DATA SECURITY

CYFIRMA launches Threat Visibility and Cyber Intelligence Capabilities in AWS Marketplace; joins AWS ISV Accelerate Program

CYFIRMA | August 17, 2021

CYFIRMA launches Threat Visibility and Cyber Intelligence Capabilities in AWS Marketplace; joins AWS ISV Accelerate Program
CYFIRMA, a threat discovery and cyber-intelligence platform company funded by Goldman Sachs, Zodius Capital and Z3Partners, today announced the availability of CYFIRMA's two core products, DeCYFIR and DeTCT, in Amazon Web Services (AWS) Marketplace. AWS offers an unmatched portfolio of cloud services designed to help organizations build secure, resilient, and efficient infrastructure for their applications. DeCYFIR and DeTCT provide an added layer of security to help businesses navigate the evolving threat landscape.

CYFIRMA has also been inducted into the AWS Independent Software Vendors (ISV) Accelerate program, which provides CYFIRMA with co-sell support and benefits to easily gain access to millions of active AWS customers with AWS field sellers globally.

DeCYFIR is a threat discovery and cyber-intelligence platform that arms businesses with personalized and predictive intelligence. To prevent data breaches and cyberattacks, DeCYFIR employs a systematic approach guiding defenders to swiftly identify threats and applying remedial actions to avoid financial and brand damage. The cloud-based, software-as-a-service (SaaS) platform is non-intrusive, can on-board customers within two hours, and provides customers with insights related to their threat landscape within 24 hours.

DeCYFIR provides visibility into the external threat landscape by monitoring the dark web, hacker forums and various closed communities to look for threat indicators that would signal cybercriminals planning to exploit security weaknesses that could lead to business disruption.

DeCYFIR helps customers complement AWS's robust cloud security features and services by delivering six foundation pillars of threat discovery and cyber-intelligence on a single unified platform.

DeTCT is a digital risk protection platform with risk and hackability scores to help cybersecurity leaders gain real-time insights into their security profiles. DeTCT uncovers potential attack surfaces, provides vulnerability and brand intelligence, and discovers data breaches and leaks, impersonation and infringement. DeTCT then assists firms in prioritizing measures to increase their security.

By making DeCYFIR and DeTCT available in AWS Marketplace, businesses can further increase cloud security by using threat intelligence to protect themselves against cyberattacks.

"Customer safety and their personal information remain our utmost priority at Mitsubishi Motors Corporation. With the rising level of cyberattacks, cybersecurity threat intelligence information becomes paramount as a countermeasure and deterrence to these risks. We are confident that CYFIRMA is the right partner for us to work with," said Mr. Yoshinori Yamane, General Manager of Information Security Management Office, Mitsubishi Motors. "DeCYFIR is a powerful platform that enhances our cybersecurity posture as it goes one step further in providing critical early warning intelligence to identify attack surfaces and vulnerabilities at the earliest stages, allowing our security team to take rapid action in mitigating risk."

"As a healthcare services company delivering life-saving medicines to those who need them the most, we own and operate some of the most advanced cold chain facilities, managing temperature-sensitive medicines through innovative and digitalized processes. The rapidly evolving threat landscape in the healthcare industry has shown us the importance of managing cybersecurity in dynamic ways, particularly as we continue rolling out more digitalization initiatives. CYFIRMA's DeCYFIR has guided us in our response to cyber risks by providing us with real-time insights and early warnings to malicious activities targeting us," said Mike Brewster, Vice President Technology, Zuellig Pharma.

"At AWS, security will always be our top priority, and the availability of a broad and deep set of Cloud security services is why customers choose AWS Cloud to run their mission-critical workloads. To augment our native cloud security services, AWS is committed to building a partner ecosystem to provide our customers with the most comprehensive range of security offerings available today. The AWS Marketplace helps ASEAN ISVs scale internationally and we are excited to add CYFIRMA's cybersecurity platforms so that AWS's millions of active customers across the globe can benefit from their offerings," said Conor McNamara, Managing Director, ASEAN at AWS.

"According to Interpol, in just over a year, cyber threats have increased multifold, leading many firms to reassess how they have been managing cybersecurity. We are happy to make our two key products, DeCYFIR and DeTCT, available in AWS Marketplace to assist businesses globally with strengthening their cloud security. With DeCYFIR, clients will acquire threats insights to perform successful intelligence hunting and attribution, connecting the dots between hacker, motive, campaign, and method to gain a full perspective of their threat landscape - all on a single unified platform. DeTCT's real-time digital risk profiling will enable businesses with the much-needed visibility into their risk state, allowing them to take action to enhance their cybersecurity posture. With both DeCYFIR and DeTCT, businesses of all sizes can accelerate their digitalization journeys knowing we have got their back when it comes to fending off cyberattacks," said Kumar Ritesh, Founder & CEO of CYFIRMA.

ABOUT CYFIRMA
CYFIRMA is a threat discovery and cyber-intelligence platform company. We combine cyber intelligence with attack surface discovery and digital risk protection to deliver predictive, personalized, contextual, outside-in, and multi-layered insights. We harness our cloud-based AI and ML-powered analytics platform to help organizations proactively identify potential threats at the planning stage of cyberattacks. Our unique approach of providing the hacker's view and deep insights into the external cyber landscape help clients prepare for upcoming attacks.

Spotlight

5G systems are the next step in the evolution of mobile communication. As a fundamental enabler of the Networked Society, 5G networks need to provide capabilities not only for voice and data communication as we know it today, but also for new use cases and new industries, and for a multitude of devices and applications to connect society at large. Research and standardization have started in many technology areas of fundamental importance for 5G (such as cloud and the Internet of Things). These efforts have achieved various degrees of maturity, although the definition of 5G mobile networks has not yet reached standardization phase in the 3GPP. The evolution of LTE is a vital part of 5G. However, 5G will include the evolution of all parts of the network, such as core and management systems, as well as all protocol layers ranging from radio to applications. As a result, security is potentially affected everywhere

Related News

DATA SECURITY

Secure Cyber Defense Growing Its Miamisburg Operations With JobsOhio Support

businesswire | December 14, 2020

Secure Cyber Defense declared it will develop its Miamisburg tasks, adding 16 new workers throughout the following three years to help ensure organizations against digital assaults. JobsOhio gave the organization a $75,000 Workforce Grant to help the extension, which will build finance by $1.3 million. “At the start of 2019, we solidified our relationship with industry-leading cybersecurity technology company Fortinet. As our relationship with Fortinet has grown, we now have the ability to serve larger more complex enterprise companies with advanced technology, cybersecurity monitoring and analysis, and incident response capabilities. Growing our cybersecurity expertise and adding new team members will allow us to take advantage of these growth opportunities,” says Shawn Waldman, CEO of Secure Cyber Defense. Secure Cyber Defense keeps on developing as the requirement for improved network safety has expanded. Innovation organizations keep on battling to discover qualified engineers and investigators with network protection experience. The JobsOhio Workforce Grant guarantees organizations like Secure Cyber Defense can recruit and prepare talented online protection specialists. The expanding need for particular aptitudes makes proficient open doors in the quickly developing industry network safety field. “Every company in today’s digital world has to create a secure cyber environment and needs skilled cyber talent to guard their digital assets,” said Julie Sullivan, DDC Executive Vice President of Regional Development. “We’re excited Secure Cyber Defense is growing their operations here in the Dayton Region and adding jobs in this exciting and challenging field. The work they do highlights the region’s strength in cyber and digital transformation.” About Secure Cyber Defense: Located in Miamisburg, Ohio, Secure Cyber Defense is a Managed Security Services Provider for government agencies, education, manufacturing and financial service companies. The company provides continuous cybersecurity monitoring, analyzing digital environments for possible attacks to identify, prevent and respond to cyber threats. Utilizing Fortinet technology, vulnerability assessments, incident response planning, and expert continuous monitoring services, Secure Cyber Defense has the ability to scale custom solutions for any size organization. Secure Cyber Defense is an Advanced Fortinet Partner.

Read More

$16+ Billion Global Security as a Service Industry up to 2025-Rising Web Safety and E-mail Safety Demand

prnewswire | September 01, 2020

The "Security as a Service Market - Forecasts from 2020 to 2025" report has been added to ResearchAndMarkets.com's offering. The global Security as a Service market is projected to grow at a CAGR of 19.52% to reach a value of US$16.239 billion by 2025 from US$5.572 billion in 2019. There has been an increase in the number of security breaches over the past few years and has led to severe losses to the end-user industries such as BFSI, and Communication and Technology among others. This has led to an increase in the concerns among the end-users and is forcing them to adopt advanced approaches to secure their infrastructure from attacks. Security as Service providers includes the different security services companies dealing in cloud security services, data security services, ransomware protection services, and e-mail security services among others.

Read More

Google and KPMG Security Experts Share Their Insights on COVID-19 Related Cyber Scams

Google | May 18, 2020

Google and KPMG online security observers share their insights for securing accounts and access, even while operating from remote locations. Hackers and other cybercriminals tend to look at crises as opportunities, and COVID-19 has proven to be the mother of all crises as not only are systems . Cyber scams based on COVID-19 have become prevalent in recent months, as hackers look to capitalize on the virus-driven uncertainty affecting individuals, enterprises . COVID-19 has created previously unthinkable consequences for our society. Organised crime has been quick to respond, mounting large scale orchestrated campaigns to defraud banking customers, preying on fear and anxiety related to COVID-19. Further, as governments prepare stimulus packages in response to the pandemic and begin providing fiscal support to their citizens, the risk of being defrauded by COVID-19 related scams will likely continue to rise. For the financial sector in particular there are great challenges. The industry has already begun to provide an unprecedented response, but are having to work through their own business continuity issues. The past two months have seen the largest ever migration of individuals to digital platforms and tools in order to stay connected, for both productivity and personal purposes. Millions turned to virtual tools such as videoconferencing apps, many utilizing them for the first time. At the same time, building closures and the rapid shift towards remote working policies left many enterprises and governmental organizations scrambling to ensure adequate measures had been taken to shield confidential data, private servers, and other exposed systems. Learn more: THE TIME HAS COME TO BRING IN AI, MACHINE LEARNING AND AUTOMATION IN CYBERSECURITY . “Our systems have also spotted malware-laden sites that pose as sign-in pages for popular social media accounts, health organizations, and even official coronavirus maps". ~ Mark Risher, Senior Director for Account Security . In an era of social distancing, it is fortunate that technology has evolved to a point that many services can be rendered completely online. Yet with each new helpful technological advancement, comes the possibility of introducing new online security risks. Hackers and other cybercriminals tend to look at crises as opportunities, and COVID-19 has proven to be the mother of all crises as not only are systems vulnerable due to quickly changing world circumstances, but everyone is constantly looking to digital means to keep them connected. “Such prolific fraud attempts out there, realization of what forms these COVID-19 scams take – and how they should be best handled – should be of urgent importance for both the organizations and the people who work for them. “ Fraudsters posing as members of domestic and international health authorities, such as the United States Centre for Disease Control and Prevention (CDC) or the World Health Organisation (WHO), targeting victims with emails including malicious attachments, links, or redirects to “updates” regarding the spread of COVID-19, new containment measures, maps of the outbreak or ways to protect yourself from exposure. Our systems have also spotted malware-laden sites that pose as sign-in pages for popular social media accounts, health organizations, and even official coronavirus maps.During the past couple of weeks, our advanced, machine-learning classifiers have seen 18 million daily malware and phishing attempts related to COVID-19, in addition to more than 240 million COVID-related spam messages. Right now, everyone is heavily reliant on their laptops or mobile phones to conduct their everyday needs such as online banking, shopping or donating to causes and charities. Criminals are not afraid to take advantage of that,” warned Tan Kim Chuan, Head of Forensic at KPMG in Malaysia. Mark Risher, Senior Director for Account Security, Identity, and Abuse at Google, says Google’s team of cybersecurity experts have encountered coronavirus-related cyber scams aimed at individuals, companies, and government administrations. Our Threat Analysis Group continually monitors for sophisticated, government-backed hacking activity and is seeing new COVID-19 messaging used in attacks, and our security systems have detected a range of new scams such as phishing emails posing as messages from charities and NGOs battling COVID-19, directions from “administrators” to employees working from home, and even notices spoofing healthcare providers. Learn more: DELOITTE EXTENDS ITS CYBERSECURITY SERVICES BY PARTNERING WITH PALO ALTO .

Read More

Spotlight

5G systems are the next step in the evolution of mobile communication. As a fundamental enabler of the Networked Society, 5G networks need to provide capabilities not only for voice and data communication as we know it today, but also for new use cases and new industries, and for a multitude of devices and applications to connect society at large. Research and standardization have started in many technology areas of fundamental importance for 5G (such as cloud and the Internet of Things). These efforts have achieved various degrees of maturity, although the definition of 5G mobile networks has not yet reached standardization phase in the 3GPP. The evolution of LTE is a vital part of 5G. However, 5G will include the evolution of all parts of the network, such as core and management systems, as well as all protocol layers ranging from radio to applications. As a result, security is potentially affected everywhere