DATA SECURITY

Cigent Technology Introduces New Cybersecurity Solutions to Prevent Ransomware Attacks and Prevent Data Theft Even After a Security Breach

Cigent Technology | April 28, 2021

Cigent® Technology, an In-Q-Tel®-backed startup, today launched Cigent Data Defense, a game-changing solution that defends businesses and individuals against malware, data theft, and malicious insider attacks, putting an end to the cybersecurity industry's 30-year failure.

Cigent Data Defense technology makes use of Cigent's Windows®-based D3E® (Dynamic Data Defense EngineTM) software solution and Cigent's self-defending Safe Solid-State Drives (SSDs). Cigent Data Defense technology, which was originally designed for government/military use, is now available for private use by individuals, small-to-medium-sized businesses, large corporations, and government agencies.

Cigent Data Defense, which integrates D3E technologies with Cigent Secure SSDsTM, takes a different approach to data theft and ransomware protection than previous cybersecurity technology. Cigent's D3E for Windows is the first and only data protection software that uses file-level Zero-Trust access controls to defend sensitive files from any attack. D3E uses multi-factor authentication and encryption to protect confidential data anywhere they are shared or stored, even after a security breach. D3E can function as a stand-alone software solution or in combination with Cigent Secure SSDs.

The second half of the Cigent Data Defence solution consists of self-defending internal and external Secure SSDs from Cigent. Cigent Secure SSDs are the world's first and only storage devices that put cybersecurity safeguards as near to the data as practicable inside the device's firmware. This patented technique prevents data theft by keeping sensitive data unavailable and protected under the OS layer. It also protects against ransomware by incorporating machine learning algorithms into the storage that detect and repel unauthorized attempts to encrypt data. Cigent's Secure SSDs have "safe rooms" that use zero trust multi-factor authentication and hardware-based encryption to protect data at all times, right after the user logs in. When not in operation, they are invisible to an attacker and vanish from the OS layer when a threat is observed. When used together or separately, D3E applications and Cigent Secure SSDs have a layer of protection that is impossible to bypass.

About Cigent

Cigent is a cybersecurity firm backed by In-Q-Tel that was developed by data recovery, storage, and cyber threat specialists to protect companies and individuals from any threat vector, even after a security breach. Cigent Data Defense solves the cybersecurity industry's more than three decades of inability to combat ransomware, data theft, and insider theft by placing protection as near to the data as possible - within the firmware of storage devices - and adding Zero Trust multi-factor authentication that safeguards data at the edge, on the network, in the cloud, even when exchanged with trusted users. Cigent Data Defense is comprised of Cigent's D³E® (Dynamic Data Defense Engine™) Windows®-based software and Cigent's self-defending Secure Solid-State Drives (SSDs).

Spotlight

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

Spotlight

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

Related News

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Tenable Enhances Tenable OT Security to Provide the Broadest Coverage

Tenable | March 13, 2023

Tenable®, the Exposure Management company, announced unveiling new features within Tenable OT Security, delivering greater protection for operational technology (OT), industrial control systems and critical infrastructure, regardless of deployment size or environment configuration. The new feature keeps the CISO's organization front and center, making it easier to protect and maintain governance of the whole attack surface using the same tools and processes throughout their infrastructure, whether IT, OT, IoT, the cloud, or other platforms. Tenable is ideally positioned to assist its customers in meeting their security needs by offering an all-encompassing solution for securing mixed environments. This latest update enhances Tenable OT Security's vulnerability detection capabilities with an improvement to the OT active scanner and a tighter integration with Tenable's Nessus, the market-leading vulnerability scanning solution. Tenable OT Security now provides companies with unparalleled scanning capabilities by leveraging the technology relied upon by over 40,000 security teams worldwide. Key new capabilities include: Increased Asset Discovery and Visibility Advanced Vulnerability and Threat Detection Enhanced Dashboards and Reporting Amir Hirsh, General Manager of OT Security, Tenable, said, "We consistently hear from CISOs that they have been tasked with security for mixed environments that include both OT and IT technologies, but they don't have the requisite visibility to secure either well. The new capabilities added to Tenable OT Security provide our customers with full visibility, security and control of all their environments and assets, in one consolidated view." He added, "Now, our customers can leverage the full strength of Tenable OT active scanning, tightly integrated with embedded Nessus scans for IT assets, to create a clear view of all assets, their vulnerabilities, risk score, attack path analysis and more." (Source – Globe Newswire) This most recent upgrade also includes product localization abilities for Japanese, Chinese, French, and German, reducing training and support expenses for businesses operating in non-English speaking regions. About Tenable Headquartered in Columbia, MD, Tenable® is a leading company for Exposure Management. Tenable is relied upon by about 43,000 enterprises worldwide to comprehend and mitigate cyber risk. As the originator of Nessus®, Tenable leveraged its experience in vulnerabilities to provide the world's first platform capable of identifying and securing any digital asset on any computer platform. Over sixty percent of the Fortune 500, forty percent of the Global 2000, and significant government bodies are prospective clients of Tenable.

Read More

DATA SECURITY, ENTERPRISE SECURITY, SOFTWARE SECURITY

BigID Launches BigAI: Adapting Generative AI to Accelerate Data Security, Governance and Risk Management

Prnewswire | April 26, 2023

BigID, the leading platform for data security, compliance, privacy, and governance, today announced the launch of BigAI, its newest AI engine to accelerate data security, governance, and risk management initiatives. In today's ever-evolving tech landscape, artificial intelligence (AI) has emerged as a critical element in organizations' operations. BigAI helps bridge the gap between data insights and action by providing accurate and valuable data insight & actionable intelligence across an organization's data environment. BigAI adopts a security and privacy-by-design approach using BigID's own private models and servers, so no data is shared with public models. In addition, organizations are empowered with a specialized AI capabilities to address their data initiatives: Make Your Data Easier to Understand: BigAI improves the quality of the data environment by automatically providing friendlier names to data tables and columns, making it easier to interpret, analyze, and compare data. Document Clustering Made Easy: BigAI makes document clustering easier by automatically generating friendly cluster titles, allowing for easy indexing and searching through metadata. Document clustering promotes better data governance and management practices, improving productivity and efficiency when working with large amounts of data and documents. Faster Way to Get Answers: BigChat, a virtual personal assistant, helps guide and instruct organizations to better address their data initiatives. By leveraging the quality and richness of BigID documentation, BigChat uses BigAI to quickly generate answers to complex, technical, and bespoke questions. "At BigID, we're always pushing the boundaries of what's possible with data security, privacy, governance, and compliance," said Dimitri Sirota, CEO, and co-founder of BigID. "With BigAI, we're giving our customers the power to unlock the full potential of their data environments. Whether you're a CISO looking to secure your organization's data or a data analyst searching for better insights, BigAI is the solution you need to take your data journey to the next level." About BigID BigID's data intelligence platform enables organizations to know their enterprise data and take action for privacy, protection, and perspective. Customers deploy BigID to proactively discover, manage, protect, and get more value from their regulated, sensitive, and personal data across their data landscape. BigID has raised $485 million in funding since its founding in 2016 and has been recognized for its data intelligence innovation as a 2019 World Economic Forum Technology Pioneer, named to the 2020 Forbes Cloud 100, and listed on the 2021 Forbes.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Veracode Introduces Intelligent Software Security With Launch of Veracode Fix

Businesswire | April 19, 2023

Veracode, a leading provider of intelligent software security solutions, today launches Veracode Fix, a new AI-powered product. Trained on Veracode’s proprietary dataset, Veracode Fix suggests remediations for security flaws found in code and open-source dependencies. Shifting the Paradigm from Merely ‘Find’ to ‘Find and Fix’ “For far too long, organizations have had to choose between remediating software security flaws and meeting aggressive deadlines to push code into production. Veracode Fix makes it possible to deliver more secure software faster, at lower cost, and with higher confidence,” said Brian Roche, Chief Product Officer at Veracode. “Through the power of AI and machine learning, leveraging GPT (Generative Pre-trained Transformer) technology, we’ve revolutionized the way developers and security teams address software security issues. Nearly two decades ago, Veracode pioneered a new industry standard as a cloud-based SaaS security platform. Today, we set a new bar, moving beyond application security testing to intelligent software security.” Since its inception in 2006, Veracode has been committed to helping organizations find, understand, and remediate software security risk. The release of Veracode Fix brings software security to the next level by changing the scope of application security from merely ‘find’ to ‘find and fix.’ Automated Attacks Require Automated Response Traditionally, when a flaw is found, developers research and rewrite code to manually fix the security issue. This requires enormous effort when compounded across thousands of security flaws in a codebase. This approach typically delays releases into production and increases security debt. “Fixing security flaws has traditionally been a manual effort—until now,” said Roche. “With the increase in automated attacks, it’s no longer tenable to continue to remediate flaws entirely manually. Veracode Fix paves the way to a scalable mechanism to remove vulnerabilities before attackers can exploit them.” Veracode Fix will be generally available with initial support for Java and C# in June 2023. To learn more about Veracode Fix, read more here. About Veracode Veracode is intelligent software security. Powered by nearly two decades of data, securing more than 130 trillion lines of code, with the Veracode Software Security Platform, development teams continuously find and fix flaws at every stage of the modern software development life cycle. Trusted by security teams, developers, and business leaders from thousands of the world’s most innovative organizations, Veracode is the software security pioneer for integrated prevention, detection, and response. Learn more at www.veracode.com, on the Veracode blog, and on LinkedIn and Twitter. Copyright © 2023 Veracode, Inc. All rights reserved. Veracode is a registered trademark of Veracode, Inc. in the United States and may be registered in certain other jurisdictions. All other product names, brands or logos belong to their respective holders. All other trademarks cited herein are property of their respective owners.

Read More