against non-web applications. Moreover, the new outbound security rules with added outbound traffic scan prevent attackers from causing a data breach by exploiting known vulnerabilities, thereby offering an additional layer of protection for confidential customer data and preventing the customer from executing malicious code. Additionally, Edgio can now detect and block requests originating from anonymous proxies, therefore allowing additional control over access to customers' applications. Edgio's advanced rules customizer allows customers to control the sensitivity of individual security rules and increases its accuracy while minimizing false positives. Finally, enhanced configuration management enables developers to directly import and export configuration JSON via UI and API to deploy protection for new applications rapidly. Edgio also enables clients to control access to their applications through advanced access control rules. The latest enhancements now support more profound regional control, down to the province or region level, in its custom security rules and WAAP's access rules, supporting ongoing compliance requirements in the modern geopolitical environment. About Edgio Headquartered in Phoenix, AZ, Edgio helps companies deliver online experiences and content safer, faster and with more control. Its globally scaled edge network and integrated media and application solutions provide businesses with the tools necessary to deliver high-performance, secure web properties and streaming content quickly and securely. The company's platform and suite of edge services enable enterprises to boost their revenue and overall business value by delivering their content more efficiently and securely. Companies across various industries, including entertainment, technology, retail, and finance, depend on Edgio's technology and services to defend and accelerate their online properties.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Tenable Delivers Cloud Security Posture Management for Multi-cloud and Hybrid Environments

GlobeNewswire | March 23, 2023

Tenable®, the Exposure Management company, today announced significant advancements to Tenable Cloud Security, a unified and scalable Cloud Security Posture Management (CSPM) and vulnerability management solution delivered on the Tenable One exposure management platform, and expanded availability of Tenable Agentless Assessment for Microsoft Azure. Hybrid and multi-cloud strategies enable organizations to satisfy unique business requirements and accelerate innovation. But managing highly complex and distributed cloud environments – each with its own security tools, processes and specialized skill requirements – is neither easy nor straightforward. As a result, security issues such as simple misconfigurations and excessive privileges – the root cause of the majority of cloud breaches – can go unseen. Tenable Cloud Security enables organizations to achieve consistent cloud security and compliance by bringing all cloud vulnerabilities, misconfigurations and drift across multi-cloud and cloud-native environments to the forefront, providing organizations with a unified cloud security solution that simplifies and scales cloud security posture management. Tenable Cloud Security’s built-in best practices consistently enforce security posture and compliance across environments, detecting and preventing risky configurations from ever reaching cloud runtimes. When deployed as part of Tenable One, customers gain advanced vulnerability prioritization capabilities and automated remediation workflows, enabling security and DevOps teams to prioritize remediation efforts where they can have the biggest impact on security and compliance posture. “Cloud environments are in a constant state of change, meaning that security, compliance and governance is a ‘never-done’ job,” said Nico Popp, chief product officer, Tenable. “With more than half of data breaches occurring in the cloud, organizations are racing against the clock and cannot afford for weak code to go into runtime. To effectively scale security at the speed and scale of the cloud, the pendulum must swing from reactive threat detection and response to exposure management and preventive cloud security posture management.” Additional new and enhanced CSPM features include: Continuous Discovery and Assessment - Improved cloud account onboarding enables organizations to continuously discover and assess both managed and unmanaged cloud accounts, limiting blind spots and minimizing risks. Most Comprehensive Policy Portal, Views and Content - New policy portal makes it easy to view and customize over 1,500 out-of-the-box policies spanning 20 industry benchmarks and regulations. Enriched by the expertise and speed of Tenable Research, including the industry’s most comprehensive library of 71,000 known vulnerabilities, Tenable Cloud Security has 2.6 times more cloud Center for Internet Security (CIS) certifications than any other cloud security vendor. Organizations can visualize misconfiguration details, impacted resources and all the context needed to quickly remediate issues. With the new low code policy group editor, organizations can create custom policy groups enabling security teams to build custom policy groups leveraging existing policies. Automated Cloud-to-Cloud Drift Detection - New drift detection enables organizations to maintain compliance by detecting configuration drift in runtime and between Infrastructure-as-Code (IaC), automating pull requests including corrected code or step-by-step instructions to the right owner, or applying remediation code automatically to significantly reduce mean-time-to-remediation. Enhanced Reporting and Collaboration: Enhanced reporting capabilities enable security teams to accurately report on key metrics to executive leadership while increasing cross functional collaboration between security operations and compliance teams. Report and share security posture findings by role, function or by industry benchmarks and regulatory frameworks – such as CIS, SOC 2 and 20+ others. About Tenable Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies.

Read More