BlackBerry launches new threat hunting solution

SecurityBrief Asia | July 15, 2019

BlackBerry has announced the introduction of CylanceGUARD, a managed detection and response (MDR) solution that leverages BlackBerry Cylance security experts and its industry-leading native AI platform to provide continuous threat hunting and monitoring. For an elite security organisation, threat hunting takes a proactive stance to threat detection; however, there are only a handful of organisations in industries such as financial services, high-tech manufacturing, and defence that can claim to have productive threat hunting teams that deliver results. Many organisations without a mature security team are looking to external vendors to manage their threat hunting practice, allowing staff to focus on critical business initiatives. In its Worldwide Semiannual Security Spending Guide, IDC projects global spending on managed security services will reach more than $21 billion in 2019. CylanceGUARD is a subscription-based offering that validates, triages, analyses, prioritises, and automates analyst and incident engagement.

Spotlight

In recent years there have been numerous events of different threat severity, involving critical and industrial infrastructure. Famous incident names like “Wannacry” ,“Havex” and “Triton” are just a few and represent merely the tip of the iceberg. Some attacks on OT infrastructure are “industry-specific” and even “organizational-specific” targeting specific industrial sectors, or specific vendor equipment models. But others are “global,” sometimes targeting IT-typical infrastructure, and still, hit many industrial networks which - even if not been main targets of the attack - become victims of it.

Spotlight

In recent years there have been numerous events of different threat severity, involving critical and industrial infrastructure. Famous incident names like “Wannacry” ,“Havex” and “Triton” are just a few and represent merely the tip of the iceberg. Some attacks on OT infrastructure are “industry-specific” and even “organizational-specific” targeting specific industrial sectors, or specific vendor equipment models. But others are “global,” sometimes targeting IT-typical infrastructure, and still, hit many industrial networks which - even if not been main targets of the attack - become victims of it.

Related News

PLATFORM SECURITY

Sophos Announces Sophos X-Ops

Sophos | July 21, 2022

Sophos, a global leader in next-generation cybersecurity, today announced Sophos X-Ops, a new cross-operational unit linking SophosLabs, Sophos SecOps and Sophos AI, three established teams of cybersecurity experts at Sophos, to help organizations better defend against constantly changing and increasingly complex cyberattacks. Sophos X-Ops leverages the predictive, real-time, real-world, and deeply researched threat intelligence from each group, which, in turn, collaborate to deliver stronger, more innovative protection, detection and response capabilities. Sophos today is also issuing “OODA: Sophos X-Ops Takes on Burgeoning SQL Server Attacks,” research about increased attacks against unpatched Microsoft SQL servers and how attackers used a fake downloading site and grey-market remote access tools to distribute multiple ransomware families. Sophos X-Ops identified and thwarted the attacks because the Sophos X-Ops teams combined their respective knowledge of the incidents, jointly analyzed them, and took action to quickly contain and neutralize the adversaries. “Modern cybersecurity is becoming a highly interactive team sport, and as the industry has matured, necessary analysis, engineering and investigative specializations have emerged. Scalable end-to-end operations now need to include software developers, automation engineers, malware analysts, reverse engineers, cloud infrastructure engineers, incident responders, data engineers and scientists, and numerous other experts, and they need an organizational structure that avoids silos,” said Joe Levy, chief technology and product officer, Sophos. “We’ve unified three globally recognized and mature teams within Sophos to provide this breadth of critical, subject matter and process expertise. Joined together as Sophos X-Ops, they can leverage the strengths of each other, including analysis of worldwide telemetry from more than 500,000 customers, industry-leading threat hunting, response and remediation capabilities, and rigorous artificial intelligence to measurably improve threat detection and response. Attackers are often too organized and too advanced to combat without the unique combined expertise and operational efficiency of a joint task force like Sophos X-Ops.” Speaking in March 2022 to the Detroit Economic Club about the FBI partnering with the private sector to counter the cyber threat, FBI Director Christopher Wray said, “What partnership lets us do is hit our adversaries at every point, from the victims’ networks back all the way to the hackers’ own computers, because when it comes to the FBI’s cyber strategy, we know trying to stand in the goal and block shots isn’t going to get the job done. “We’re disrupting three things: the threat actors, their infrastructure and their money. And we have the most durable impact when we work with all of our partners to disrupt all three together.” Sophos X-Ops is taking a similar approach: gathering and operating on threat intelligence from its own multidisciplinary groups to help stop attackers earlier, preventing or minimizing the harms of ransomware, espionage or other cybercrimes that can befall organizations of all types and sizes, and working with law enforcement to neutralize attacker infrastructure. While Sophos’ internal teams already share information as a matter of course, the formal creation of Sophos X-Ops drives forward a faster, more streamlined process necessary to counter equally fast-moving adversaries. “Effective cybersecurity requires robust collaboration at all levels, both internally and externally; it is the only way to discover, analyze and counter malicious cyber actors at speed at scale. Combining these separate teams into Sophos X-Ops shows that Sophos understands this principle and is acting on it.” Michael Daniel, president and CEO, Cyber Threat Alliance Sophos X-Ops also provides a stronger cross-operational foundation for innovation, an essential component of cybersecurity due to the aggressive advancements in organized cybercrime. By intertwining the expertise of each group, Sophos is pioneering the concept of an artificial intelligence (AI) assisted Security Operations Center (SOC), which anticipates the intentions of security analysts and provides relevant defensive actions. In the SOC of the future, Sophos believes this approach will dramatically accelerate security workflows and the ability to more quickly detect and respond to novel and priority indicators of compromise. “The adversary community has figured out how to work together to commoditize certain parts of attacks while simultaneously creating new ways to evade detection and taking advantage of weaknesses in any software to mass exploit it. The Sophos X-Ops umbrella is a noted example of stealing a page from the cyber miscreants’ tactics by allowing cross-collaboration amongst different internal threat intelligence groups,” said Craig Robinson, IDC research vice president, Security Services. “Combining the ability to cut across a wide breadth of threat intelligence expertise with AI assisted features in the SOC allows organizations to better predict and prepare for imminent and future attacks.” About Sophos Sophos is a worldwide leader in next-generation cybersecurity, protecting more than 500,000 organizations and millions of consumers in more than 150 countries from today’s most advanced cyberthreats. Powered by threat intelligence, AI and machine learning from SophosLabs and SophosAI, Sophos delivers a broad portfolio of advanced products and services to secure users, networks and endpoints against ransomware, malware, exploits, phishing and the wide range of other cyberattacks. Sophos provides a single integrated cloud-based management console, Sophos Central – the centerpiece of an adaptive cybersecurity ecosystem that features a centralized data lake that leverages a rich set of open APIs available to customers, partners, developers, and other cybersecurity vendors. Sophos sells its products and services through reseller partners and managed service providers (MSPs) worldwide.

Read More

PLATFORM SECURITY

CyberProof Collaborates with Microsoft on Security Portfolio

CyberProof | June 22, 2022

CyberProof, a UST company, announced a partnership with Microsoft and can provide Managed Extended Detection and Response (MXDR) capabilities for Microsoft Security Services for Enterprise, a new managed service for large enterprise customers that is part of Microsoft's new security services portfolio. Microsoft Security Services for business is a comprehensive, expert-led service that manages onboarding, everyday interaction, practice modernization, and incident response by combining proactive threat hunting and MXDR with devoted Microsoft security experts. The service extends threat detection and response across Microsoft 365 Defender and Microsoft Sentinel security solutions by leveraging the human expertise and service delivery experience of MXDR providers like CyberProof and internal Microsoft teams. Customers can mitigate the cybersecurity risks associated with digital transition by leveraging CyberProof's experience with the most difficult, enterprise-scale changes. The CyberProof Defense Center platform runs on Microsoft Azure natively and connects with the Microsoft Security Stack. This allows CyberProof to assist organizations in addressing critical difficulties as they grow their security operations, ranging from log gathering and analysis to proactive search for malicious threat behavior. CyberProof's nation-state qualified cybersecurity professionals offer Managed XDR services and experience to companies wishing to transition from old on-premises security solutions to cloud-native protection. CyberProof partners with Microsoft as a Microsoft Gold Partner, with R&D teams in Tel Aviv working closely together to provide customers with end-to-end security services such as advanced threat intelligence and hunting, use case engineering, and vulnerability management. Microsoft's entry into this industry validates the importance of sophisticated MXDR services, which are quickly rising. Gartner predicts that by 2025, half of enterprises will be employing MDR services for threat monitoring, detection, and response tasks that provide threat containment and mitigation capabilities. "Our Managed XDR service offering indicates a shift in security operations supported by cloud-native technology. Forward-thinking CISOs are quickly discovering the many benefits of a cloud-native security architecture and we are helping them solve the most complex challenges as co-innovation partners with Microsoft." He continued, "We are proud to work together with Microsoft as a part of Microsoft's partner community and are excited about the process Microsoft is undergoing," said Tony Velleca, Chief Executive Officer, CyberProof. "CyberProof shares Microsoft's belief in the crucial importance of collaborating within the cybersecurity community to improve customers' threat detection and response capabilities. As members of Microsoft's partner community, we are now offering Managed XDR for Microsoft 365 Defender and Microsoft Sentinel in our portfolio." He added, "CyberProof was among the first to deploy Microsoft Sentinel in a highly regulated, global enterprise, and today, our close partnership with Microsoft is expanding to address the increasing demand for Managed XDR services." Yuval Wollman, President, CyberProof "CyberProof is committed to collaboration within the cybersecurity community. We value CyberProof's capabilities in cyber defense and appreciate the team working with us to improve the ability of our customers to predict, detect, and respond to security threats faster." said Kelly Bissell, Corporate Vice President of Security Service Line, Microsoft.

Read More

PLATFORM SECURITY

ReliaQuest GreyMatter joins Microsoft Intelligent Security Association

ReliaQuest | June 17, 2022

ReliaQuest, a security operations force enhancer, announced today that it has joined the Microsoft Intelligent Security Association (MISA). MISA is an ecosystem of independent software manufacturers and managed security service providers that have linked their products to better guard against an ever-increasing number of threats. "With digital transformation driving migration to Microsoft Azure, it becomes even more critical to have a unified view across an organization’s security infrastructure. Now, with added support for Microsoft Sentinel, Microsoft 365 and Microsoft Defender for Endpoint, ReliaQuest GreyMatter extends visibility across the Microsoft ecosystem. GreyMatter unifies detection, investigation and response to drive security effectiveness and cyber resilience, while allowing the customer to integrate Microsoft Security products at the pace that best suits their organization.” Brian Foster, ReliaQuest Chief Product Officer This partnership makes it simple for Microsoft clients to ingest data and automate activities across any vendor solution, whether on-premises or in one or more clouds. GreyMatter, in conjunction with extensive security operations knowledge, accelerates threat detection and response. This improves the efficiency of current investments, such as the correlation capabilities of Microsoft Sentinel and Microsoft Defender for Endpoint. GreyMatter contextualizes threat research, aggregate customer knowledge, more than 40 open source and commercial security data sources to build a complete, actionable picture of present and upcoming risks. ReliaQuest will continue investing in GreyMatter's integration capabilities with the Microsoft 365 security suite, extending the ReliaQuest aim to "Make Security Possible." Rob Lefferts, Corporate Vice President, Microsoft Defender said that, “Microsoft Intelligent Security Association members, like ReliaQuest, leverage Microsoft’s security products to better defend against cyber security threats with identity and access management, threat protection, information protection and security management.”

Read More