DATA SECURITY

Deloitte to Acquire Digital Terbium Labs, Risk Protection Solution Provider, to Expand its Offerings towards Threat Intelligence

Deloitte | June 21, 2021

Deloitte has announced its acquisition of assets of Terbium Labs, a Baltimore-based digital risk protection company. Terbium Labs helps organizations detect and remediate data theft, exposure, or misuse across the digital landscape. All services and solutions of Terbium Labs will join the cyber practice of Deloitte in its Detect & Respond operation services. These services by Terbium Labs include a platform for digital risk protection for leveraging artificial intelligence and patented data fingerprinting technologies and machine learning for identifying illicit use of sensitive online data.

Including Terbium Labs, in 2021, it is the third cyber acquisition of Deloitte. It has previously acquired Root9B, LLC (R9B), a cyber-threat hunting provider, and CloudQuest, a cloud security posture management provider. Deloitte demonstrates its commitment to aiding global clients in managing all the cyber threats in running the businesses smoothly in all digital platforms through these acquisitions.


According to Deloitte & Touche LLP’s Deloitte Risk & Financial Advisory's infrastructure solution leader and principal, Kieran Norton, finding complex or exclusive data once it leaves an establishment's limit can be exceptionally challenging. Advanced online threat intelligence, paired with remediation of data risk disclosure, needs a balance of progressive technology, a keen understanding of monitoring compliance, and acceptable alteration with an establishment's commercial needs and risk outline.

Adding to it, Deborah Golden, Deloitte & Touche LLP’s Deloitte Financial and Risk Advisory Cyber and Strategic Risk leader and the principal said that their industry-leading cyber practice is dedicated to providing our customers with novel and ground-breaking ways to alter their cyber risk postures as they endeavor to reinforce their conviction equity, flexibility, and safety.

Spotlight

Remote Access Tools (RATs) allow an attacker to take control over a desktop and use it remotely, opening any application and operating the PC as if the fraudster was sitting next to it. Recently, RAT attacks have migrated from use in nation state and hacktivist operations to online banking fraud. Existing fraud detection solutions that attempt to identify unknown or infected devices are not designed to spot RATs, leaving banks vulnerable to remote access attacks. BioCatch's Cognitive Behavioral Analysis technology enables BioCatch to instantly detect abnormal user behavior consistent with the use of RAT, MITB and other threats, as well as biometrically authenticate users who have been profiled.

Spotlight

Remote Access Tools (RATs) allow an attacker to take control over a desktop and use it remotely, opening any application and operating the PC as if the fraudster was sitting next to it. Recently, RAT attacks have migrated from use in nation state and hacktivist operations to online banking fraud. Existing fraud detection solutions that attempt to identify unknown or infected devices are not designed to spot RATs, leaving banks vulnerable to remote access attacks. BioCatch's Cognitive Behavioral Analysis technology enables BioCatch to instantly detect abnormal user behavior consistent with the use of RAT, MITB and other threats, as well as biometrically authenticate users who have been profiled.

Related News

DATA SECURITY

Untangle Taps Brigantia Partners To Grow SMB Security Distribution in the UK

Untangle | August 10, 2021

Untangle Inc., a leader in comprehensive network security for small-to-medium businesses (SMBs) and distributed enterprises, today announced a partnership with Brigantia Partners to support its successful award-winning SMB security solutions in the United Kingdom. According to the latest Untangle SMB IT Security Report, 45% of businesses indicated that they have adjusted or reevaluated their IT security roadmap based on recent security breaches and ransomware attacks. As the threat of cyberattack continues to grow, SMBs demands require a multi-layer approach to security which includes comprehensive support and services. This strategic partnership with Brigantia empowers a new market of SMBs with protection, visibility and control across their entire digital attack surface. "Our partnership with Brigantia will enable us to reach MSPs with specific needs that Brigantia understands," said Scott Devens, CEO at Untangle. "Brigantia has a deep understanding of IT Managed Services within the UK, and together with Untangle, will be able to provide the best in class products, support and services. Untangle is energized by Brigantia's approach to building their UK business and we look forward to a successful partnership where we grow together." Brigantia is an award-winning, value-added managed services distributor providing comprehensive, cost-effective IT solutions. The company has three distinct business areas designed to add maximum value to its reseller, MSP, MSSP and consultant partners' businesses: Brigantia Distribution, Brigantia Consulting, and Brigantia Enhance. Through its partnership with Untangle, customers now benefit from a robust product stack that offers comprehensive security with deep analysis and insights, network orchestration, reliable connectivity and network performance. "After years of searching for a next-generation firewall solution that is clearly aimed at the SME and MSP marketspace, Brigantia Partners is excited to be launching the award-winning range from Untangle." said Martin Wright, Managing Director at Brigantia Partners Limited. "With this new addition to our portfolio, we are providing our partners with an enterprise-level firewall and VPN solution that is simple to deploy and manage, while also fitting into SME budgets." Untangle leverages a fully cloud supported console which provides day to day analysis and alert system to ensure that customers are alerted of any malicious activity. With MSPs now empowered by NG Firewall, which offers highly customizable protection and robust filtering capabilities, customers can now ensure they receive the full advanced protection of the Untangle Network Security Framework. Brigantia and Untangle share the same commitment to supporting SMBs and distributed organizations against cyber attacks. Working in tandem with the Untangle SD-WAN product line, Brigantia can offer end users a homogeneous, professional solution for SMEs with multiple locations. To learn more, please visit www.brigantia.com. About Untangle Untangle is an innovator in cybersecurity designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organizations. Untangle's integrated suite of software and appliances provides enterprise-grade capabilities and consumer-oriented simplicity to organizations with limited IT resources. Untangle's award-winning network security solutions are trusted by over 40,000 customers around the world. Untangle is headquartered in San Jose, California.

Read More

DATA SECURITY

XM Cyber Confirms Cortex XSOAR Integration with Palo Alto Networks

XM Cyber | May 05, 2021

XM Cyber, the multi-award-winning leader in Attack-Centric Exposure Prioritization, revealed today's integration with Palo Alto Network's Cortex XSOAR security orchestration automation and response (SOAR) platform. This new integration adds one-click access to risk-free attack simulation inside the Cortex XSOAR Marketplace, allowing security teams to see the entire path of a possible attack. Security and network teams are constantly debating whether a specific alert is a high risk, low risk, impacts mission-critical assets or should wait for the next patch. When it comes to securing an organization's critical assets, the joint strength of XM Cyber and Cortex XSOAR provides teams with the contextual data they need to make the right choices possible. The integration enriches events and incidents in Cortex XSOAR with critical information, including: • The ability to determine whether business-critical assets are at risk • The name and a description of the attack technique • Detailed information on all impacted assets, including those deemed mission-critical • Identification of choke points, i.e. whether the asset resides in line with multiple attack paths • Context-sensitive recommendations for remediation ranked in order of importance • A link to the XM Cyber platform for running attack simulations This data assists security analysts in properly understanding their network environment and identifying user errors, bad IT hygiene, misconfigurations, and misplaced credentials, which can also go unnoticed. Cortex XSOAR's industry-leading automation and orchestration tools and features, combined with an attack-centric exposure approach to threat simulation, will help companies avoid 99% of real threats to their network while only addressing the 1% that matters. About XM Cyber XM Cyber is the world's leading provider of attack path management solutions. The XM Cyber platform allows companies to respond rapidly to cyber threats impacting their business-critical systems by actively identifying new exposures such as exploitable vulnerabilities and credentials, misconfigurations, and user activities. XM Cyber actively simulates and needs to prioritize attack paths that threaten mission-critical systems, including context-sensitive remediation options. XM Cyber assists in eliminating 99% of the risk by allowing IT and Security Operations to concentrate on the remaining 1% of exposures before they are exploited to compromise the organization's "crown jewels" – its sensitive properties. XM Cyber was founded by top executives from the Israeli cyber intelligence community and has offices in North America, Europe, and Israel. About Palo Alto Networks Palo Alto Networks, the global cybersecurity leader, is defining the cloud-centric future of technology that is changing the way individuals and companies work. Their goal is to be the go-to cybersecurity partner for protecting digital lives. They contribute to addressing the world's most pressing security issues through constant innovation that focuses on the most recent breakthroughs in artificial intelligence, analytics, automation, and orchestration. They are at the forefront of protecting tens of thousands of organizations through clouds, networks, and mobile devices by providing an open platform and empowering a growing ecosystem of partners.

Read More

DATA SECURITY

XSOC CORP Launches Four Foundational Patent Pending Cryptographic Systems Built to Secure Critical Data

XSOC CORP | May 12, 2021

XSOC CORP has emerged from stealth mode after three years of intense research and development, and today unveiled new cybersecurity solutions aimed at offering improved cryptographic capabilities for existing systems in local industrial and wireless environments. XSOC CORP is a post-quantum data security company that protects businesses' most sensitive data and communications from well-funded hacker groups and nation-state attackers using more sophisticated attacks. Senior software and hardware developers at XSOC CORP combine decades of algorithmic programming expertise with high-performance encryption techniques. Matching global-level cybersecurity innovations with the business and marketing acumen of a professionally experienced executive management team have boosted XSOC CORP's entry into the market. XSOC CORP expands on the idea that good security, together with stronger tools, is the only real way to ensure data and device safety against external threats – no matter how sophisticated. The new technology from XSOC CORP fills gaps in existing cybersecurity systems by providing specialized encryption products, utilities, and pluggable modules that are specifically tailored for the expanding Internet of Things (IoT) and Industrial Internet of Things (IIoT) markets. XSOC CORP is collaborating with the academic and professional sectors to solve some of the problems associated with outdated Public Key Infrastructure (PKI). SSL/TLS is the most commonly used mode of PKI, but it only provides a "static" certificate-based solution and, in many situations, only updates cryptographic key material certificates once per year. In the last 20 years, the certificate concept hasn't evolved or improved much; instead, it's gotten more expensive while being hard to configure and maintain. SOCKET is a breakthrough technology that allows for continuous cryptographic key rotation (updates) with or without SSL/TLS support. SOCKET is a cryptographic key exchange protocol designed for near-field/radio frequency (RF) and wireless transmissions in closed-circuit, limited-distance, or intermittent ad-hoc network environments that support hardened encryption protection. SOCKET also offers a relatively reliable and secure main infrastructure mechanism for more permanent network conditions. SOCKET, for example, can be used as an out-of-band (stand-alone) means of symmetric key transmission for legacy devices in an industrial (IT/OT) or commercial wireless surveillance environment, or modern streaming video cameras in a warehouse or embassy. SOCKET is an ideal companion to the XSOC Cryptosystem, and offers a safe solution for symmetric key sharing, allowing authentication in situations where TLS (SSL Certificates) are either impractical or impossible. SOCKET can be thought of as an “N-Tier” variant of Kerberos / X.509 technology, which has been around for 20 years and does not have a single point of failure. Although XSOC CORP's SOCKET technology focuses on the idea of protected key exchanges in private network environments, the technology has also been completely opened to the internet via WAN-SOCKET. SOCKET's Wide Area Network (WAN) version employs advanced Distributed Hash Table (DHT) and Peer to Peer (P2P) technologies to provide symmetric encryption keys safely and with reduced lag or delay. The reliability of SOCKET (and WAN-SOCKET) is due to the final pillar of XSOC CORP's main underlying technology set, Encrypted Broadcast Protocol, or "EBP." EBP is a native authentication protocol for network-efficient secure signal communications with 512bit or higher encryption strength. XSOC CORP has improved on the already effective UDP protocol, making it 100% stable and capable of providing completely encrypted data. XSOC CORP has shown that transfer of massive volumes of data over EBP can be achieved more than twice as fast as the leading FTP client/server while also being secured by 512bit encryption in a clear head-to-head challenge against the TCP/IP protocol. About XSOC CORP Founded in 2018, XSOC CORP is headquartered in Irvine, CA, and has a senior management and technology engineering team that has developed the XSOC Cryptosystem, which employs a supplied cryptographic cipher and a versatile SDK/API for fast integration into a wide range of software and platforms. XSOC Cryptosystem is designed to make the use of symmetric encryption easier. It eliminates the amount of time and code (or effort) taken to apply strong encryption directly to text, data, and, in particular, streaming-media services. SOCKET and WAN-SOCKET, which are powered by the modern and high-performance EBP protocol, expand the scope of symmetric cryptography globally.

Read More