Cisco to Secure Its Blockchain-as-a-Service (BaaS) Platform for enterprise security

Cisco | June 10, 2020

  • Cisco has done some work on its own enterprise blockchain tools, the networking firm is also using blockchain internally.

  • Cisco’s StealthWatch Cloud will be embedded in the enterprise blockchain platform offered by Lambda 256.

  • The StealthWatch solution uses machine learning and behavioral modeling to respond to cybersecurity threats.


South Korea’s Lambda 256 has partnered with Cisco for the security of its Blockchain as a Service (BaaS) platform, Luniverse. Cisco’s StealthWatch Cloud will be embedded in the enterprise blockchain platform offered by Lambda 256. The StealthWatch solution uses machine learning and behavioral modeling to respond to cybersecurity threats. Luniverse supports Hyperledger Fabric in its BaaS hosting offering. Even though this offering is enterprise focused, the company’s heritage is in the cryptocurrency sector.


Lambda 256 is part of Dunamu, which operates the Upbit crypto exchange and also a venture investment fund with ten blockchain investments. While Cisco has done some work on its own enterprise blockchain tools, the networking firm is also using blockchain internally. Four months ago, it partnered with NEC to use blockchain to ensure the authenticity of its networking equipment and make sure software is not tampered with. Cisco is also a participant in the Trust Your Supplier offering from Chainyard to manager supplier qualifications. Other members include IBM, Lenovo and Nokia.



Read more: CISCO'S 6 UNPATCHED INTERNAL SERVERS COMPROMISED

While most technologies aim to improve enterprise and societal problems, blockchain technology could stand out given its transparency and security while remaining decentralized and inclusive.

~ Cisco


Much has been written about blockchain’s potential as well as its unfulfilled promises. While blockchain is distributed and secure, verifying transactions through the network can be slow. As observers have indicated, blockchain could change industries, from finance to healthcare. From its origins as an airtight validation mechanism for bitcoin, a digital currency, enterprise blockchain technology has made its way into a range of industries, as it secures any valued digital asset.


It does so by recording digital asset transactions—payments, medical records, votes, and potentially many other things. Blockchain is seen as immutable and secure because the permanent, append-only ledger is distributed among blocks across many physical storage nodes. Code can be embedded in the blockchain to customize its security and behavior even further.


The result is a network of nodes that can locate relevant data – but that is protected from malicious hackers, because the hack would have to solve every hash solution in the chain–and the hash solutions are all spontaneous.


It's easy to see how the complexity of the security rules outlined above, computationally intensive as they are, would make a blockchain as slow as molasses–and most are. Early blockchains could manage only one or two transactions per second, and even today, five to seven transactions per second is considered blindingly fast. That's a deal breaker in many scenarios. Conceptually, a blockchain is a decentralized, distributed network. In practice, however, since every node in the network is aware of every transaction, a consensus protocol is required–and that forces a tradeoff between decentralization and low transaction throughput.


The methodologies emerging for scenario-specific blockchain implementation inevitably add a layer of complexity to an already complex undertaking. This complexity is the cost of doing business for a technology that swings for the fences quite assertively in an Internet-driven world, rife with security threats and infrastructural compromise. But any enterprise capable of wrestling with the intricate elegance of blockchain in the first place should be up to that task, and should reap game-changing rewards.


Read more: GOOGLE TOP CHOICE FOR CYBERCRIMINALS FOR BRAND-IMPERSONATION SPEAR-PHISHING CAMPAIGNS

Spotlight

"“The CIS Benchmark was created using a consensus review process comprised of subject matter experts. Consensus participants provide perspective from a diverse set of backgrounds including consulting, software development, audit and compliance, security research, operations, government, and legal."

Spotlight

"“The CIS Benchmark was created using a consensus review process comprised of subject matter experts. Consensus participants provide perspective from a diverse set of backgrounds including consulting, software development, audit and compliance, security research, operations, government, and legal."

Related News

DATA SECURITY

CyberHat secures $15 million in funding to expand its CYREBRO Enterprise-Level Cybersecurity Protection to Small and Medium-Sized Businesses

CYREBRO | April 22, 2021

CYREBRO, the one-of-a-kind SOC as a stage arrangement by CyberHat declared today it has gotten $15 million in Series B financing, driven by Prytek, with support from InCapital, Mizrahi Bank, and past financial backer, Mangrove. This brings the complete organization subsidizing raised to date to $22M. Upheld by a group of digital specialists, CYREBRO is democratizing admittance to best-of-breed network safety assets, changing how organizations today run their security tasks to rapidly react to and relieve digital dangers. CYREBRO is the principal innovation freethinker cloud-based security tasks focus (SOC) that is spearheading the SOC-as-a-Platform model. CYREBRO applies extensive endeavor level information security to associations against new dangers that have emerged from the distant workplace, including under-resourced private companies that have become ideal objectives for digital assaults. The new subsidies will be utilized to extend CYREBRO's SOC-as-a-Platform to fulfill the detonating need for vigorous, versatile, straightforward, and basic security activities arrangements. Bringing to bear aptitude and conveying bespoke answers for undertakings across businesses, the subsidizing will speed up carry out of its contribution to the little to-medium estimated (SMB) market, separating hindrances to getting to fundamental network protection arrangements beforehand unattainable to the SMB client. Ludicrous year alone more than 47% of independent companies have encountered an information break or digital assault, and these occurrences can cut down a whole organization. CYREBRO empowers organizations to unify online activities of the whole security stack, putting the force of big business grade SOC into the moderateness and adaptability of cloud-based assistance. "CYREBRO is the subsequent stage in the advancement of working network safety and we are pleased to pioneer the SOC as a staged market," clarified Nadav Arbel, CEO of CyberHat. "Getting this round with our new and existing financial backers will empower us to speed up the improvement of CYREBRO and reinforce our range in the SMB market. We have made it our central goal to empower 1st-grade security tasks for associations of any size and any innovation stack, and all things considered, we are exceptionally eager to see the colossal development in CYREBRO customers across the globe." CYREBRO's SOC stage is upheld by a group of cutting-edge digital examiners and measurable agents good to go, 24x7. The stage coordinates with any current security frameworks, devices, and programming, including all cloud-based stages and interior organization gadgets. CYREBRO offers a "turnkey" answer for SOC necessities, including the SIEM innovation (whenever required), danger chasing, danger insight, full-level investigators, analytical capacities, and a top notch IR accessible as needs are. Many universally settled organizations have effectively picked CYREBRO as their digital tasks stage to safeguard against information penetrates and assaults. This incorporates SMBs just as a basic foundation and enterprises like clubs, worldwide retailers, banks, insurance agencies, and other Fortune 500 organizations. Presently every SMB will approach these equivalent undertaking apparatuses and digital assurance assets. "Prytek bunch, through our corporate endeavor arm, is eager to put resources into CyberHat. Cyberhat's answer will provide for our oversaw administrations to arm extra SOC capacities per request," said Arnon Shiboleth, Prytek Co-CEO. "We anticipate cooperating with the group as they keep on growing the innovation into new business sectors to satisfy the worldwide need." About CYREBRO CYREBRO was established in 2013 by CyberHat to help organizations take digital security to new and exceptional statures. Today, our central goal is to change network safety tasks by putting the force of an undeniable Security Operations Center (SOC) in the possession of any client in any association. Our group of head network protection specialists has built up the business' first on the web, innovation freethinker SOC-as-a-Platform. From vital observing to proactive danger chasing, sped up episode reaction, and upgraded consistency, we cover the full extent of safety needs. About Prytek Prytek imagined a news idea of a Business Operating Platform as a Service permitting banks to rethink whole activities. Prytek works in training, monetary help, digital and HR areas.

Read More

DATA SECURITY

75% of IT Leaders are Unconvinced About the Security of their Web Applications

Cymatic | April 12, 2021

Today, Cymatic released new research on the state of web application security. While IT leaders tend to be somewhat confident in their existing solutions, relying on various products renders smooth adoption of emerging tools—and therefore overall cyber threat prevention—a major task. Pulse conducted a study of C-suite and VP-level executives in information technology and cybersecurity and discovered that the most common approaches to web application safety fail to engender the trust necessary for effective cyber attack protection. Among the key findings are: • While 91% of executives spend up to a third of their web app technology budget on security, privacy, and compliance activities, they continue to rely heavily on strong password standards to protect against cyber threats. • MFA, WAFs, and CAPTCHAs are the top technologies used to protect web apps, with 75%, 74%, and 63%, respectively. • Account takeovers are the threat scenarios that most concern 73% of respondents. “After spending twenty-five years spending time and money cleaning up after breaches and hackers whose creativity was still at least one step ahead of network protections, I was able to see where all the security holes are,” said Cymatic Founder and CEO Jason Hollander. “We created the CymaticONE platform to fill those holes and reduce the complexity of existing web application solutions, making it simpler and easier to defend against modern-day attack vectors.” The Cymatic platform provides universal in-session visibility and control to minimize risk across web applications, networks, and users, while also reducing network traffic loads and removing user friction. Unlike standard WAFs, which only defend against network-based threats, Cymatic employs advanced artificial intelligence and machine-learning algorithms to detect page mutations and user anomalies. The platform protects against user-generated and device-based risks such as poor credential hygiene, dark web vulnerabilities, and potentially risky devices. It is completely invisible to users, deploys in minutes, and has an absolute time-to-value. Although many respondents defined obstacles to change their existing web application firewall (WAF) installations, nearly 90% expect to reconsider their investments within the next six to 18 months. Cymatic provides the first web application firewall to combine client-side WAF protection with a proprietary vulnerability, awareness, detection, and response (VADRTM) AI engine to avoid user- and app-based threats in their tracks, making it simple for any company to bridge gaps in their installations. Unlike other products that make static decisions based on siloed threat signals, Cymatic correlates and evaluates thousands of signals around a dozen threat vectors in real-time to provide a higher level of security accuracy without compromising user experience or application efficiency. Only Cymatic provides full real-time visibility and protection against all code-injection attacks, user risk, and session fraud—all with a single line of javascript. About Cymatic Cymatic is the only company that provides a web application firewall (WAF) solution that combines client-side WAF protections with a proprietary vulnerability, awareness, detection, and response (VADRTM) engine to provide immediate and continuous in-session intelligence regarding devices, users, and locations. Cymatic's first-look, the first-strike capability is the first in the kill chain, reducing risk across applications, networks, and users while ensuring organizations comply with today's security-driven regulations. The solution is undetectable to users, deploys in minutes, and operationalizes in seconds. Cymatic is based in Raleigh, North Carolina, and has branches in California and New York.

Read More

New research shows that companies with good cybersecurity beat the market by up to 7%

prnewswire | October 06, 2020

BitSight, the Standard in Security Ratings, and Solactive, a German index engineering firm, today released new research demonstrating that a company's cybersecurity performance is an indicator of business performance. Analysis shows that indices composed of well-performing BitSight-rated companies outperform their respective benchmarks by 1% to 2% annually. For certain sectors, such as U.S. Technology, well-rated companies outperform the benchmark by 7% per year. The findings are an endorsement for today's introduction of the Solactive BitSight Cyber Risk Index, a financial index that will enable investors to invest in companies who are top cybersecurity performers as measured by BitSight.

Read More