DATA SECURITY

Deloitte to Acquire Digital Terbium Labs, Risk Protection Solution Provider, to Expand its Offerings towards Threat Intelligence

Deloitte | June 21, 2021

Deloitte to Acquire Digital Terbium Labs, Risk Protection Solution Provider, to Expand its Offerings towards Threat Intelligence
Deloitte has announced its acquisition of assets of Terbium Labs, a Baltimore-based digital risk protection company. Terbium Labs helps organizations detect and remediate data theft, exposure, or misuse across the digital landscape. All services and solutions of Terbium Labs will join the cyber practice of Deloitte in its Detect & Respond operation services. These services by Terbium Labs include a platform for digital risk protection for leveraging artificial intelligence and patented data fingerprinting technologies and machine learning for identifying illicit use of sensitive online data.

Including Terbium Labs, in 2021, it is the third cyber acquisition of Deloitte. It has previously acquired Root9B, LLC (R9B), a cyber-threat hunting provider, and CloudQuest, a cloud security posture management provider. Deloitte demonstrates its commitment to aiding global clients in managing all the cyber threats in running the businesses smoothly in all digital platforms through these acquisitions.


According to Deloitte & Touche LLP’s Deloitte Risk & Financial Advisory's infrastructure solution leader and principal, Kieran Norton, finding complex or exclusive data once it leaves an establishment's limit can be exceptionally challenging. Advanced online threat intelligence, paired with remediation of data risk disclosure, needs a balance of progressive technology, a keen understanding of monitoring compliance, and acceptable alteration with an establishment's commercial needs and risk outline.

Adding to it, Deborah Golden, Deloitte & Touche LLP’s Deloitte Financial and Risk Advisory Cyber and Strategic Risk leader and the principal said that their industry-leading cyber practice is dedicated to providing our customers with novel and ground-breaking ways to alter their cyber risk postures as they endeavor to reinforce their conviction equity, flexibility, and safety.

Spotlight

Mobile devices have opened a profitable new window of opportunity for criminals executing phishing attacks. Attackers are successfully circumventing existing phishing protection to target the mobile device. These attacks are highlighting security shortcomings and exposing sensitive data and personal information at an alarming rate. Most corporations are protected from email-based phishing attacks through traditional firewalls, secure email gateways, and endpoint protection. In addition, people today are getting better at identifying phishing attacks. Mobile, however, has made identifying and blocking phishing attacks considerably more difficult for both individuals and existing security technologies.

Related News

SOFTWARE SECURITY

Camera Cyber Security Specification and Alliance Council for App Developers are announced by the Open Security & Safety Alliance.

Open Security & Safety Alliance | March 03, 2021

The Open Security and Safety Alliance, an industry body contained partners from all aspects of the security, wellbeing and building mechanization space, today declared two significant advancements as a component of its main goal to clear the street towards dependable and imaginative security and wellbeing arrangements. Initial, another particular is currently accessible to individuals that centers around camera network protection measures. OSSA likewise presents another App Developer Council intended to pull in and include application designers in the Alliance's steadily developing environment of security and wellbeing industry players. Executing Trustworthiness Thresholds The most current specialized particular – the OSSA Camera Cyber Security Specification – contains definitions and rules in regards to obligatory and discretionary security judgments for cameras. It is to a great extent dependent on a current norm by the International Electrotechnical Commission (IEC), with an extra clear spotlight on the security market and OSSA reasoning by straightforwardly splitting the jobs and duties between camera producers, the working framework (OS) supplier and the framework on-chip (SoC) merchant, specifically. The determination additionally endorses duty changes in case of individual OS alterations by camera producers. The compulsory piece of these rules will be utilized as contribution for the impending OSSA certificate system. The OSSA-coordinated environment is intended to improve trust, empower development past the constraints of a solitary association, and fuel opportunity for industry partners and clients.

Read More

DATA SECURITY

Major European Banks Invest In DDoS Attack Simulation Platform From HUB Security

HUB Security | December 10, 2021

HUB Security announced its 2021 summary of sales for its D.Storm product to several leading customers in Israel, as well as three central banks in Europe, for an accumulated revenue of approximately €1 Million. D.Storm is HUB Security's unique cybersecurity SaaS platform for the simulation of DDoS attacks, where cybercriminals flood servers with false data to cause websites to crash. HUB Security developed the product by utilizing its many years of experience conducting risk assessments and analyzing the attack patterns of cyberattackers for customers around the world. "DDoS attacks are becoming more frequent, larger in size, and longer with the use of new botnets,The strong sales and feedback of D.Storm indicate that companies are responding seriously and conducting rigorous testing to better understand how to upgrade their cybersecurity programs." Eyal Moshe, CEO and co-founder of HUB Security HUB Security also announced that it is currently in advanced negotiations for the sale of D.Storm to a number of additional customers in Israel and abroad. Three more global banks are also in the process of having advanced proof-of-concept (PoC) discussions. HUB Security estimates that it will soon finalize additional contracts worth millions of Euros in sales in 2022. The purpose of D.Storm is to identify vulnerabilities and exploits in an organization's infrastructure by replicating real-world attack methods using fully automated tools. The platform enables customers to run dozens of DDoS attack methods, including volumetric, infrastructure, and application attacks. With the aid of tens of thousands of attack bots that spread across different countries and continents, D.Storm is fully capable of imitating real browsers, which simulates the challenge of distinguishing between fake and legitimate users. The platform collects data from the bot attacks in real-time and presents it to the user for in-depth analysis. This approach allows customers to substantially minimize their attack surface and prepare measures to withstand potential DDoS attacks on their strategic and sensitive assets. HUB Security estimates that sales of the solution are expected to have a material effect on its activities in 2022. About HUB Security HUB Security was established in 2017 by veterans of the 8200 and 81 elite intelligence units of the Israeli Defense Forces. The company specializes in unique Cyber Security solutions protecting sensitive commercial and government information. The company debuted an advanced encrypted computing solution aimed at preventing hostile intrusions at the hardware level while introducing a novel set of data theft prevention solutions. HUB operates in over 30 countries and provides innovative cybersecurity computing appliances as well as a wide range of cybersecurity professional services worldwide.

Read More

Cyberattack shuts down e-learning for two days in New Palestine

wthr | August 06, 2020

The Community School Corporation of Southern Hancock County was back online Thursday. But a cyberattack on the school district’s internet network prevented remote learning the previous two days in the first week of school. "To be unable to offer that right out of the gate is frustrating, especially frustrating knowing that this was a malicious attack on our system and not something of our own doing,” said Wes Anderson, CSC Southern Hancock County director of school and community relations.

Read More

Spotlight

Mobile devices have opened a profitable new window of opportunity for criminals executing phishing attacks. Attackers are successfully circumventing existing phishing protection to target the mobile device. These attacks are highlighting security shortcomings and exposing sensitive data and personal information at an alarming rate. Most corporations are protected from email-based phishing attacks through traditional firewalls, secure email gateways, and endpoint protection. In addition, people today are getting better at identifying phishing attacks. Mobile, however, has made identifying and blocking phishing attacks considerably more difficult for both individuals and existing security technologies.