Cyber Security Challenge UK launches 24/7 games hub

September 29, 2015

Every area in the newly-launched Cyphinx virtual skyscraper will contain a new opportunity to test a different cyber skill, available 24 hours a day, 365 days a year Cyber Security Challenge UK has unveiled the first virtual world designed solely to find, test and recruit cyber talent.

Spotlight

Cyberattacks, negative consequences, impact on the brand image. We live in a world full of threats… And Data is becoming the new gold! Security of your sensitive data, regardless of location, is essential for a smooth functioning of your business processes and the development of your organization. How to be sure regarding confidential handling of sensitive information, or industrial or commercial secrets and keep your client, partner and shareholder confidence? How to deal with new regulations and European directives on privacy data protection? Data security of users becomes a priority for all CIOs.

Spotlight

Cyberattacks, negative consequences, impact on the brand image. We live in a world full of threats… And Data is becoming the new gold! Security of your sensitive data, regardless of location, is essential for a smooth functioning of your business processes and the development of your organization. How to be sure regarding confidential handling of sensitive information, or industrial or commercial secrets and keep your client, partner and shareholder confidence? How to deal with new regulations and European directives on privacy data protection? Data security of users becomes a priority for all CIOs.

Related News

SOFTWARE SECURITY

iboss Achieves FedRAMP Authorization for its Zero Trust Edge Cloud Security Solution

iboss, Inc. | July 29, 2022

iboss, the leading Zero Trust Edge cloud security provider, announces that it has obtained Federal Risk and Authorization Management Program (FedRAMP) Authorization. The achievement is reflective of the company’s commitment to work alongside federal agencies to protect government entities and civilians from growing and increasingly sophisticated cyberthreats. Earlier this year, the United States Office of Management and Budget unveiled a strategy designed to prevent damaging hacks and breaches by moving federal agencies toward a zero trust cybersecurity approach. The announcement followed a 2021 Biden Administration executive order aimed at protecting federal networks by modernizing government cybersecurity, including through the implementation of zero trust security architecture as defined in the National Institute of Standards and Technology (NIST). The iboss platform is a purpose-built, patented, cloud delivered security solution that has been trusted by organizations worldwide to implement Zero Trust architecture as laid out specifically in the NIST 800-207 Special Publication. The company’s containerized cloud architecture makes it the only platform that can control what NIST refers to as the “Implicit Trust Zone” to ensure that all data and resources are completely private. The FedRAMP authorization now extends iboss’s leading platform to all U.S. government customers. “Our Zero Trust Edge platform prevents breaches by making applications and data inaccessible to attackers while allowing trusted users to securely and directly connect to resources from anywhere. “In today’s work-from-anywhere world, protecting sensitive information, regardless of who is accessing it or where, is critical. We look forward to continuing to extend our platform and expertise to U.S. government agencies.” iboss CEO Paul Martini A Zero Trust Architecture built on iboss consolidates network security technologies (SWG, CASB, DLP, IPS, malware defense, browser isolation, firewall) into a single unified cloud platform and eliminates the need for a VPN while securing any device, regardless of location. By making all applications private, iboss eliminates the top three initial ransomware infection vectors as identified by the Cybersecurity and Infrastructure Security Agency (CISA). With applications, data and services made accessible only through the iboss Zero Trust Edge, cyber risk is greatly reduced, breaches and data loss are prevented, and visibility and security are delivered consistently throughout an organization. FedRAMP is a US government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. About iboss, Inc. iboss is a cloud security company that enables organizations to reduce cyber risk by delivering a Zero Trust service designed to protect resources and users in the modern distributed world. Applications, data and services have moved to the cloud and are located everywhere while users needing access to those resources are working from anywhere. Built on a containerized cloud architecture, iboss delivers security capabilities such as SWG, malware defense, browser isolation, CASB and data loss prevention to protect all resources, via the cloud, instantaneously and at scale. This shifts the focus from protecting buildings to protecting people and resources wherever they are located. Leveraging a purpose-built cloud architecture backed by 230+ issued and pending patents and more than 100 points of presence globally, iboss processes over 150 billion transactions daily, blocking 4 billion threats per day. More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies. iboss was named one of the Top 25 Cybersecurity Companies by The Software Report, one of the 25 highest-rated Private Cloud Computing Companies to work for by Battery Ventures, and CRN’s Top 20 Coolest Cloud Security Companies of 2022.

Read More

SOFTWARE SECURITY

Sternum Offers NXP Marketplace Real-time IoT Security and Observability Solution

Sternum | June 21, 2022

Sternum, a pioneer in autonomous IoT security and observability, has joined NXP Semiconductors' software partner community, one of the world's top makers of embedded controllers and largest marketplaces. As a result, IoT manufacturers that rely on NXP for their controller supply will be able to effortlessly integrate Sternum's proprietary security and visibility capabilities into their products as a result of this agreement. With a CPU overhead of less than 3% during the DD process, Sternum's Embedded Integrity Verification was able to disarm the threats evaluated by NXP researchers. The sternum is a great addition to NXP products since it successfully handles increased remote runtime assaults against linked devices. According to P&S Intelligence, the embedded security business will be worth more than $10 billion by the end of the decade. The graph depicts a growing need to secure more ubiquitous linked gadgets and cyber-physical systems, which are expanding in both consumer and corporate sectors, against exploitation. IoT devices, which are frequently weak in both security and visibility, are transforming whole industries—and have surfaced as a critical security breach in enterprises' security perimeters. Without proactive security measures, businesses are forced to rely on costly and time-consuming vulnerability patching, prompting them to look for other options. "NXP's microcontrollers power devices that will work as the mission-critical backbone of entire industries and cities. We are thrilled to be collaborating with NXP to secure the future of digital transformation and ensure zero-trust from device to cloud. Our products offer companies a unique degree of protection against the most dangerous attack types, and significantly reduce the cost of security-related maintenance, and we are excited to see them used to promote innovation on a global scale." Natali Tshuva, CEO and Co-Founder of Sternum Sternum's universal IoT platform ushers in a new era in which whole fleets of connected devices may be fully secure and viewable at the edge in a simple, seamless, and self-contained manner. The patented technology is designed to detect the general fingerprints of different attack exploitations, including command injection and buffer overflow attacks, and neutralize them in real-time, preserving the device's runtime integrity against zero-day and one-day attacks. This method provides total protection against a wide range of CWEs (Common Weakness Enumeration) and promotes a proactive IoT security paradigm that eliminates the need to play catch-up with hackers through expensive reactive patching.

Read More

SOFTWARE SECURITY

One Identity Announces Innovations to Security Platform

One Identity | June 06, 2022

Following the purchase of One Login last year, One Identity, a pioneer in unified identity security, today announced additional advancements to its Unified Identity Security Platform. In addition to One Identity's best-in-class offerings in Identity Governance and Administration (IGA), Identity and Access Management (IAM), Privileged Access Management (PAM), and Active Directory Management and Security (ADMS), the incorporation of OneLogin to the platform allows organizations to transition from a factionalized to a holistic approach to identity security. The inclusion of Safeguard Alchemy, a seamless on-boarding for PAM through One Identity's Starling platform, as well as device-level MFA, which offers the capability of secure MFA login access to devices, to the Unified Identity Security Platform. These new capabilities complement the platform's comprehensive analytics, as does a new passwordless auto-login function in One Identity's Safeguard product. Organizations can enable Zero Trust enforcement of access rights by ensuring the proper access permissions are provided throughout the company using a new entitlement right-sizing function. “The acquisition of OneLogin last year was a critical step for us to be able to deliver a complete and unified security strategy to our customers. Traditional identity and access management tools manage environments in a disjointed manner, leading to identity sprawl — a fragmented and inefficient approach to identity security. One Identity is transforming the way its customers are able to manage and protect access to their most valuable assets — people, identities and data — with a now complete powerful suite of identity security solutions that help simplify access management, reduce IT costs, improve security, and enhance user experience.” Bhagwat Swaroop, President and General Manager at One Identity Customers can now safeguard Windows workstations with industry-standard multi-factor authentication (MFA), leverage system-level checks to improve cybersecurity, and close security gaps in a distributed workforce and infrastructure by utilizing a combination of two powerful MFA solutions from OneLogin and One Identity. This desktop level multi-factor authentication is one of the core characteristics that distinguishes One Identity from other identity and access management suppliers, allowing enterprises to expedite cloud migration and easily scale, protect, and manage identities. The integration of OneLogin and One Identity Manager also provides customers with a centralized and mature IAM and IGA on-boarding and full identity lifecycle solution, including SSO and MFA that addresses enterprise provisioning, user self-service, approval workflows, user access attestation, user access termination, time-based access, and compliance reporting. As security breaches become more common and cybersecurity requirements get more stringent, One Identity assists clients in their transition to a Zero Trust security approach. With the integration of OneLogin into One Identity's Single Identity Security Platform, the firm provides enterprises with an united picture of users, accounts, machine identities, and accounts, transforming businesses from fragmented to unified. This platform uses identity intelligence and analytics to provide cybersecurity professionals with a clear picture of their risk profile and the ability to take remedial steps as required.

Read More