SOFTWARE SECURITY

CyCraft Technology announced that CyCraft JP has officially joined the Nippon CSIRT Association .

prnewswire | November 03, 2020

CyCraft Technology, the quickest developing network safety firm in Asia, today declared that CyCraft JP has authoritatively joined the Nippon CSIRT Association (NCA).

CSIRT (Computer Security Incident Response Team, Computer Security Incident Response Team) alludes to a group of security investigators that not just arrangement with and react to network safety episodes, gather and examine occurrence related weakness knowledge, assault strategies, methods, and methodology (TTP) yet additionally plan playbooks and complete reactions to security occurrences.

Lately, Japanese associations have started building and building up their own personal inward CSIRTs; notwithstanding, cyberattacks in the 21st century are turning out to be increasingly complex and regular, making it increasingly more hard for one CSIRT to deal with independently. Nippon CSIRT Association (NCA) was set up to bring together the insight, assets, and ability of numerous CSIRTs with the goal that one CSIRT utilizing the knowledge, assets, and capacity of different CSIRTs could conquer security occurrences and increment Japan's general digital flexibility.

NCA isn't the principal CSIRT association CyCtaft has joined. Recently, CyCraft Taiwan joined the worldwide CSIRT association, FIRST (Forum of Incident Response and Security Teams). CyCraft Technology isn't simply dedicated to raising the strength of worldwide associations yet additionally dedicated to showing dependability, demonstrable skill, and precise and noteworthy danger insight, explicitly in the APAC market.

About CyCraft

CyCraft is a world-leading cybersecurity company and the fastest-growing cybersecurity company in Asia. They have developed multiple innovative AI-driven technologies to achieve security intelligent protection automation, such as threat intelligence gateway (TIG), network detection and response (NDR), endpoint protection(EPP), advanced and managed endpoint detection and response (EDR & MDR), and global cyber threat intelligence (CTI), all delivered via their information security monitoring platform, CyCraft AIR. They participated in the U.S. MITRE ATT&CK® Evaluations in 2019 and received top marks in automated detection capabilities with zero configuration changes.

CyCraft secures multiple government agencies, Fortune Global 500 firms, top banks and financial institutions, critical infrastructure, airlines, telecommunications, hi-tech firms, and SMEs. In Q1 2020, CyCraft won multiple gold awards in Cybersecurity Excellence Awards. In Q2 2020, US venture capital Momentum Cyber included CyCraft in the Advanced MSS & MDR and EDR sectors of their 2020 CYBERscape, and CyCraft won Best Security Solution of Interop Tokyo 2020.

Spotlight

Malware has experienced exponential proliferation since it was first discovered in 1984, when there were a mere 12 known instances of malware. In 2015, there were more than 400,000,000 malware instances with over 390,000 new instances of malicious programs discovered every day. For corporations, it is more important than ever to use a multi-pronged approach to preventing malware and virus attacks on their network. By using an anti-malware security kiosk, corporations can significantly improve their cyber security and prevent unwanted invasions into their network.

Spotlight

Malware has experienced exponential proliferation since it was first discovered in 1984, when there were a mere 12 known instances of malware. In 2015, there were more than 400,000,000 malware instances with over 390,000 new instances of malicious programs discovered every day. For corporations, it is more important than ever to use a multi-pronged approach to preventing malware and virus attacks on their network. By using an anti-malware security kiosk, corporations can significantly improve their cyber security and prevent unwanted invasions into their network.

Related News

DATA SECURITY

Radiflow's New Version of CIARA - OT Risk Platform Transforms Industrial Cybersecurity

Radiflow | May 31, 2021

Radiflow has received extensive industry appreciation for its one-of-a-kind, fully IEC62443-compliant Cyber Industrial Automated Risk Analysis Platform (CIARA), enabling CISOs to optimize their cybersecurity expenditure non-intrusively simulating breach attempts in industrial automation networks and prioritizing the most effective mitigation measures. In accordance with Radiflow's ongoing mission of "Taking the guesswork out of OT cybersecurity," the latest edition of CIARA allows users to further customize their cybersecurity optimization with additional operational and budgetary criteria. Ilan Barda, CEO of Radiflow, announced the new features: "CIARA was warmly received in the market as the first-of-its-kind OT BAS solution (breach attack simulation). Since its release, we have seen an increase in demand for risk prioritization in the dynamic OT/ICS threat landscape. Our new edition responds to the critical need for data-driven decision-making. We are delighted to assist CISOs in developing the best budget-driven mitigation strategy." Users of the updated version of CIARA can now: Customize their OT-security optimization: Users can now choose from a wide range of factors to find a balance between security, compliance, and budget. CIARA prioritizes security requirements for mitigation measures (SRs) that match the chosen criterion to maximize their cybersecurity ROI. Among the current optimization criteria are: • Zone impact: What is the financial impact of a disruption in that zone? • Which zone has the lowest tolerated risk (as specified by the user)? • Which zones have the highest disparity between real security measures and those prescribed by the IEC62443 standard? New supply chain threats are included in attack simulations: Supply chain attacks, such as the SolarWinds breach, take advantage of vendor networks' vulnerabilities. In addition to the fundamental requirement control groups in IEC62443, CIARA users can now add a security control group for Supply Chain attacks (NIST 800-161) to CIARA's breach simulations, including such attack strategies prioritize the effectiveness of relevant mitigation measures. Budget and Plan : CIARA's new OT security project planner generates a complete quarterly mitigation plan based on the user's optimization preferences, balancing the estimated cost of mitigation controls against the quarterly budget constraints. About Radiflow These new features enhance Radiflow's objective to eliminate the guesswork from OT security. Radiflow is committed to assisting CISOs in prioritizing their activities by providing industrial threat detection and risk management solutions.

Read More

DATA SECURITY

Argus partners with Microsoft to provide Microsoft Azure IoT end-to-end Cyber Security Cloud solution for car manufacturers.

Argus | March 30, 2021

Argus Cyber Security, a global pioneer in the field of cyber automotive security, cooperated with Microsoft Azure IoT to help car manufacturers to track, identify, and mitigate cloud attacks. Argus Fleet Protection, an Automotive Security Operation Center (ASOC) solution, in-vehicle insights from Argus Connected ECU Protection, and update capability with Argus Software Updates Over-the-Air comprise the Argus cybersecurity package for automotive applications, which is combined with Azure IoT. (OTA). The complete end-to-end cloud solution is one of the first to provide car manufactures with on-board and off-board tracking for the cyber wellbeing of their fleet. This automotive collaboration allows car manufacturers better access to security-related in-vehicle information as well as extensive coverage of security incidents. Argus Connected ECU Protection detects operating system irregularities and unusual behavior in the vehicle using customer-defined hazard models and is implemented on connected ECUs such as telematics, infotainment centers, and ADAS systems. Threat models may be built on UNECE R 155 (WP.29), the MITRE Attack structure, or some other model that is selected. Vehicle warnings are sent to Argus Fleet Protection, where they are paired with information from other sources in dedicated automotive hazard hunting and investigation modules. Vehicle manufacturers will create a more reliable, all-encompassing cyber intelligence picture by combining end-to-end automotive cyber protection with Microsoft Azure IoT. Furthermore, using Argus Delta OTA update technologies, car manufactures will immediately incorporate security upgrades to minimize vulnerability to cyber threats while reducing vehicle downtimes and deployment costs. "We are thrilled to be joining the world's leading businesses on Microsoft Azure. It represents a significant step forward for vehicle manufacturers looking to minimize their exposure to cyber risk while still adhering to applicable requirements and regulations such as UNR 155 (WP.29) "said Miki Hakak, Argus Cyber Security's VP Marketing, and Business Development. "By collaborating with a global leader like Microsoft, we're making it easier for vehicle manufacturers to cost-effectively incorporate cyber protection into their vehicles without disrupting manufacturing cycles or project risk." "Cybersecurity is a critical component in the transition to connected and autonomous vehicles," said Avijit Sinha, Microsoft's general manager for Azure Mobility. "Argus offers robust and flexible tools to ensure security through a vehicle's diverse computing resources and networks, whether it's avoiding attacks on safety-critical functions or personal data theft. The partnership of Argus and Microsoft Azure IoT offers a roadmap for automakers aiming to achieve their target of stable connected and autonomous vehicles." ABOUT ARGUS CYBER SECURITY To secure connected cars and commercial vehicles from cyber-attacks, Argus, a world pioneer in automotive cyber protection, offers in-vehicle solutions, consulting services, and an automotive security operation center (ASOC). Customers include automakers, retailers, and fleet managers. Argus products and services, which are currently in development, assist in the prevention, tracking, and reaction to cyber threats on in-vehicle components, networks, and post-production fleets. Via a suite of customized advisory services that help incorporate data security standards and procedures into the whole product lifecycle, Argus professional services assist its clients in complying with applicable guidelines and regulations, such as UNECE R 155 (WP. 29). Argus' groundbreaking approaches and solutions are based on decades of cybersecurity and automotive research, which has resulted in more than 70 awarded and pending patents. Argus was founded in 2013 in Tel Aviv, Israel, and has offices in Michigan, Stuttgart, Tokyo, Shanghai, and Korea. Argus is a wholly-owned subsidiary of Elektrobit, a multinational supplier of automotive products and services.

Read More

DATA SECURITY

Feitian Technologies and Secret Double Octopus Collaborate to Expand the Passwordless Workforce's Reach

FEITIAN Technologies | May 07, 2021

Secret Double Octopus, the market leader in enterprise passwordless authentication, announced today a partnership with Feitian Technologies, a renowned producer of hardware authentication tokens and security keys. FEITIAN Technologies is a well-known global supplier of safe and innovative multi-factor authentication (MFA) hardware as well as identity and access management (IAM) solutions. FEITIAN designs and manufactures enterprise-grade biometric hardware, FIDO2-certified security keys, fingerprint scanners, smart cards, and other security and authentication systems for the workforce and consumer markets. Secret Double Octopus' Octopus Passwordless EnterpriseTM technology, designed and developed for the special requirements of complex business infrastructures, is revolutionizing workforce authentication. To date, the Octopus platform is the only enterprise-grade solution capable of addressing any authentication use-case, from workstations and on-premises applications to cloud services. Its new integration with the Feitian line of security keys provides a simple touch-and-go authentication solution for the entire workforce, as well as a clear path to become a fully passwordless company. About FEITIAN Technologies FEITIAN Technologies, founded in 1998, is a leading global supplier of cybersecurity products and solutions. Their clients are spread across more than 100 countries and regions. They serve their clients all over the world because they have 5 overseas branches in Asia, Europe, and North America, as well as a talented international team. FEITIAN employs over 1,000 people, with R&D engineers accounting for more than half of the staff. Over the last 20 years, FEITIAN has established a diverse range of innovative products with international patent rights and certifications due to continuous strong investment in R&D and a broad understanding of customer needs. About Secret Double Octopus Secret Double Octopus is an enterprise passwordless authentication solution. They liberate end-users and security teams from the pressure of passwords with the ease and security of strong passwordless authentication. The Octopus Passwordless EnterpriseTM technology offers a seamless user interface and a single way to access workstations, remote services, cloud applications, and on-premises systems, while also offering better cyber-attack security. After being called a Gartner "Cool Vendor," our 4th generation product is now serving customers ranging from mid-sized to Fortune 50 all over the world.

Read More