ENTERPRISE SECURITY

Cengage Group Announced its Agreement to Acquire Infosec

Cengage Group | February 01, 2022

Infosec
Cengage Group, a global education technology firm with millions of students, has agreed to pay $190.8 million for Infosec, a significant cybersecurity education provider. Cengage Group will expand into the cybersecurity professional training market due to this acquisition, and its fast-developing Workforce Skills business will grow significantly. Subject to usual closing conditions and regulatory clearances, the acquisition is scheduled to close in the first calendar quarter of 2022.

"The cybersecurity industry is at a critical inflection point where the skilled labor shortage could have far-reaching and lasting effects on business and personal safety. At the same time, it provides an opportunity for un- or under-employed workers who can upskill or reskill for career advancement. With our scale and resources, more cybersecurity professionals will have access to an affordable and faster option to develop the skills they need," said Michael E. Hansen, CEO of Cengage Group. "The online, employer-paid cybersecurity training segment is currently a $1 billion market, with expectations that it will grow to $10 billion annually by 2027. Combining Infosec with our already-successful Workforce Skills business will provide top-line growth, expand our base of recurring revenue and accelerate our opportunity within the space."

Cengage Group's ed2go company will absorb Infosec as part of its Workforce Skills division, and Cengage will retain and invest in Infosec people and products to support future growth. Since its inception in 2004, Infosec has taught over 100,000 cybersecurity experts and provided training to over 5 million learners to enhance their cybersecurity knowledge and safety at home and work.

Cengage Group offers post-secondary and online continuing education courses through partnerships with hundreds of community colleges and universities, allowing students to upskill and reskill. According to Cengage Group's study on the "Great Resignation," 78 percent of people who had resigned from a job pursued online training courses or certificate programs. It stated they were critical to getting a new job. The ed2go business of Cengage Group helps job searchers and those who are currently employed by providing market-leading learning experiences that educate people for employment in high-demand fields like IT.

"Infosec was built by talented employees who truly believe that knowledge is power and care deeply about creating training materials that help cybersecurity professionals advance in their careers and keep employers and staff aware of cybersecurity threats at home and at work. Cengage Group has the same level of passion for making learning accessible, affordable and applicable to today's cybersecurity professionals,Building on ed2go's history in online training, Infosec will benefit from Cengage Group's scale and expertise, which means we can reach more cybersecurity professionals and employers that are looking to not only grow their careers but to keep businesses, governments, and people safe from cyber threats."

Jack Koziol, CEO and Founder of Infosec

The frequency of cyber-attacks rose dramatically as the world switched to remote and hybrid working environments. As a result, the demand for competent and educated cybersecurity professionals has increased, prompting the Bureau of Labor Statistics to rank information security analysts as the tenth fastest expanding occupation in the United States over the next decade, with a 31 percent increase in employment.

Spotlight

There’s no doubt the cyber threat landscape is vast and complex. These days, it’s not a question of whether a company will experience a data breach – it’s when and how extensive. Understanding the true cost of a breach is critical to an effective response. The 2015 NetDiligence® Cyber Claims Study breaks down the costs associated with a data breach based on actual claims, including: The causes of breaches and the type of data most commonly exposed. Business sectors most affected. Costs of such crisis services as forensics, legal, and customer notification/mitigation – and how to save on those costs Download the study today, and gain valuable insights into the costs associated with notification, credit monitoring, and other important crisis services.

Spotlight

There’s no doubt the cyber threat landscape is vast and complex. These days, it’s not a question of whether a company will experience a data breach – it’s when and how extensive. Understanding the true cost of a breach is critical to an effective response. The 2015 NetDiligence® Cyber Claims Study breaks down the costs associated with a data breach based on actual claims, including: The causes of breaches and the type of data most commonly exposed. Business sectors most affected. Costs of such crisis services as forensics, legal, and customer notification/mitigation – and how to save on those costs Download the study today, and gain valuable insights into the costs associated with notification, credit monitoring, and other important crisis services.

Related News

SOFTWARE SECURITY

Legal Industry Leader HBR Managed Services Partners with Tanium to Enhance Security and IT Services Capabilities

HBR Consulting | August 16, 2022

HBR Managed Services (HBR), a comprehensive strategy, operations and technology consulting firm focused on the legal industry, today announced its partnership with Tanium, the industry's only provider of converged endpoint management (XEM) for complex security and technology environments. Recognizing that law firms are attractive targets for cyber criminals, HBR is leveraging the Tanium platform to provide IT operations management, IT asset discovery, and security threat response to manage system updates at scale, thereby helping the firm's IT managed services and network operating center (NOC) clients reduce risk and operating costs. "The Tanium platform allows us to automate patching of OS and applications on servers and workstations, whether those endpoints are attached to a firm's network or not," said Bill Elser, vice president of engineering services at HBR. "That's critical in today's hybrid environment, allowing us to quickly prevent or remediate security or other operational issues by deploying registry changes and executing scripts." "The legal field faces unique challenges not only to protect the integrity and reputation of individual firms, but to safeguard the various constituencies they serve. "Tanium is keenly aware of the heightened risks the industry faces and we are proud to align with a leader like HBR as they work to secure the interests of their clients. We look forward to expanding this long-term partnership as they continue to grow." Todd Palmer, SVP of partner sales of Tanium "We're pleased to add Tanium to our roster of best-in-class vendor partners," added Chris Petrini-Poli, HBR's executive chairman. "HBR is committed to continually innovating services and partnering with best-in-class tool providers. Throughout the past year, we've been investing in relationships that will help us continue to provide exceptional, cost-effective service to our clients. We're proud to be on the leading edge of using top-of-the-line technology that ensures a continuously updated and monitored, safe and secure IT environment, while allowing HBR's team to operate as efficiently as possible." About HBR Consulting HBR Consulting (HBR) provides law firms and corporate law departments with strategic guidance, operational improvement, and technology solutions that drive innovation while managing cost and mitigating risk. HBR's proven combination of experience, relationships, and insights—spanning the legal ecosystem—delivers sustainable financial and competitive advantages for its clients. Visit www.hbrconsulting.com and follow HBR on LinkedIn and Twitter. About Tanium Tanium, the industry's only provider of converged endpoint management (XEM), leads the paradigm shift in legacy approaches to managing complex security and technology environments. Only Tanium protects every team, endpoint, and workflow from cyber threats by integrating IT, Compliance, Security, and Risk into a single platform that delivers comprehensive visibility across devices, a unified set of controls, and a common taxonomy for a single shared purpose: to protect critical information and infrastructure at scale. Tanium has been named to the Forbes Cloud 100 list for six consecutive years and ranks on Fortune's list of the Best Large Workplaces in Technology. In fact, more than half of the Fortune 100 and the U.S. armed forces trust Tanium to protect people; defend data; secure systems; and see and control every endpoint, team, and workflow everywhere. That's the power of certainty.

Read More

PLATFORM SECURITY

Sophos Announces Sophos X-Ops

Sophos | July 21, 2022

Sophos, a global leader in next-generation cybersecurity, today announced Sophos X-Ops, a new cross-operational unit linking SophosLabs, Sophos SecOps and Sophos AI, three established teams of cybersecurity experts at Sophos, to help organizations better defend against constantly changing and increasingly complex cyberattacks. Sophos X-Ops leverages the predictive, real-time, real-world, and deeply researched threat intelligence from each group, which, in turn, collaborate to deliver stronger, more innovative protection, detection and response capabilities. Sophos today is also issuing “OODA: Sophos X-Ops Takes on Burgeoning SQL Server Attacks,” research about increased attacks against unpatched Microsoft SQL servers and how attackers used a fake downloading site and grey-market remote access tools to distribute multiple ransomware families. Sophos X-Ops identified and thwarted the attacks because the Sophos X-Ops teams combined their respective knowledge of the incidents, jointly analyzed them, and took action to quickly contain and neutralize the adversaries. “Modern cybersecurity is becoming a highly interactive team sport, and as the industry has matured, necessary analysis, engineering and investigative specializations have emerged. Scalable end-to-end operations now need to include software developers, automation engineers, malware analysts, reverse engineers, cloud infrastructure engineers, incident responders, data engineers and scientists, and numerous other experts, and they need an organizational structure that avoids silos,” said Joe Levy, chief technology and product officer, Sophos. “We’ve unified three globally recognized and mature teams within Sophos to provide this breadth of critical, subject matter and process expertise. Joined together as Sophos X-Ops, they can leverage the strengths of each other, including analysis of worldwide telemetry from more than 500,000 customers, industry-leading threat hunting, response and remediation capabilities, and rigorous artificial intelligence to measurably improve threat detection and response. Attackers are often too organized and too advanced to combat without the unique combined expertise and operational efficiency of a joint task force like Sophos X-Ops.” Speaking in March 2022 to the Detroit Economic Club about the FBI partnering with the private sector to counter the cyber threat, FBI Director Christopher Wray said, “What partnership lets us do is hit our adversaries at every point, from the victims’ networks back all the way to the hackers’ own computers, because when it comes to the FBI’s cyber strategy, we know trying to stand in the goal and block shots isn’t going to get the job done. “We’re disrupting three things: the threat actors, their infrastructure and their money. And we have the most durable impact when we work with all of our partners to disrupt all three together.” Sophos X-Ops is taking a similar approach: gathering and operating on threat intelligence from its own multidisciplinary groups to help stop attackers earlier, preventing or minimizing the harms of ransomware, espionage or other cybercrimes that can befall organizations of all types and sizes, and working with law enforcement to neutralize attacker infrastructure. While Sophos’ internal teams already share information as a matter of course, the formal creation of Sophos X-Ops drives forward a faster, more streamlined process necessary to counter equally fast-moving adversaries. “Effective cybersecurity requires robust collaboration at all levels, both internally and externally; it is the only way to discover, analyze and counter malicious cyber actors at speed at scale. Combining these separate teams into Sophos X-Ops shows that Sophos understands this principle and is acting on it.” Michael Daniel, president and CEO, Cyber Threat Alliance Sophos X-Ops also provides a stronger cross-operational foundation for innovation, an essential component of cybersecurity due to the aggressive advancements in organized cybercrime. By intertwining the expertise of each group, Sophos is pioneering the concept of an artificial intelligence (AI) assisted Security Operations Center (SOC), which anticipates the intentions of security analysts and provides relevant defensive actions. In the SOC of the future, Sophos believes this approach will dramatically accelerate security workflows and the ability to more quickly detect and respond to novel and priority indicators of compromise. “The adversary community has figured out how to work together to commoditize certain parts of attacks while simultaneously creating new ways to evade detection and taking advantage of weaknesses in any software to mass exploit it. The Sophos X-Ops umbrella is a noted example of stealing a page from the cyber miscreants’ tactics by allowing cross-collaboration amongst different internal threat intelligence groups,” said Craig Robinson, IDC research vice president, Security Services. “Combining the ability to cut across a wide breadth of threat intelligence expertise with AI assisted features in the SOC allows organizations to better predict and prepare for imminent and future attacks.” About Sophos Sophos is a worldwide leader in next-generation cybersecurity, protecting more than 500,000 organizations and millions of consumers in more than 150 countries from today’s most advanced cyberthreats. Powered by threat intelligence, AI and machine learning from SophosLabs and SophosAI, Sophos delivers a broad portfolio of advanced products and services to secure users, networks and endpoints against ransomware, malware, exploits, phishing and the wide range of other cyberattacks. Sophos provides a single integrated cloud-based management console, Sophos Central – the centerpiece of an adaptive cybersecurity ecosystem that features a centralized data lake that leverages a rich set of open APIs available to customers, partners, developers, and other cybersecurity vendors. Sophos sells its products and services through reseller partners and managed service providers (MSPs) worldwide.

Read More

SOFTWARE SECURITY

Fusion Connect Introduces Extensive Security Portfolio to Help Enterprises Take Control of Their IT Environment

Fusion Connect | July 22, 2022

Fusion Connect, a leading provider of managed security and collaboration services, has launched a comprehensive security offering with a new endpoint management and security service that allows businesses to identify, control, and secure devices and applications at a time when security threats continue to disrupt companies globally. The new portfolio enables organizations to better understand the complete picture of their security risks and take action to mitigate them. Fusion Connect provides a complete solution that secures against threats while also hunting for unknown vulnerabilities that can upend a business from managing network components with advanced edge security for unified threat management (UTM) and remote access VPN to device level management. Additionally, the new portfolio helps organizations to improve reaction time to threats by connecting and securing any element in the organization's environment. The centralized platform enables enterprises to take swift action by providing a wide range of capabilities to improve IT efficiency and security hygiene. Fusion Connect's enhanced security measures come at a time when a massive talent shortage persists globally. According to (ISC)², the size of the cybersecurity workforce is 65% below what it needs to be. "Heavier workloads, unfilled positions, and security employee burnout are making things especially chaotic in cybersecurity. "With cyberattacks becoming more common, more sophisticated, and more costly, businesses need to quickly fill gaps and stop just simply firefighting. Using artificial intelligence and strategic managed services partners are ways to ensure organizations are protected and can mitigate threats before the attack occurs. And that's what our latest offering addresses." Ken Morford, Vice President of Security at Fusion Connect Fusion Connect plans to continue expanding its comprehensive security portfolio to empower CISOs to gain the control, visibility, and speed needed to thwart cyber threats and keep their networks and organizations secure. About Fusion Connect Fusion Connect manages, orchestrates, and secures the critical technology infrastructure that enables the connected enterprise. We tailor our highly available and secure cloud communication, collaboration, security, and network management platforms to meet the unique needs of our mid-market and enterprise customers. Our AI-based management systems, along with our highly skilled technicians, dynamically ensure world-class application performance under any conditions.

Read More