Extreme Networks Moves Into Edge Device Security With Defender for IoT

SDxCentral | February 05, 2019

Extreme Networks Moves Into Edge Device Security With Defender for IoT
Extreme Networks is moving into IoT security with its new product, Defender for IoT, that secures wired and wireless devices. It’s a smart move for the networking vendor. Gartner estimates that 20.4 billion connected things will be in use by organizations worldwide by 2020. And IoT device attacks are on the rise. The product targets smart cities, industrial IoT, and connected health care. It secures devices that don’t have embedded security, said Abby Strong, vice president of product marketing at Extreme Networks. “For example, a multi-million-dollar MRI machine,” she said. “It’s completely amazing visual technology, but you find out too late that it was built to be on a completely private network and you can’t even change its IP address.” These types of edge devices may run out-of-date operating systems, have hardcoded passwords, and lack anti-virus and firewall capabilities because their manufacturers didn’t consider that the private enterprise network could be connected to the public internet. And they are typically deployed in a flat or unsegmented network so that if breached the attacker can gain access to other areas of the network.

Spotlight

Most company senior executives and board members have no clue how to gauge the full scope of financial trauma engendered by a major network breach. How does one calculate the value of lost trust of customers who take their patronage elsewhere after a well-publicized cyber attack, for instance? Lost future sales generally are not accounted for in calculating cyber attack costs. A lack of planning for such variables potentially could cost companies significantly more in recovery, according to a report from consultancy Deloitte, titled “Beneath the surface of a cyberattack.”

Spotlight

Most company senior executives and board members have no clue how to gauge the full scope of financial trauma engendered by a major network breach. How does one calculate the value of lost trust of customers who take their patronage elsewhere after a well-publicized cyber attack, for instance? Lost future sales generally are not accounted for in calculating cyber attack costs. A lack of planning for such variables potentially could cost companies significantly more in recovery, according to a report from consultancy Deloitte, titled “Beneath the surface of a cyberattack.”

Related News

SOFTWARE SECURITY

Group-IB Included Among Major Cybersecurity Consulting Companies by Independent Research Firm

Group-IB | August 26, 2021

Group-IB, one of the leading providers of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigation of high-tech crimes and intellectual property protection, has been included in the Forrester overview of the global cybersecurity consulting providers "Now Tech: Global Cybersecurity Consulting Providers, Q3 2021". The report covers 36 major global cybersecurity consulting firms. The demand for superior cybersecurity consulting services continues to increase every year. According to the Forrester's Analytics Business Technographics Security Survey, 31% of enterprise security decision-makers expect to increase spending on cybersecurity consultants and systems integrators by 5% or more in 2021. Digital transformation challenges brought by pandemic have spurred this demand further. To reinforce their cybersecurity risk programs, CISO are tapping into purpose-built strategic and tactical cybersecurity expertise. The Forrester analysts included Group-IB service offering in the category of consultancies – the providers which "offer clients a broad range of audit, consulting, and advisory services, including cybersecurity consulting. They have a diverse set of assets and intellectual property to help clients solve security problems." Cybersecurity services have always been the key drivers of Group-IB's technological leadership enriching the company's global threat intelligence and hunting ecosystem with first-hand understanding of adversary tactics. The company's contribution to high-profile cyber investigations in partnership with international law enforcement, and incident response engagements in more than 60 countries bring in-depth knowledge of criminal schemes. Group-IB's battle-tested experts carried out more than 1,200 successful investigations over 18 years around. While many corporate cybersecurity teams struggle to manage multiple vendors, Group-IB offers its customers a single point of accountability and security consulting expertise trusted by the international automotive, fintech, retail companies. The company provides consulting services at every stage of the attack lifecycle: before (Security Assessment, Compromise Assessment, Incident Response Readiness Assessment), during (Incident Response and Incident Response Retainer), and after the attack (Digital Forensics and Cyber Investigation). About Group-IB Group-IB is one of the leading providers of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigation of high-tech crimes and intellectual property protection, headquartered in Singapore. The company's threat intelligence and research centers are located in the Middle East (Dubai), the Asia-Pacific (Singapore), Europe (Amsterdam), and Russia (Moscow). Group-IB's Threat Intelligence & Attribution system has been named one of the best in class by Gartner, Forrester, and IDC. Group-IB's Threat Hunting Framework (earlier known as TDS) intended for the proactive search and the protection against complex and previously unknown cyberthreats has been recognized as one of the leaders in Network Detection and Response by the leading European analyst agency KuppingerCole Analysts AG, while Group-IB itself has been recognized as a Product Leader and Innovation Leader. Gartner identified Group-IB as a Representative Vendor in Online Fraud Detection for its Fraud Hunting Platform. In addition, Group-IB was granted Frost & Sullivan's Innovation Excellence award for its Digital Risk Protection (DRP), an Al-driven platform for identifying and mitigating digital risks and counteracting brand impersonation attacks with the company's patented technologies at its core.

Read More

Cybersecurity Comes under Scanner as Google Chrome Users Hit by Spyware Campaign

Google | June 19, 2020

A newly discovered spyware effort attacked users through 32-million downloads of extensions to Google’s market-leading Chrome web browser. Instead, they siphoned off browsing history and data that provided credentials for access to internal business tools. The extensions were designed to avoid detection by antivirus companies or security software that evaluates the reputations of web domains. A newly discovered spyware effort attacked users through 32-million downloads of extensions to Google’s market-leading Chrome web browser, researchers at Awake Security said, highlighting the tech industry’s failure to protect browsers as they are used more for e-mail, payroll and other sensitive functions. Alphabet’s Google said it removed more than 70 of the malicious add-ons from its official Chrome Web Store after being alerted by the researchers in May. When we are alerted of extensions in the Web Store that violate our policies, we take action and use those incidents as training material to improve our automated and manual analyses, Google spokesperson Scott Westover said. Most of the free extensions purported to warn users about questionable websites or convert files from one format to another. Instead, they siphoned off browsing history and data that provided credentials for access to internal business tools. Read more: 65% OF PHISHING THREATS FACING REMOTE WORKERS IMPERSONATE GOOGLE-BRANDED WEBSITES When we are alerted of extensions in the Web Store that violate our policies, we take action and use those incidents as training material to improve our automated and manual analyses. ~ Google spokesperson Scott Westover said Based on the number of downloads, it was the most far-reaching malicious Chrome store campaign to date, said Awake co-founder and chief scientist Gary Golomb. Google declined to discuss how the latest spyware compared with prior campaigns, the breadth of the damage, or why it did not detect and remove the bad extensions on its own despite past promises to supervise offerings more closely. It is unclear who was behind the effort to distribute the malware. Awake said the developers supplied fake contact information when they submitted the extensions to Google.“Anything that gets you into somebody’s browser or e-mail or other sensitive areas would be a target for national espionage as well as organised crime,” said former National Security Agency engineer Ben Johnson, who founded security companies Carbon Black and Obsidian Security. We do regular sweeps to find extensions using similar techniques, code and behaviours,” Google’s Westover said, in identical language to what Google gave out after Duo’s report. The extensions were designed to avoid detection by antivirus companies or security software that evaluates the reputations of web domains, Golomb said. If someone used the browser to surf the web on a home computer, it would connect to a series of websites and transmit information, the researchers found. Anyone using a corporate network, which would include security services, would not transmit the sensitive information or even reach the malicious versions of the websites. All of the domains in question, more than 15,000 linked to each other in total, were bought from a small registrar in Israel, Galcomm, known formally as CommuniGal Communication. In an e-mail exchange, Galcomm owner Moshe Fogel told Reuters his company had done nothing wrong. “Galcomm is not involved, and not in complicity with any malicious activity whatsoever,” Fogel wrote. “You can say exactly the opposite, we co-operate with law enforcement and security bodies to prevent as much as we can.” Fogel said there was no record of the inquiries Golomb said he made in April and again in May to the company’s e-mail address for reporting abusive behaviour, and he asked for a list of suspect domains. Reuters sent him that list three times without getting a substantive response. The Internet Corp for Assigned Names and Numbers, which oversees registrars, said it had received few complaints about Galcomm over the years, and none about malware. Read more: LEVERAGING THREAT INTELLIGENCE TO TACKLE CYBERTHREATS IN TIMES OF COVID-19

Read More

DATA SECURITY

Tammy Moskites, a Veteran CISO, has been Appointed to AppViewX's Advisory Board

AppViewX | May 04, 2021

AppViewX, the leader in next-gen machine identity management via automation and application delivery automation, today announced the appointment of Tammy Moskites, CEO and founding father of CyAlliance®, as Executive Board Advisor. Tammy joins the AppViewX planning board to supply strategic cybersecurity guidance to customers and across go-to-market channels to drive awareness, growth, and customer success. With over 30 years of technology experience, security acumen and leadership Tammy may be a result-driven and passionate executive who helped create the Machine Identity Management market category and enterprise requirements to raised govern keys and certificates. As a distinguished career CISO, Tammy actively guides peer CISOs and security architects worldwide to assist defend their organizations from cyber attacks, unplanned outages, and failed audits. Tammy has previously held executive security and technology leadership roles at Accenture, Venafi, Time Warner Cable, and residential Depot. "We're delighted to possess Tammy Moskites to join AppViewX as an Executive Board Advisor," said Gregory Webb, AppViewX CEO. As cryptographic keys and certificates became the critical infrastructure for DevOps, SecOps, and NetOps, the importance of Machine Identity Management to an organization's overall security posture and digital transformation has become a top priority. As a highly experienced and influential executive, Tammy will add significant value to our team. Her experience as a successful career CISO is invaluable to us as we still accelerate growth and supply the foremost comprehensive, next-gen machine identity management solution for global enterprises." Tammy may be a highly recognized cyber and ladies in technology social influencer. Amongst the various things she is involved in, she may be a Ventture Advisor to YL Ventures, a Distinguished Fellow with the Ponemon Institute, and volunteers her time with many technology organizations. She is an internationally recognized keynote/speaker, not only on security and governance but also on career building, women in technology, and leadership mentoring. She is currently an executive company board advisor to Blue Lava, Raxis, RiskIQ, and SecureAuth and a seed investor at Grip Security. "I was an early voice, champion, and adopter of what's now, Machine Identity Management, which dates back nearly 10 years," said Tammy Moskites, Executive Board Advisor at AppViewX. "As a career CISO, I even have always had a passion and expressed the need to manage your keys and certificates and shared that zeal worldwide. I even have certainly been excited to observe the expansion and maturity during this cybersecurity space as an entire. I feel that AppViewX is maturing Machine Identity Management and also within the areas of IoT Key/Certificate Lifecycle Automation, PKI Management/PKIaaS, and Application Delivery Automation. I'm truly impressed by their dedication, focus, and most significantly, their passion for 'doing the proper things right' – which has allowed them to require Machine Identity and Automation to a subsequent level! I'm super excited to be an Executive Board Advisor at AppViewX and appearance forward to their partnership with CyAlliance® and welcome them to our Cy'Alliance' portfolio of partners!" According to Gartner's Top Security and Risk Management Trends for 2021, Machine identity Management may be a top trend for 2021. "Machine identity management aims to determine and manage trust within the identity of a machine interacting with other entities, like devices, applications, cloud services, or gateways. Increased numbers of nonhuman entities are now present in organizations, which suggests managing machine identities has become an important part of the safety strategy." About AppViewX AppViewX is revolutionizing the way NetOps and DevSecOps teams deliver Machine Identity Management and Application Delivery Automation solutions services to Enterprise IT. The AppViewX Platform may be a modular software application that permits the automation and orchestration of network infrastructure using an intuitive, context-aware, visual workflow. It quickly and simply translates business requirements into automation workflows that improve agility, enforces compliance, eliminate errors, and reduce cost. AppViewX customers are among the world's most demanding Fortune 1000 organizations in financial services and banking, healthcare, oil and gas, manufacturing, and high tech.

Read More