Converged IT and OT to Advance Security Maturity

Infosecurity Magazine | February 06, 2019

Converged IT and OT to Advance Security Maturity
The convergence of IT, operational technology (OT) and industrial internet of things (IIoT) has raised concerns about cybersecurity, safety and data privacy for many organizations, according to a new Ponemon Institute study. Released today in partnership with TÜV Rheinland OpenSky, results of the 2019 Safety, Security & Privacy in the Interconnected World of IT, OT and IIoT study found that 62% of respondents agreed or strongly agreed that security maturity will increasingly depend upon the convergence of IT and OT control systems. “Improving overall cybersecurity maturity will play a deterministic role in the success of a digitalization roadmap where the focus is to improve digital services in a complex and interconnected ecosystem," said Urmez Daver, global head of industrial security at TÜV Rheinland, in a press release.

Spotlight

Financial institutions, commercial enterprises and government organizations are all prime targets for cybercrime. Malicious software, or malware, is the primary attack tool used by cybercriminals to execute account takeover attacks, steal credentials and personal information, and initiate fraudulent transactions.

Related News

Research shows Boardroom investments in cybersecurity are most commonly the result of an incident or fears of compliance audit failure

prnewswire | October 08, 2020

Thycotic, provider of privileged access management (PAM) solutions to more than 10,000 organizations, including 25 of the Fortune 100, today released its CISO Decisions survey, an independent global study1 that examines what most influences the Board to invest in cybersecurity and the impact this has on CISO decision-making. Based on findings from more than 900 global CISOs/Senior IT decision-makers, the research shows Boardroom investments in cybersecurity are most commonly the result of an incident or fears of compliance audit failure. Because of this, the research shows more than half, 58 percent, of respondents say their organizations plan to add more towards security budgets in the next 12 months.

Read More

DATA SECURITY

Cerberus Sentinel to Acquire True Digital Security

Cerberus Sentinel | January 10, 2022

Cerberus Cyber Sentinel Corporation announced its acquisition of True Digital Security. First is a cybersecurity consulting and managed services firm based in Scottsdale, Ariz. The latter is a cybersecurity operation and compliance company with offices in New York, Florida, and Oklahoma. Under the transaction terms, True Digital will become a wholly-owned subsidiary of Cerberus Sentinel. True Digital's CEO, Rory Sanchez, will continue to lead his professionals and act as a business executive. “True Digital is an exceptional cultural fit for the Cerberus family of companies. Together we will keep businesses safe as their managed compliance and cybersecurity, plus culture, provider (MCCP+)," said David Jemmett, CEO and Founder of Cerberus Sentinel. He further added, “This acquisition expands and complements our team of deeply experienced cybersecurity professionals and executives, bringing our clients best-of-breed technology, proven processes, and people.” “True Digital Security is extremely excited to be joining the Cerberus Sentinel family,It’s rare to find a company and leadership team that so closely shares our culture, values, goals, and vision. This move will enable us to jointly accelerate the roll-out of our industry-disruptive TrueSpeed platform, and continue strengthening our premiere managed compliance and cybersecurity services on a global scale.” Rory Sanchez, CEO of True Digital Security Dr. Jerald Dawkins, Founder of TRUE-Tulsa and CISO of True Digital Security shared, “As the founder of True Digital Security, I couldn’t be more excited about the next chapter we will write with the Cerberus companies and their leadership team. I’m more passionate now than ever about the potential that lies before us, and I’m thrilled about what the future holds.” “We have been working with the True Digital team for several months to expand our security and network security monitoring capabilities. We are delighted with the way their expertise and services enhance our MCCP+ security solutions,” Jemmett added. “Our acquisition strategy is focused on bringing together global security talent as partners who want to grow with us as shareholders, leverage our security ecosystem, and are passionate about protecting our clients.”

Read More

SOFTWARE SECURITY

Vulcan Cyber Launches Remedy Cloud, providing thousands of vulnerability fixes with free access

prnewswire | November 04, 2020

Vulcan Cyber, the weakness remediation organization, today declared Vulcan Remedy Cloud, a free assistance based on the world's biggest information base of curated solutions for a huge number of security weaknesses. By sharing the Remedy Cloud library of fixes with the worldwide weakness the board network, Vulcan Cyber gives an amazing asset that smoothes out crafted by remediation by helping security and IT groups all the more viably organize remediation crusades. In related news, Vulcan Cyber today reported Vulcan remediation examination, which adds ground-breaking business insight abilities to its remediation arrangement stage. "Vulnerability management should be a means to an end, but due to process breakdowns there's never an end -- just a growing backlog of vulnerabilities that require remediation," says Yaniv Bar-Dayan, Vulcan Cyber co-founder and CEO. "We've identified a critical breakdown in the process when security teams hand off vulnerability remediation tasks to IT operations teams. Vulcan Remedy Cloud streamlines this workflow by providing both teams with remediation playbooks. This one function is extraordinarily effective at creating cross-team alignment and cooperation. We're proud to offer Remedy Cloud as a free service to our community to help enterprise organizations get fix done." Cure Cloud is an independent, free form of the Vulcan remediation knowledge abilities previously offered through the Vulcan remediation coordination stage. This remediation knowledge is the missing connection for any "found-to-fixed" remediation work process. Vulcan cures incorporate the correct patches, the best design contents, and even workarounds and repaying controls to support security and IT tasks groups rapidly tackle the most troublesome weaknesses. Vulcan remediation knowledge adds endeavor scale remediation arrangements intended to encourage more synergistic and productive remediation by coordinating cures with weakness filter, prioritization, fix and design the executives instruments. Security groups frequently distinguish and organize weaknesses yet the genuine work of remediation is finished by IT tasks, DevOps, and site dependability designing groups. Cure Cloud enables these groups to distinguish and adjust on the most ideally equipped solutions for the work, sparing time and exertion. This Vulcan Cyber freemium offering is important for a more extensive activity to help weakness the board programs become more compelling at driving remediation results. With Remedy Cloud, Vulcan Cyber opens a significant asset to whole infosec and IT people group to advance a "complete fix" outlook. Vulcan Cyber is assisting with quickening the business' move from uninvolved weakness the board to dynamic weakness remediation and robotized digital cleanliness. About Vulcan Cyber Vulcan Cyber has developed the industry's first vulnerability remediation orchestration platform, built to help cybersecurity and IT operations teams to collaborate and "get fix done." The Vulcan platform orchestrates the remediation lifecycle from found to fix by prioritizing vulnerabilities, curating and delivering the best remedies, and automating processes and fixes through the last mile of remediation. Vulcan transforms vulnerability management from find to fix by making it possible to remediate vulnerabilities at scale. The unique capability of the Vulcan Cyber platform has garnered Vulcan Cyber recognition as a 2019 Gartner Cool Vendor and as a 2020 RSA Conference Innovation Sandbox finalist.

Read More

Spotlight

Financial institutions, commercial enterprises and government organizations are all prime targets for cybercrime. Malicious software, or malware, is the primary attack tool used by cybercriminals to execute account takeover attacks, steal credentials and personal information, and initiate fraudulent transactions.