NETWORK THREAT DETECTION

Cybersixgill's industry-leading, automated threat intelligence is now available on the Swimlane Platform.

Cybersixgill | March 18, 2021

Cybersixgill, the pioneer in danger knowledge enablement, today reported that Darkfeed will be accessible through Swimlane's security robotization stage. Presently, Swimlane users can upgrade their danger research and occurrence response by coordinating noteworthy alerts from the industry's broadest and most comprehensive insight assortment from the profound and dull web.

"Accurate and actionable intelligence is the key to successfully scaling cyber security operations," said Ron Shamir, VP products and technology alliances at Cybersixgill. "With Darkfeed, Swimlane users gain access to an automated stream of threat intel that they can tailor to meet the needs of their organization's risk posture and tolerance. This marks the beginning of a growing partnership with Swimlane."

Controlled by the broadest computerized assortment from the profound and dim web, Cybersixgill Darkfeed is a feed of malicious indicators of compromise (IOCs), including domains, URLs, hashes and IP addresses. With Darkfeed, IOCs are consequently extricated and conveyed progressively. It is noteworthy, permitting Swimlane customers to get and preemptively block items that undermine their association straightforwardly from the Swimlane stage.

"Cybersixgill is a natural partner for us as we continue to help customers identify new ways to automate some of security's most time and resource-intensive processes," said Karen Rhys Wood VP global alliances, at Swimlane. "By integrating Darkfeed directly into Swimlane's extensible security automation platform, which was designed with an automation engine as its core and differentiates our platform from other SOAR solutions out there, security operations teams gain industry-leading threat intelligence while eliminating time consuming, manual tasks."

Through this joining, common customers can computerize a response to threats ahead of time by using a superior, mechanized danger insight solution based on the most comprehensive information sources from the profound, dim and surface web. Users will actually want to improve their danger chasing activities and direct profound analysis of malware accessible on the dim web. Likewise, they can clandestinely screen basic assets and priorities, as well as respond to threats straightforwardly from the Swimlane stage.

Spotlight

Given recent M&A activity in the cybersecurity space (involving Broadcom, Symantec, Accenture, and more), many are reconsidering the tools used for monitoring SSL/TLS traffic for intrusion, performance, or data protection. Additionally, did you know 44 percent of East-West traffic is not encrypted? Researchers studied 275 billi

Spotlight

Given recent M&A activity in the cybersecurity space (involving Broadcom, Symantec, Accenture, and more), many are reconsidering the tools used for monitoring SSL/TLS traffic for intrusion, performance, or data protection. Additionally, did you know 44 percent of East-West traffic is not encrypted? Researchers studied 275 billi

Related News

SOFTWARE SECURITY

Legal Industry Leader HBR Managed Services Partners with Tanium to Enhance Security and IT Services Capabilities

HBR Consulting | August 16, 2022

HBR Managed Services (HBR), a comprehensive strategy, operations and technology consulting firm focused on the legal industry, today announced its partnership with Tanium, the industry's only provider of converged endpoint management (XEM) for complex security and technology environments. Recognizing that law firms are attractive targets for cyber criminals, HBR is leveraging the Tanium platform to provide IT operations management, IT asset discovery, and security threat response to manage system updates at scale, thereby helping the firm's IT managed services and network operating center (NOC) clients reduce risk and operating costs. "The Tanium platform allows us to automate patching of OS and applications on servers and workstations, whether those endpoints are attached to a firm's network or not," said Bill Elser, vice president of engineering services at HBR. "That's critical in today's hybrid environment, allowing us to quickly prevent or remediate security or other operational issues by deploying registry changes and executing scripts." "The legal field faces unique challenges not only to protect the integrity and reputation of individual firms, but to safeguard the various constituencies they serve. "Tanium is keenly aware of the heightened risks the industry faces and we are proud to align with a leader like HBR as they work to secure the interests of their clients. We look forward to expanding this long-term partnership as they continue to grow." Todd Palmer, SVP of partner sales of Tanium "We're pleased to add Tanium to our roster of best-in-class vendor partners," added Chris Petrini-Poli, HBR's executive chairman. "HBR is committed to continually innovating services and partnering with best-in-class tool providers. Throughout the past year, we've been investing in relationships that will help us continue to provide exceptional, cost-effective service to our clients. We're proud to be on the leading edge of using top-of-the-line technology that ensures a continuously updated and monitored, safe and secure IT environment, while allowing HBR's team to operate as efficiently as possible." About HBR Consulting HBR Consulting (HBR) provides law firms and corporate law departments with strategic guidance, operational improvement, and technology solutions that drive innovation while managing cost and mitigating risk. HBR's proven combination of experience, relationships, and insights—spanning the legal ecosystem—delivers sustainable financial and competitive advantages for its clients. Visit www.hbrconsulting.com and follow HBR on LinkedIn and Twitter. About Tanium Tanium, the industry's only provider of converged endpoint management (XEM), leads the paradigm shift in legacy approaches to managing complex security and technology environments. Only Tanium protects every team, endpoint, and workflow from cyber threats by integrating IT, Compliance, Security, and Risk into a single platform that delivers comprehensive visibility across devices, a unified set of controls, and a common taxonomy for a single shared purpose: to protect critical information and infrastructure at scale. Tanium has been named to the Forbes Cloud 100 list for six consecutive years and ranks on Fortune's list of the Best Large Workplaces in Technology. In fact, more than half of the Fortune 100 and the U.S. armed forces trust Tanium to protect people; defend data; secure systems; and see and control every endpoint, team, and workflow everywhere. That's the power of certainty.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Xage Recognized in 2022 Gartner® Innovation Insight for Cyber-Physical Systems Protection Platforms

Xage | August 20, 2022

Xage, the zero trust real-world security company, was recently cited as a Representative Vendor among CPS Protection Platforms in Gartner 2022 Innovation Insight for Cyber-Physical Systems Protection Platforms report. The company was also named in Gartner 2022 Market Guide for Operational Technology Security. “As organizations connect operational or mission-critical systems, or deploy automation and digital transformation technology, they create cyber-physical systems (CPS) that security and risk management leaders must accommodate. Enter cyber-physical systems protection platforms — new solutions for a new security reality,” said Gartner analysts Katell Thielemann. “The changing technology and threat landscape is forcing security and risk management leaders to think about security differently when it comes to CPS. A new discipline of CPS asset-centric security is evolving, anchored by a new set of CPS protection platform vendors.” Asset-centric security allows operators to move beyond the old network-centric security model – aiming to keep hackers off the network – to a modern security architecture that protects access to each asset individually regardless of who has network-level presence. In fact, Gartner predicts that through 2025, 70% of companies will deploy CPS protection platforms as the first step in their asset-centric journey. “An asset-centric approach to access management – implementing strong credentials, password rotation, multi-factor authentication (MFA) and asset-by-asset access control – is critical to protect assets from attack. “Xage has seen in our customer deployments how an asset-centric security approach enables strong zero trust protection which can be achieved without ripping and replacing existing systems and infrastructure.” Duncan Greatwood, CEO of Xage Xage helps operators protect their assets using an identity-centric, asset-centric zero trust architecture. Xage’s capabilities include identity-based access management and privilege enforcement, zero trust remote access, multi-layer multi-factor authentication (MFA), and dynamic data security that protects sensitive operational data. About Xage Xage is the first and only zero trust real-world security company. The Xage Fabric accelerates and simplifies the way enterprises secure, manage and transform digital operations across OT, IT, and cloud. Xage solutions include Identity & Access Management (IAM), remote access, and dynamic data security, all powered by the Xage Fabric. To explore how the Xage Fabric can secure and transform your organization, visit Xage.com. Xage is currently offering a free trial for secure remote access to qualified critical infrastructure operators.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Security Compass Releases New Study: 2022 Developer Perspectives on Application Security

Security Compass | August 26, 2022

Security Compass, a leading cybersecurity solution provider, has published the results of a research study examining developer views on application security, including the challenges and opportunities they face in their secure development efforts. The report, “2022 Developer Perspectives on Application Security,” provides a deep dive into security maturity, threats, requirements, tools, resources, and training. In order for software developers and security teams to effectively collaborate and ensure that a company’s software products are secure, developers need automated, current, relevant, and actionable JITT training embedded into their development tools and processes. Security Compass’ research found that while most developers believe their enterprise has a mature security posture, almost half find it challenging to stay up to date with current security and compliance-related activities. The “2022 Developer Perspectives on Application Security” study raises awareness about how automation can solve many challenges for developers in secure application development. Key takeaways from the study include: The number one most important means to thwarting security threats according to developers is automated threat modeling (46% claiming it was “mission critical” and another 36% indicating it was “quite important”). 42% of developers who have been assigned requirements related to security and compliance find it challenging to stay up to date with current security and compliance-related activities. 28% of respondents claim that scope “creep” in security compounds challenges, with another 19% believing that security processes take too much time. Overall, developers are in favor of security training, with 32% of developers opting to pursue training on their own (63% of respondents reported being mandated to do training). Developers from smaller companies ($10M to $100M) were more than twice as likely (31% vs. 14%) as those from the largest companies ($5B+) to use ad hoc or reactive means to “gate-keep” releases from a security perspective. On average, 34% of software requirements are related in some way to security and compliance, yet only 25% of companies have shifted security left into the Design Stage of software development. “When building secure software, developers must be system thinkers. Ideally, they engage secure methods early in the design process, engage with key security personnel and stakeholders and insist on automated cybersecurity tools that efficiently guide them throughout the SDLC," said Rohit Sethi, CEO of Security Compass. “Software built with the needs of software developers at the forefront is essential to the task of cybersecurity, and companies that want to attract and support developers in their efforts to build cyber-resilient software need to look to integrated cybersecurity software. This is reinforced by Security Compass’ study that software that provides just-in-time training (JITT) and guidelines for software developers is essential for accomplishing these goals.” For more information about the adoption of security and compliance processes by developers across organizations of various sizes, download the full “2022 Developer Perspectives on Application Security” study. About the Survey Security Compass commissioned Golfdale Consulting to conduct this survey research project. The survey was conducted in Q2 2022 and was based on 250 respondents from the US and UK markets working in companies ranging from $10 million to $10 billion in size. Half of the developers surveyed worked for technology companies, while the other half came from enterprises ranging from manufacturing to insurance . Respondent roles included a mix of developers from software development/DevOps (62%), IT infrastructure and back office (22%) and cyber/information security (14%). About Security Compass Security Compass, a pioneer in application security, enables organizations to shift left and build secure applications by design, integrated directly with existing DevSecOps tools and workflows. Its flagship product, SD Elements, helps organizations accelerate software time to market and reduce cyber risks by taking an automated, developer-centric approach to threat modeling, secure development, and compliance. Security Compass is the trusted solution provider to leading financial and technology organizations, the U.S. Department of Defense, government agencies, and renowned global brands across multiple industries.

Read More