DATA SECURITY

HUB Security Announces Ultimate Docker Lifecycle Management Platform

HUB Security | December 17, 2021

HUB Security, a secure computing solutions provider, announced today its Docker Digital Twin product to better protect, authenticate, and verify traffic created by Docker, a highly used platform for package containment.

The HUB Security Docker Digital Twin enforces access control and provides governance processes, such as approvals for sensitive actions, on incoming Docker traffic. It blocks attack vectors involving the loss or theft of credentials, vulnerabilities, and unauthorized access.

Docker creates virtual containers (called packages) that allow applications and their dependencies to run seamlessly on any operating system. It is used by some 55% of professional developers daily and is the leading solution for cloud-based SaaS platforms. It is also ubiquitous in large enterprises, financial institutions, and public clouds, as well as defense equipment, servers, and data centers. Docker packages, because of their extensive use, are often the target of cyber security threats from hackers.

"We want to create a seamless experience for our customers when it comes to security,Our new system enables multi-layered security processes for the entire compute stack with Docker being part of it. The solution is also future proof, meaning clients can rest assured for years that their systems are safe and secured."

Andrey Iaremenko, HUB Security's CTO

The Docker Digital Twin solution will be incorporated into existing HUB Security technology without changing existing operational controls and services. The product's complete remote update capabilities will provide full support for any and all Docker versions and security capabilities.

About HUB Security
HUB Security was established in 2017 by veterans of the 8200 and 81 elite intelligence units of the Israeli Defense Forces. The company specializes in unique Cyber Security solutions protecting sensitive commercial and government information. The company debuted an advanced encrypted computing solution aimed at preventing hostile intrusions at the hardware level while introducing a novel set of data theft prevention solutions. HUB operates in over 30 countries and provides innovative cybersecurity computing appliances as well as a wide range of cybersecurity professional services worldwide.

Spotlight

As business shore up their cybersecurity, cybercriminals have shifted tactics to focus on easier-to-exploit organizations – including law firms. Many law firms haven’t invested many resources in their security, and the valuable business data and intellectual property they handle make them a prime target. This resource examines the cyber-threats facing law firms, explaining why they are attractive and easy targets for cybercriminals. Access it to discover just how much danger your firm is in and how you can stay safe.

Spotlight

As business shore up their cybersecurity, cybercriminals have shifted tactics to focus on easier-to-exploit organizations – including law firms. Many law firms haven’t invested many resources in their security, and the valuable business data and intellectual property they handle make them a prime target. This resource examines the cyber-threats facing law firms, explaining why they are attractive and easy targets for cybercriminals. Access it to discover just how much danger your firm is in and how you can stay safe.

Related News

SOFTWARE SECURITY

Cybersecurity Company Lumu Raises $8M, Signs Partnership with KnowBe4, the World's Largest Integrated Platform for Security Awareness Training

Lumu | August 08, 2022

Lumu, creators of the Continuous Compromise Assessment cybersecurity model that empowers organizations to measure compromise in real time, today announced it has closed an $8 million investment round, bringing total funding to $15.5 million. Led by Panoramic Ventures, the investment will serve as growth capital for sales and marketing initiatives to further Lumu's mission of helping organizations operate cybersecurity proficiently. Other investors include KnowBe4 Ventures, Lane Bess, former Zscaler and Palo Alto Networks executive, and Tom Noonan, former CEO at Internet Security Systems and the SoftBank Group's SB Opportunity Fund. "We are excited to continue to support Lumu through this phase of hypergrowth, as organizations across all verticals are realizing the value of measuring compromise within their networks and acting on this factual data immediately," said Paul Judge, Managing Partner of Panoramic Ventures. "The innovation Lumu is bringing to the market is evident and a true game-changer for cybersecurity operations." Lumu's Continuous Compromise Assessment model enables any organization to measure and understand compromise to close the breach detection gap from months to minutes continuously and intentionally. Teams receive actionable information about who was impacted, when the incident took place and how best to respond before it escalates to a bigger problem. The company has experienced hyper-growth in 2021 and 2022 and now has more than 3,100 organizations using its technology. The Lumu platform has analyzed more than 1 trillion metadata and detected more than 345 million adversarial contacts. "With today's economy, hiring constraints and the non-stop cyber threats, companies need tools that enable an accurate understanding of, and swift response to, potential attacks. "Our platform provides context at the granular level to understand each and every incident and the specific techniques used by attackers so that cybersecurity operators can mitigate malicious incidents and overall improve their cybersecurity stack. With cybercriminals quick to take advantage of economic downturns, this funding round emphasizes just how critical of a time it is for enterprises to prioritize protection and defense mechanisms." Ricardo Villadiego, Founder and CEO of Lumu The capital will also be used to scale the company's initiative to consistently attract exceptional talent to amplify the reach of Lumu's cyber industry-leading resilience message and to build credibility with target audiences to help companies of all sizes and verticals proficiently operate cybersecurity functions. KnowBe4 is one of the key investors joining Lumu's funding round. The companies will join forces to further their missions of enabling employees and security teams to make smarter security decisions every day. Miami-based Lumu is founded and led by Ricardo Villadiego, a successful second-time founder who is part of the SB Opportunity Fund's community of visionary Black, Latinx, and Native American entrepreneurs. About Lumu Headquartered in Miami, Florida, Lumu is a cybersecurity company focused on helping enterprise organizations illuminate threats and isolate confirmed instances of compromise. Applying principles of Continuous Compromise Assessment, Lumu has built a powerful closed-loop, self-learning solution that helps security teams accelerate compromise detection, gain real-time visibility across their infrastructure, and close the breach detection gap from months to minutes.

Read More

PLATFORM SECURITY

Thrive Acquires Edge Technology Group

Thrive | July 04, 2022

Thrive, a prominent supplier of cybersecurity and digital transformation managed services, announced today the acquisition of Edge Technology Group, a leading worldwide technology consulting and fully managed IT service provider for alternate investment managers located in Connecticut. Edge Technology Group's purchase adds new worldwide offices and data centers in the United Kingdom, Australia, Singapore, Hong Kong, and the Philippines, bolstering Thrive's international footprint for all clients. Edge clients throughout the world, including hedge funds, private equity companies, family offices, and asset managers, will now have access to Thrive's next-generation managed cybersecurity, collaboration, and cloud services. Edge, founded in 2007, is a worldwide technology advisory and fully managed financial services IT service company that offers alternative investment manager advisory services and cloud computing solutions. Edge services over 300 hedge fund, asset manager, private equity, REIT, and wealth management clients, offering public cloud configurations tailored to each client's specific business needs. Edge Technology Group employs 265 people, including a team of client-focused IT strategists and engineers. "Edge Technology Group is the leading Financial Industry MSP in the world. Their talented engineering and account management teams will now have access to the Thrive Automation Platform and our 24x7x365 comprehensive suite of Cybersecurity SOC services to enhance the Edge client experience." Rob Stephenson, Thrive's CEO "As a founder-owned managed services provider, we are fully immersed in advancing clients' alternative investment practices via our IT advisory services and cloud computing solutions. Edge is thrilled to join the Thrive family as their client-first commitment is perfectly aligned with ours and their advanced cybersecurity, automation, collaboration and managed services platform will expedite our customers' Digital Transformation journey," said Jim Nekos, CEO, Edge Technology Group. Thrive will have over 1,000 people servicing customers all around the globe as a result of this purchase, consolidating its position as the premier technology outsourcing service for the financial industry. Edge Technology Group is Thrive's fourth acquisition in 2022, solidifying the company's worldwide position as a premier technology supplier offering end-to-end managed services and unrivaled experience to achieve secure digital transformation.

Read More

SOFTWARE SECURITY

Sternum Offers NXP Marketplace Real-time IoT Security and Observability Solution

Sternum | June 21, 2022

Sternum, a pioneer in autonomous IoT security and observability, has joined NXP Semiconductors' software partner community, one of the world's top makers of embedded controllers and largest marketplaces. As a result, IoT manufacturers that rely on NXP for their controller supply will be able to effortlessly integrate Sternum's proprietary security and visibility capabilities into their products as a result of this agreement. With a CPU overhead of less than 3% during the DD process, Sternum's Embedded Integrity Verification was able to disarm the threats evaluated by NXP researchers. The sternum is a great addition to NXP products since it successfully handles increased remote runtime assaults against linked devices. According to P&S Intelligence, the embedded security business will be worth more than $10 billion by the end of the decade. The graph depicts a growing need to secure more ubiquitous linked gadgets and cyber-physical systems, which are expanding in both consumer and corporate sectors, against exploitation. IoT devices, which are frequently weak in both security and visibility, are transforming whole industries—and have surfaced as a critical security breach in enterprises' security perimeters. Without proactive security measures, businesses are forced to rely on costly and time-consuming vulnerability patching, prompting them to look for other options. "NXP's microcontrollers power devices that will work as the mission-critical backbone of entire industries and cities. We are thrilled to be collaborating with NXP to secure the future of digital transformation and ensure zero-trust from device to cloud. Our products offer companies a unique degree of protection against the most dangerous attack types, and significantly reduce the cost of security-related maintenance, and we are excited to see them used to promote innovation on a global scale." Natali Tshuva, CEO and Co-Founder of Sternum Sternum's universal IoT platform ushers in a new era in which whole fleets of connected devices may be fully secure and viewable at the edge in a simple, seamless, and self-contained manner. The patented technology is designed to detect the general fingerprints of different attack exploitations, including command injection and buffer overflow attacks, and neutralize them in real-time, preserving the device's runtime integrity against zero-day and one-day attacks. This method provides total protection against a wide range of CWEs (Common Weakness Enumeration) and promotes a proactive IoT security paradigm that eliminates the need to play catch-up with hackers through expensive reactive patching.

Read More