Spotlight

IT Security Leaders know their network and endpoints inside and out. But the cloud is another story. This video takes you inside the mind of hackers and why they have shifted their focus to cloud attacks.

Related News

SOFTWARE SECURITY

iENSO and Firedome announce a partnership to bring real-time cybersecurity to IoT brands

iENSO | March 09, 2021

iENSO, a leading provider of embedded vision systems, and Firedome, an end-to-end cybersecurity provider for IoT brands and CES Innovation Award winner, announced today a partnership to protect connected devices with embedded vision. The current explosive growth in connected embedded vision devices as well as the increasing demand for vision data processing have given a new platform to hackers and cyberattacks, compromising data security and user privacy. Firedome and iENSO's partnership will deliver a new generation of embedded vision systems, with built-in cybersecurity and privacy. iENSO is an embedded vision system provider focused on Edge AI and cloud connectivity. It packs a global network of design, engineering and manufacturing expertise into every embedded vision system, module and component. Firedome is the world's first provider of real-time endpoint cybersecurity for IoT devices, which have become common targets for hackers. Founded by security veterans, the endpoint solution includes a lightweight software agent and a cloud-based AI engine collecting and monitoring the device to provide end-to-end protection against hacks or device breaches. The iENSO-Firedome partnership will set a new standard for protected embedded vision devices. The advanced cyber protection provided by Firedome is well aligned with iENSO's goal to enable IoT and products companies to build vision-based decision making into their products. The launch of protected embedded vision systems ensures that consumers will benefit from the highest level of privacy and cybersecurity protection in the market today. This approach provides end-to-end monitored cybersecurity protection, fully encrypted data and video, and the ability to protect and remediate the increasingly common attempts to access networks through IoT devices.

Read More

NETWORK THREAT DETECTION

Solvo ReInvents Cloud Identity and Access Management with IAMagnifier

Solvo | November 30, 2021

Solvo, a security automation enabler for cloud development and production environments", announced today the availability of its "IAMagnifier" – a cloud SaaS security platform, enabling developers, DevOps and cybersecurity stakeholders working in cloud development environments to reduce potential cybersecurity threats caused by misconfigured access permissions to cloud assets. To truly enable a secured, yet productive development environment, a "least-privileged" permission mechanism should be employed – by using this methodology, the access level for each asset is defined by answering the question "How can I prevent access to that asset from anyone or anything other than anyone or anything that is supposed to access it to perform their intended task?". Today, security-minded developers and security stakeholders within the organization had to manually inspect security permissions configurations for each asset, compare the permission levels found within the specific asset's configuration to the permission level stated by the relevant organizational policies, and if the actual permission level is too lenient – rectify the situation by updating the asset's permission configuration. In addition to the need to perform these set of activities for each individual asset, a task which might entail an enormous waste of time and effort, the permission level to which the "wrong" configuration should be updated to may not be the best one according to the specific characteristics of each individual asset. "Solvo's IAMagnifier turns this cumbersome, lengthy, inefficient, and error-prone process of managing cloud assets' access permissions, into an automated, centralized, fast and decision-assisted experience,It does so by constantly inspecting the assets' access permissions configurations, analyzing gaps between the current and desired permission level, suggests the needed changes to the configuration, and performs these changes if approved by the user." Solvo's Co-founder and CEO, Shira Shamban To present the most relevant and updated data about permission levels and potential risks derived from permission level gaps, Solvo's IAMagnifier offers visual experience, which turns boring tables and records into easy to comprehend mapping of connections and dependencies between Roles, Policies, assets and users. The IAMagnifier also highlights what its analyzer has declared as "excessive permissions", and suggests an alternative, least-privileged permission policy, which can then be enforced by the user just by approving the suggestion. Unlike traditional infrastructure default definitions or human-set definitions, the "excessive" permission status definition and the alternative permission suggestion the IAMagnifier highlights and suggests are derived from analyzing actual real behaviour of the application and finding the balance between preventing unrequired access by irrelevant stakeholders, and keeping an uninterrupted workflow for relevant stakeholders (i.e least-privileged). Sylvie Veilluex, Solvo's advisor and former CIO of Dropbox, added: "The team has been offering early access to the IAM Magnifier to selected customers, and the feedback has been nothing short of amazing. One of the CEO whose company was using the IAMagnifier went on to declare the ability to easily see the company's security posture, and effortlessly enhance it, made scaling the company's cloud and business infrastructure frictionless and even enjoyable." Solvo's team will present IAM Magnifier during AWS' Re:Invent conference, which takes place in Las Vegas, NV, between November 29th and December 3rd, 2021. Solvo will also be providing a free AWS S3 Bucket policy auditing during the conference, and visitors can schedule a meeting with the team for a chance to get back from Vegas with a win. About Solvo Solvo allows security teams to empower software developers and accelerate their cloud delivery. The developer-centric security platform creates and maintains a least-privilege security policy for cloud native applications. It adapts the security configuration to every environment, creates it from scratch and monitors for changes, integrating with existing workflows seamlessly and automatically.

Read More

Work-From-Home Cyber Security Risks: Three Ways to Protect Your Network

prnewswire | August 26, 2020

Responding to the rapid increase in work-from-home cyber security incidents at small and midsized businesses (SMBs), DIGIGUARD is now focusing its Cyber Threat Protection Services on remote workforce IT security. "Managing and monitoring work-from-home (WFH) employees includes cybersecurity risk management. Controlling network access helps protect valuable business and customer data from cybercriminals," said DIGIGUARD's Harvey Yan. At a minimum, Yan urges SMBs do three things: Secure and update network perimeter defenses along with endpoints that access the network such as computers, laptops and mobile phones.

Read More

Spotlight

IT Security Leaders know their network and endpoints inside and out. But the cloud is another story. This video takes you inside the mind of hackers and why they have shifted their focus to cloud attacks.