Network Threat Detection

Cybersixgill's industry-leading, automated threat intelligence is now available on the Swimlane Platform.

Cybersixgill | March 18, 2021

Cybersixgill, the pioneer in danger knowledge enablement, today reported that Darkfeed will be accessible through Swimlane's security robotization stage. Presently, Swimlane users can upgrade their danger research and occurrence response by coordinating noteworthy alerts from the industry's broadest and most comprehensive insight assortment from the profound and dull web.

"Accurate and actionable intelligence is the key to successfully scaling cyber security operations," said Ron Shamir, VP products and technology alliances at Cybersixgill. "With Darkfeed, Swimlane users gain access to an automated stream of threat intel that they can tailor to meet the needs of their organization's risk posture and tolerance. This marks the beginning of a growing partnership with Swimlane."

Controlled by the broadest computerized assortment from the profound and dim web, Cybersixgill Darkfeed is a feed of malicious indicators of compromise (IOCs), including domains, URLs, hashes and IP addresses. With Darkfeed, IOCs are consequently extricated and conveyed progressively. It is noteworthy, permitting Swimlane customers to get and preemptively block items that undermine their association straightforwardly from the Swimlane stage.

"Cybersixgill is a natural partner for us as we continue to help customers identify new ways to automate some of security's most time and resource-intensive processes," said Karen Rhys Wood VP global alliances, at Swimlane. "By integrating Darkfeed directly into Swimlane's extensible security automation platform, which was designed with an automation engine as its core and differentiates our platform from other SOAR solutions out there, security operations teams gain industry-leading threat intelligence while eliminating time consuming, manual tasks."

Through this joining, common customers can computerize a response to threats ahead of time by using a superior, mechanized danger insight solution based on the most comprehensive information sources from the profound, dim and surface web. Users will actually want to improve their danger chasing activities and direct profound analysis of malware accessible on the dim web. Likewise, they can clandestinely screen basic assets and priorities, as well as respond to threats straightforwardly from the Swimlane stage.

Spotlight

More than 90% of the threats that reach user inboxes, including BEC, rely on email impersonation. They pass through email security gateways and use social engineering to compromise their targets. In this report, we examine campaigns, tactics, and infrastructure used in recent BEC and email impersonation attacks so that organizat

Spotlight

More than 90% of the threats that reach user inboxes, including BEC, rely on email impersonation. They pass through email security gateways and use social engineering to compromise their targets. In this report, we examine campaigns, tactics, and infrastructure used in recent BEC and email impersonation attacks so that organizat

Related News

Data Security

Oracle Attempts to Design New Open Network and Data Security Standard

Oracle | September 20, 2023

Oracle to participate in an industry-wide initiative to design a new open network and data security standard. Oracle and Applied Invention are assisting to developing and promoting a novel network and data-centric security standard to tackle distributed cloud deployment challenges. This standard will enable organizations to protect their data throughout its entire lifecycle without requiring modifications to their distributed cloud environments' underlying architecture. Oracle, one of the world's largest database management companies, announced that it will participate in an industry-wide initiative to design a new open network and data security standards that will assist organizations in protecting their data in distributed IT environments. Oracle will collaborate with Applied Invention, a significant technology provider, and other industry leaders, including Nomura Research Institute, Ltd. (NRI), a global leader in consulting and system solutions. This new standard will enable networks to enforce shared security policies collectively, thereby augmenting the security architecture organizations already employ without requiring modifications to existing applications and networks. Oracle plans to launch the Oracle Zero-Trust Packet Routing Platform, based on the new standard, to support this new initiative. This platform will assist organizations in preventing illegal access or use of their data without imposing additional obstacles on legitimate activities. Executive Vice President of Security and Developer Platforms at Oracle Cloud Infrastructure, Mahesh Thiagarajan, said, Over the last 20 years, the cybersecurity industry has produced many incremental changes, but we need a fundamentally novel approach to protect our data in the increasingly complex cloud era. Organizations require a way to describe their data security policies in one place where they can be easily understood and audited, and they need a way to make sure those policies are enforced across their entire computing infrastructure, including their clouds. [Source – Cision PR Newswire] As the adoption of cloud technology rises and IT landscapes become more intricate with distributed cloud deployments, organizations face escalating challenges in safeguarding their data using conventional methods and tools. For example, many existing systems necessitate security teams to orchestrate disparate solutions across various facets, including database, application, network, and identity security. This complexity is further compounded when applied across diverse environments. Ensuring seamless collaboration among these solutions becomes a formidable task due to the dynamic and independent changes in applications, environments, and user profiles. Additionally, current security systems demand extensive configurations to accurately distinguish between different user categories, such as full-time employees and contractors, without compromising security or restricting access. Research Vice President of Cloud and Edge Infrastructure Services at IDC, Dave McCarthy, said, The new standard Oracle develop has the potential to change all of that by adding a unified layer of security on top of existing solutions. Building data protection policies into the network itself will assist users get the access they require while ensuring the data remains secure behind the scenes. [Source – Cision PR Newswire] Oracle and Applied Invention are assisting in designing and promoting a novel security standard, focusing on network and data-centric security, which aims to tackle these challenges. This innovative standard will empower organizations to safeguard their data across its entire lifecycle, including distributed cloud environments. To accomplish this, the standard will implement an intent-based security policy that is designed to be understandable, auditable, and interpretable by humans. This intent-driven approach will be put into practice at the network layer, ensuring that every data transmission contains authenticated attributes concerning the sender, receiver, and the nature of the data in transit.

Read More

Enterprise Security

Netskope Partners with Wipro to Power New Managed Security and Network Services

PRnewswire | July 11, 2023

Netskope, a leader in Secure Access Service Edge (SASE) today announced a new partnership with Wipro Limited to deliver robust cloud-native Managed Secure Access Service Edge (SASE) and Managed Zero Trust Network Access (ZTNA) services to Wipro's extensive global enterprise client portfolio. "As the global work environment transforms, our Security Cloud platform continues to serve as a critical component for remote workforces, and we are well-positioned to continue to support enterprises as their security needs evolve," said Dave Rogers, SVP of Global Alliances and Channel Sales, Netskope. "By pairing Wipro's deep cybersecurity managed services expertise with Netskope's advanced, full-stack SASE platform, this partnership will build on our shared goal of providing customers an efficient and robust integrated managed cloud security offering to secure and accelerate their digital transformation projects." Wipro provides best-in-class, end-to-end transformative cybersecurity solutions. Wipro CyberTransform® delivers cyber resilience to clients through an integrated suite of business-aligned strategy-first cybersecurity advisory and implementation services. Wipro CyberShieldSM offers proactive, on-demand cyber defense and comprehensive managed security services. "Wipro and Netskope support many Fortune 2000 companies that have successfully navigated significant digital transformation journeys," said Tony Buffomante, Senior Vice President and Global Head of Cybersecurity and Risk Services, Wipro Limited. "As our clients move forward, they understand the need to have a strong cloud-based security posture that's smart enough to protect data, applications and users no matter where they are located. That's now possible through this new partnership with Netskope, which extends Wipro CyberTransform® and Wipro CyberShieldSM capabilities." Managed Secure Access Service Edge (SASE) powered by Netskope delivers security services to protect employees and applications in the cloud as well as existing on-premises applications and infrastructure. The solution helps users: • Eliminate blind spots across thousands of cloud services (SaaS and IaaS) and millions of websites • Secure managed cloud services like Microsoft 365, Google Workspace and AWS, as well as unmanaged cloud services, without the need for blocking • Guard sensitive data with award-winning data loss prevention (DLP), including pre-defined profiles for compliance • Stop elusive cloud threats with anti-malware, sandboxing, machine learning (ML) analysis, Cloud Threat Exchange for IOC sharing, plus behavior analytics or targeted remote browser isolation (RBI) The managed SASE package offers clients unparalleled service coverage, performance and resilience, by leveraging Wipro's strategy-first design and Netskope's NewEdge Network, the world's largest, highest-performing security private cloud. Access to key enterprise applications and data must be controlled no matter where the resources are located. Wipro's Managed Zero Trust Network Access (ZTNA) powered by Netskope allows users to retire legacy connections and gain direct access to applications based on user identity and behavioral context, providing: • Superior user experience with consistent and secure policy controls • Application-level access control that reduces threats by eliminating lateral movement within the network • Reduced deployment complexity and higher visibility and control, lowering the risk of data loss associated with multiple vendor solutions • Improved efficiency in security operations leveraging platforms • Simplified security and lower total cost of ownership About Netskope Netskope, a global SASE leader, is redefining cloud, data, and network security to help organizations apply zero trust principles to protect data. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers, including more than 25 of the Fortune 100, trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements.

Read More

Enterprise Security

Xage Security Recognized in the Gartner® Market Guide for Cyber-Physical Systems Protection Platforms

Globenewswire | July 17, 2023

Xage Security, the leader in zero trust cybersecurity solutions for the real world, today announced that it has been recognized as a Representative Vendor in the 2023 Gartner Market Guide for Cyber-Physical Systems Protection Platforms. This is the inaugural Gartner Market Guide to focus on Cyber-Physical Systems (CPS) Protection Platforms, which are emerging as a leading cybersecurity market segment for protecting operations and mission-critical environments. Gartner defines the Cyber-Physical Systems (CPS) Protection Platforms Market as “products and services that use knowledge of industrial protocols, operational/production network packets or traffic metadata, and physical process asset behavior to discover, categorize, map and protect CPS in production or mission-critical environments outside of enterprise IT environments.” This report indicates a shift in the OT security market, which is moving beyond the use of segregated network architectures as the principal form of OT cybersecurity and into asset-centric approaches that protect at the level of individual users, applications and systems. “With the changing threat landscape, an asset-centric approach to securing operations is an essential step to effectively protect against today’s advanced cyberattacks,” said Duncan Greatwood, CEO of Xage Security. “We believe this recognition of the market signals a new stage in critical infrastructure protection as more and more organizations are adopting CPS asset-centric security to prevent, contain and respond to cyber attacks.” Operational Security Evolving to an Asset-Centric Security Model Gartner states that “As the complexity and variety of old and new assets have become a reality for most organizations, so has the recognition that a new approach to security is needed.”Xage is pioneering a new approach to infrastructure cybersecurity providing operators with capabilities from asset discovery to identity-based cyber hardening in a converged solution that protects access to assets, data, and applications even if attackers gain access to the operational network.Last year, Xage was also recognized as a Representative Vendor among CPS Protection Platforms in the Gartner 2022 Innovation Insight for Cyber-Physical Systems Protection Platforms report and also named in the Gartner 2022 Market Guide for Operational Technology Security report.Xage helps operators protect their systems using an identity-based asset-centric zero trust architecture. Xage’s capabilities include identity-based access management and privilege enforcement, zero trust remote access, multi-layer multi-factor authentication (MFA), and zero trust data exchange that protects access to sensitive operational data.Gartner Market Guide for Cyber-Physical Systems Protection Platforms, Katell Thielemann and Wam Voster, 29th June 2023. Gartner Disclaimer GARTNER is registered trademarks and service marks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. About Xage Security Xage is the first and only zero trust real-world security company. Xage’s solutions and services accelerate and simplify the way enterprises secure, manage and transform digital operations across OT, IT, and cloud. Xage products include Identity-based access management, remote access, and zero trust data exchange, all powered by the Xage Fabric. Xage also offers Cybersecurity Services, which deliver expert design, implementation, and support services to accelerate the adoption of proactive cyber-defense and underpin secure digital transformation.

Read More