DATA SECURITY

Aviation ISAC to Partner with Cyware for Expanding Automated Response Capabilities and Threat Intelligence Sharing

Cyware | June 28, 2021

Cyware, the well-known and the only Virtual Cyber Fusion Platform provider of the industry, has announced their strategic partnership with A-ISAC (Aviation Information and Analysis Center) to make them and its members timely respond to threat intelligence. This partnership will enable members of A-ISAC to run end-to-end security automation, incident response programs, and threat hunting more efficiently leveraging Cyware’s Cyber Fusion platform.


A-ISAC, the global consortium for cybersecurity information, shares cybersecurity information across the aviation sector. It was founded by seven global aviation companies in 2014. It was established itself for the global aviation community as the trusted point of coordination related cyber threats.

In the aviation industry, A-ISAC can get help from Cyware for collecting and sharing alerts on the changing threat intelligence and landscape around specific attacks. With Threat Intelligence Exchange (CTIX) and Situation Awareness Platform (CSAP) of Cyware, members of A-ISAC can automatically share threat intelligence such as malware alerts, indicators of compromise (IOCs), security incidents, phishing, vulnerability advisories, and spear phishing attacks among its global aviation community.

About Cyware

Cyware is a company that helps enterprise cybersecurity teams for building various platform-agnostic virtual cyber fusion centers. Security operations are transformed by Cyware is using the only Virtual Cyber Fusion Center Platform of cybersecurity industry with next-generation security orchestration, automation, and response (SOAR) technology. It help organizations increase accuracy and speed.

About the Aviation ISAC

The Aviation ISAC, a worldwide, non-profit membership association, was created to help the timely exchange of susceptibilities, best practices, and threat intelligence to decrease operational hazards and offer the resources for reliable sharing and qualified exchange. It has members on five continents. Vision of ISAC is an efficient, safe, secure, and resilient international air transportation system.

Spotlight

In 2018, a large manufacturing organization experienced a ransomware attack resulting in a material security breach. The incident highlighted the need for a comprehensive cybersecurity program with greater visibility. The challenge was to implement a solution that was easy to manage and cost-effective while ensuring their sensit

Spotlight

In 2018, a large manufacturing organization experienced a ransomware attack resulting in a material security breach. The incident highlighted the need for a comprehensive cybersecurity program with greater visibility. The challenge was to implement a solution that was easy to manage and cost-effective while ensuring their sensit

Related News

DATA SECURITY, INFOSEC PROJECT MANAGEMENT

LogRhythm Announces Partnership with Zscaler to Address Cloud Access Security Challenges Faced by the Modern SOC

Businesswire | April 24, 2023

LogRhythm, the company empowering security teams to navigate the ever-changing threat landscape with confidence, announced its partnership with Zscaler, the leader in cloud security. LogRhythm and Zscaler work together to help organizations around the globe increase network insight and address a variety of cloud access security challenges faced by the modern SOC. LogRhythm SIEM and the Zscaler Zero Trust Exchange™ platform provide unparalleled visibility and security to facilitate a modern Zero Trust architecture. Zscaler secures all user, workload, and device communications over any network, anywhere. The integration with LogRhythm provides visibility into everything occurring in your network, and the websites and cloud-based resources employees are using. This level of visibility is crucial to protecting organizations. With a Zero Trust approach on many organizations’ minds, it’s imperative to have the right tools to defend against cyber threats. The LogRhythm SmartResponse™ for Zscaler Internet Access (ZIA)™ enables remediation actions from the LogRhythm console. As logs are ingested from Zscaler’s Nanolog Streaming Service (NSS) into the LogRhythm SIEM platform, the LogRhythm SmartResponse™ for Zscaler can also automatically denylist the URL in Zscaler when a banned keyword or URL is detected. “Securing an organization’s systems and networks begins with high-fidelity and trustworthy log data. LogRhythm’s expertise in turning log data into actionable insights delivered through dashboards and analytics is unrivaled in the industry,” said Andrew Hollister, Chief Information Security Officer at LogRhythm. “The combined benefits of LogRhythm SmartResponse™ and Zscaler Internet Access facilitate modern Zero Trust architecture that is the security backbone of companies across the globe.” The LogRhythm SmartResponse™ for Zscaler performs several actions including denylisting a URL, getting policy information, and adding a URL category. It simplifies running actions between the SIEM and Zscaler by centralizing day-to-day security tasks to a single console. Other key benefits of this integration include: Simplified ingestion and contextualization of Zscaler log data Accelerated detection of unwanted or denylisted URLs Use of a single console to investigate and block suspicious website access Faster response with enhanced investigative capabilities “Zscaler’s Zero Trust Exchange reduces the attack surface and enforces cybersecurity policies, and this new integration with LogRhythm can help security teams with richer insights," said Amit Raikar, VP of Technology Partnerships at Zscaler. "By leveraging Zscaler APIs for cloud-to-cloud log streaming, LogRhythm customers can gather threat and policy telemetry across a hybrid workforce accessing multicloud and SaaS applications, giving analysts a complete picture from the depth of information in Zsacler logs for optimal threat hunting and investigations." This new announcement continues LogRhythm’s impressive momentum from 2022 into this year. In addition to announcing a series of expanded capabilities and integrations for its security operations solutions, which included updates to the company’s cloud-native LogRhythm Axon platform, LogRhythm also announced its integration with SentinelOne. The integration streamlines security operations and improves response workflow, helping overwhelmed security teams cut through the noise and gain precise insights into cybersecurity threats. About LogRhythm LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency. With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Malwarebytes is the Most Effective Endpoint Protection According to Independent Third-Party Research Lab

Prnewswire | April 06, 2023

Malwarebytes, a global leader in real-time cyber protection, today announced that MRG Effitas, a world leader in independent IT research, gave Malwarebytes Endpoint Protection (EP) the highest possible score (100%) for the sixth consecutive quarter in its antivirus efficacy assessment. As of the latest Q4 2022 test results, Malwarebytes is the only vendor to win every MRG Effitas certification and award, outperforming other solutions in its ability to spot and stop zero-day threats, ransomware, banking malware, fileless attacks and exploits. The results underscore the company's ability to stay ahead of today's evolving threats through continuous product innovation. "The threat landscape isn't static, and Malwarebytes believes cybersecurity protection shouldn't be either," said Joe Hartmann, Senior Director of Threat Labs at Malwarebytes. "The results of this third-party test underscore the criticality of staying on top of today's threat techniques and building products that take advantage of proactive protection technologies, such as machine learning, that can spot and stop known, in the wild attacks, and zero-day threats. Delivering 100% efficacy with zero false positives is icing on the cake for most IT admins." MRG Effitas is an independent research and testing lab that evaluates endpoint protection solutions. In its latest report, MRG Effitas recognized Malwarebytes EP for its advanced security capabilities, particularly in detecting and preventing complex malware attacks. The signature and behavior-based detection techniques and proprietary anti-exploit technology of Malwarebytes EP allowed it to detect and block more malware than any other competitor in the Q4 tests. MRG Effitas Q4 2022 360° Assessment awarded Malwarebytes certificates in: Level 1 – Malwarebytes EP automatically blocked 100% of in-the-wild malware samples and prevented a simulated Botnet attack. Exploit – MRG Effitas used exploits in vulnerable applications attempting to deliver a malicious payload on a device with Malwarebytes EP. Malwarebytes autoblocked 100% of exploit/fileless attacks, protecting the system from infection. Online Banking – MRG Effitas simulated the Magecart credit card-skimming attack with Malwarebytes EP autoblocking 100% of the seven financial malware samples. Ransomware – MRG Effitas tested security products for 92 ransomware samples and three benign programs designed to mimic ransomware behavior. Malwarebytes blocked 100% of ransomware threats without any false positives, allowing the three benign programs to run. Android 360-degree – MRG Effitas conducted a separate assessment for Android devices, with Malwarebytes earning a perfect 100% score. "Malwarebytes' outstanding performance in detecting a wide range of threats across multiple attack vectors is a testament to its effectiveness," said MRG Effitas CEO Chris Pickard. "Collaboration with third-party testers like us helps drive innovation in protection. Malwarebytes' results underscore the effectiveness and importance of leveraging machine-learning driven processes to combat novel forms of malware and prevent false positives." About Malwarebytes Malwarebytes believes that when people and organizations are free from threats, they are free to thrive. Founded in 2008, Malwarebytes CEO Marcin Kleczynski had one mission: to rid the world of malware. Today, Malwarebytes' award-winning endpoint protection, privacy and threat prevention solutions and its world-class team of threat researchers protect millions of individuals and thousands of businesses across the globe. The effectiveness and ease-of-use of Malwarebytes solutions are consistently recognized by independent third parties including MITRE Engenuity, MRG Effitas, AVLAB, AV-TEST (consumer and business), Gartner Peer Insights, G2 Crowd and CNET. The company is headquartered in California with offices in Europe and Asia. For more information and career opportunities, visit https://www.malwarebytes.com.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Lookout Launches Mobile Endpoint Detection and Response for MSSPs to Close the Mobile Security Gap for Customers

Prnewswire | April 20, 2023

Lookout, Inc., the endpoint-to-cloud security company, today announced the availability of Lookout Mobile Endpoint Security, the industry's most advanced mobile endpoint detection and response (EDR) offering for managed security service providers (MSSPs). This solution enables MSSPs to deliver a complete turn-key program for identifying risk, protecting sensitive data and securing their customers' mobile devices. With Lookout's Mobile EDR, MSSPs can help organizations reduce the risk of a data breach through mobile phishing, ransomware and exploitation of device and app vulnerabilities. While businesses are adapting to the "new normal" of remote working and continuing to invest in mobile devices, many are still struggling with keeping up with mobile security. According to industry data, less than half of SMBs specifically have any form of mobile security in place1 – as a result mobile threats are on the rise year over year. In Lookout's recent Global State of Mobile Phishing report, 2022 marked the highest percentage of mobile phishing encounter rates ever, with an average of more than 30% of personal and enterprise users exposed to these attacks every quarter. Lookout also found that users on all devices – whether personal or work provided – are tapping more on mobile phishing links in comparison to just two years ago2. A Turn-Key Program to Close Security Gaps and Manage Mobile Risk Lookout's Mobile EDR program for MSSPs allows them to address these mobile security challenges head on – by partnering with Lookout, MSSPs have access to the Lookout mobile dataset of security telemetry, which is built on graph-based machine intelligence that analyzes data globally from more than 210 million devices, 175 million apps and ingests four million web URLs daily. In addition, Lookout's comprehensive Mobile EDR solution enables MSSPs to detect and block mobile phishing attempts; detect unauthorized camera and mic access through surveillanceware; detect and prevent credential theft and data exfiltration; detect device compromise; check all apps for risky behavior; and detect app and OS vulnerabilities. Lookout also helps MSSPs reduce resource constraints by decreasing their policy administration time by 80%. Other operational benefits for MSSPs include a 95% user self remediation rate and optimized battery consumption leading to less support tickets as well as built-in multi-tenancy for easier management. "As the threat landscape becomes increasingly sophisticated, businesses of all sizes must evolve their security strategy to keep up with and proactively address these threats, yet many do not have the security tools or skill sets in place to tackle this on their own," said Eva-Maria Elya, vice president, MSSP Sales at Lookout. "The MSSP ecosystem becomes a natural partner for them to turn to for help in managing their security posture, including identifying risk, ensuring compliance and safeguarding sensitive data across their device landscape. By extending our channel partner program to MSSPs, we help ensure these customers have access to the best security solutions delivered through the leading MSSP organizations." The Lookout Mobile EDR program for MSSPs is available today. For more information on how Lookout supports SMB customers and MSSPs, click here. About Lookout Lookout, Inc. is the endpoint-to-cloud security company purpose-built for the intersection of enterprise and personal data. We safeguard data across devices, apps, networks and clouds through our unified, cloud-native security platform — a solution that's as fluid and flexible as the modern digital world. By giving organizations and individuals greater control over their data, we enable them to unleash its value and thrive. Lookout is trusted by enterprises of all sizes, government agencies and millions of consumers to protect sensitive data, enabling them to live, work and connect — freely and safely. To learn more about the Lookout Cloud Security Platform, visit www.lookout.com and follow Lookout on our blog, LinkedIn and Twitter. © 2023 Lookout, Inc. LOOKOUT®, the Lookout Shield Design®, LOOKOUT with Shield Design®, and SIGNAL FLARE® are registered trademarks of Lookout, Inc. in the United States and other countries. DAY OF SHECURITY®, LOOKOUT MOBILE SECURITY®, and POWERED BY LOOKOUT® are registered trademarks of Lookout, Inc. in the United States. Lookout, Inc. maintains common law trademark rights in EVERYTHING IS OK, PROTECTED BY LOOKOUT, CIPHERCLOUD, SCREAM, the 4 Bar Shield Design, and the Lookout multi-color/multi-shaded Wingspan design.

Read More