DATA SECURITY

Darktrace Joins INDYCAR Team Arrow McLaren SP as an Official AI Cyber Security Partner

Darktrace | April 16, 2021

Darktrace Joins INDYCAR Team Arrow McLaren SP as an Official AI Cyber Security Partner
Darktrace, a main self-sufficient digital protection AI organization, today reported that it is broadening its association with McLaren Racing and setting out on another sponsorship of the Arrow McLaren SP.

Interestingly, the Darktrace logo will include as an afterthought suspension of both the No. 5 Arrow McLaren SP Chevrolet and the No. 7 Vuse Arrow McLaren SP Chevrolet, beginning with the season-opening race at Barber Motorsports Park on April eighteenth.

Darktrace's Cyber AI independently distinguishes, examines, and reacts to quick digital dangers continuously across different advanced conditions, including cloud-based programming and email. The innovation is utilized by McLaren's innovation and security groups to help shield against cutting-edge digital dangers.

About Darktrace

Darktrace is a main self-governing network safety AI organization and the maker of Autonomous Response innovation. It gives far-reaching, undertaking wide digital guard to more than 4,700 associations in more than 100 nations, securing the cloud, email, IoT, customary organizations, endpoints, and mechanical frameworks.

A self-learning innovation, Darktrace AI self-governing identifies, researches, and reacts to cutting-edge digital dangers, including insider danger, distant working dangers, ransomware, information misfortune, and production network weaknesses.

The organization has 1,500 workers internationally, with central command in Cambridge, UK. Consistently, Darktrace AI distinguishes a digital danger, keeping it from causing harm.

Spotlight

The domain name system (DNS) came about during the early, innocent days of the Internet. Reagan-era users tended to work for government or educational organizations. Trust was assumed and security an afterthought. Because the online community was small, and the Internet sparsely used, the protocol itself was left undefended. Fast-forward to today and you can see the resulting problems: criminals who redirect DNS queries to their own servers to steal credit-card data and other sensitive information. There's also the exploding problem of distributed denial of service (DDoS) attacks, often aimed at DNS to cripple online business.

Related News

DATA SECURITY

AT&T Cybersecurity Introduces a New Managed Endpoint Security Solution

AT&T Cybersecurity | April 20, 2021

Through its partnership with SentinelOne, AT&T* has introduced a managed endpoint security solution. AT&T Managed Endpoint Security with SentinelOne correlates endpoint threat identification with a single software agent that combines Antivirus, Endpoint Protection, Endpoint Detection and Response, and IoT security functions. The new solution protects endpoints from malware and other cyberattacks while still monitoring increasingly sophisticated vulnerabilities in a corporate network or cloud system. AT&T Managed Endpoint Security with SentinelOne includes threat monitoring and management by AT&T Security Operations Center (SOC) analysts 24 hours a day, seven days a week. Customers will benefit from a single SOC team delivering constant surveillance of separate threat detection stacks for better network visibility and quicker endpoint threat detection when combined with AT&T Managed Threat Detection and Response. Why is this important? Businesses are faced with expanding network perimeters that need security. Endpoint cyberattacks and adversary sophistication are on the rise. As a result, SOC teams can become overburdened with alerts and data that have a little background for identifying problems. This is particularly difficult when tracking endpoints for security and identification in both on-premises and cloud environments. The willingness of SOC teams to view threats holistically from a single agent is critical for reacting to threats effectively and confidently. To do this, threat identification and response on endpoints need to be coordinated and automated by correlated security alerts. AT&T Managed Endpoint Security scales and augments security departments that are understaffed or overburdened. What makes this new cybersecurity solution different? AT&T Managed Endpoint Security with SentinelOne monitors any process that happens on and between each endpoint, using Artificial Intelligence (AI) and Machine Learning on the agent to detect and counteract threats at machine speed. The autonomous agent protects an endpoint even though it is turned off, allowing today's remote workers to function. AT&T, as one of the world's leading Managed Security Services Providers (MSSPs), recognizes that the network edge is continuously shifting and expanding, which can generate security gaps that must be identified with greater visibility. AT&T Managed Endpoint Security with Sentinel One provides the visibility and operates to secure you 24 hours a day, 7 days a week. AT&T SOC analysts have trusted experts who have specialist threat hunting, monitoring, and response capability. To secure your endpoints, AT&T and SentinelOne have combined their systems and enabled coordinated and automatic incident response. Additional integrations between AT&T Alien Labs, SentinelOne, and the AT&T SOC add layers of context for the SOC management team to obtain greater insights that contribute to improved and quicker threat detection and response.

Read More

SparkCognition and Siemens to Co-Develop AI-driven Cybersecurity System

SparkCognition | June 15, 2020

SparkCognition and Siemens today announced a new collaboration on a cybersecurity system, DeepArmor Industrial, fortified by Siemens. Designed to protect endpoint, or remote, operational technology (OT) assets across the energy value chain by leveraging artificial intelligence (AI) to monitor and detect cyberattacks. Cyberattacks on the energy industry are on the rise in volume and in sophistication, and they increasingly threaten companies' physical safety and security. SparkCognition and Siemens today announced a new collaboration on a cybersecurity system, DeepArmor Industrial, fortified by Siemens, which is designed to protect endpoint, or remote, operational technology (OT) assets across the energy value chain by leveraging artificial intelligence (AI) to monitor and detect cyberattacks. The innovative AI-driven system will deliver next-generation antivirus, threat detection, application control, and zero-day attack prevention to endpoint power generation, oil and gas, and transmission and distribution assets, which for the first time brings fleet level cybersecurity monitoring and protection capabilities to the energy industry. Cyberattacks on the energy industry are on the rise in volume and in sophistication, and they increasingly threaten companies' physical safety and security, business operations, and the critical infrastructure that powers communities throughout the world," said Leo Simonovich, Head of Industrial Cybersecurity at Siemens. "Many energy companies with remote, endpoint assets have struggled to defend their environment because they either lacked the visibility to detect, or the agility to mitigate, cyberattacks that threaten operational technologies. Read more: CYBERATTACKS ON CRITICAL INFRASTRUCTURES WITNESS SHARP RISE DURING THE PANDEMIC Together with Siemens, we are excited to bring next-generation endpoint protection that is specifically designed to increase the cyber resilience of OT networks and prevent advanced threat actors from impacting critical infrastructure. ~ SparkCognition This new partnership combines Siemens' cybersecurity expertise in securing operational technology with SparkCognition's expertise in artificial intelligence to deliver the energy industry's first solution capable of detecting and protecting remote assets against cyberattacks. Through our extensive work with the energy industry, we've seen the pain points and challenges the industry is facing right now," said Sridhar Sudarsan, Chief Technology Officer at SparkCognition. "The industry needs security solutions that can both operate autonomously and are designed with the modern industrial environment in mind. The threat of mega cyberattacks targeting critical infrastructure is worsening, according to a joint study conducted by the Ponemon Institute and Siemens that surveyed global energy industry executives on a wide range of threats, vulnerabilities, and strategies required to protect oil and gas assets. The study found that 67 percent of respondents believe the risk level to industrial control systems over the past few years has substantially increased because of cyber threats. The study also found that 61 percent of respondents said their organization's industrial control systems protection and security was not adequate. Cyberattacks on the energy industry are on the rise in volume and in sophistication, and they increasingly threaten companies' physical safety and security, business operations. OT assets operating in the field today are particularly vulnerable to cyberattacks as much of the energy industry's critical infrastructure was engineered before the widespread digitization of industrial control systems. This leaves portions - or entire fleets - without the ability to be patched or cost effectively updated with new security defenses. With award-winning machine learning technology, a multinational footprint, and expert teams focused on defense, IIoT, and finance, SparkCognition builds artificial intelligence systems to advance the most important interests of society. Our customers are trusted with protecting and advancing lives, infrastructure, and financial systems across the globe. Siemens Gas and Power GmbH & Co. KG is the global energy business of the Siemens group, which has been working with its customers on solutions for the evolving demands of industry and society for more than 150 years. With planned stock listing, Siemens' energy business will operate independently as Siemens Energy in the future. It will offer broad expertise across the entire energy value chain, along with a comprehensive portfolio for utilities, independent power producers, transmission system operators, the oil and gas industry, and other energy-intensive industries. Read more: SMALL AND MEDIUM BUSINESSES NEED TO IMPROVE THEIR CYBERSECURITY POST COVID-19 LOCKDOWN

Read More

DATA SECURITY

A Cybersecurity Startup Vulcan Cyber Raises $21 Million for Expansion of Vulnerability Remediation SaaS Platform

Vulcan Cyber | March 18, 2021

An Israel-based and cybersecurity start-up company, Vulcan Cyber, announced that it had raised a $21 million Series B funding round led by Dawn Capital. The company is into fixing security vulnerabilities has now participated with Wipro Ventures and existing Vulcan Cyber investors YL Ventures and Ten Eleven Ventures. The raised funds will support the novel vulnerability remediation solutions for cloud and application security teams. It will also deliver Vulcan Free, the industry's first free risk-based vulnerability management (RBVM) platform created for vulnerability and cyber risk prioritization. With this new development, Vulcan Cyber’s overall funding up until presently is $35 million. The company experienced a 500% growth in annual recurring revenue. The new funding will also satisfy considerable demand for a SaaS solution that goes ahead with vulnerability scanning and management. This will help IT, and security teams accomplish vulnerability scanning and management in a fixed way. The company’s focus has always been to warn its customers about potential vulnerabilities and prioritizing them based on the severity of the risk and the threat to a company’s business assets. After all, security teams are often inundated by alerts as not every scanner represents a high-priority risk for a business. Hence, the promise of Vulcan Cyber’s platform to build a vulnerable one will help teams to figure out where to focus their resources best. In the end, with this new free offering, Vulcan’s freemium portfolio now includes Vulcan Free. This provides core prioritization and vulnerability management features to the company and its existing free vulnerability intelligence database.

Read More

Spotlight

The domain name system (DNS) came about during the early, innocent days of the Internet. Reagan-era users tended to work for government or educational organizations. Trust was assumed and security an afterthought. Because the online community was small, and the Internet sparsely used, the protocol itself was left undefended. Fast-forward to today and you can see the resulting problems: criminals who redirect DNS queries to their own servers to steal credit-card data and other sensitive information. There's also the exploding problem of distributed denial of service (DDoS) attacks, often aimed at DNS to cripple online business.