Hub Protection to provide INX Limited with military-grade Digital Asset Cybersecurity

prnewswire | September 15, 2020

Hub Security, the cyber security platform, is announcing the use of its military-grade VaultHSM to secure INX Limited's crypto services.This news comes on the heels of INX Limited's latest announcement of its initial public offering this week of up to 130 million INX Security Tokens (the "INX Tokens" or "Tokens"). Hub Security utilizes military-grade cybersecurity principles for its Vault HSM (Hardware Security Module) and handheld miniHSM devices' with FIPS Approved Cryptographic Algorithm Validation

Spotlight

Malvertising is arguably the fastest-growing and least well understood online threat vector today. Malicious advertising, or malvertising for short, is a technique used to distribute malware on popular websites via online advertising networks. RiskIQ has observed an exponential increase in the number and ferocity of malvertising campaigns in 2014. This report summarizes the top five malvertising threats we've observed on the web over the past 12 months: brand impersonating fake software, generic Trojan software, fake antivirus software, Angler exploit kit and RIG exploit kit.

Spotlight

Malvertising is arguably the fastest-growing and least well understood online threat vector today. Malicious advertising, or malvertising for short, is a technique used to distribute malware on popular websites via online advertising networks. RiskIQ has observed an exponential increase in the number and ferocity of malvertising campaigns in 2014. This report summarizes the top five malvertising threats we've observed on the web over the past 12 months: brand impersonating fake software, generic Trojan software, fake antivirus software, Angler exploit kit and RIG exploit kit.

Related News

DATA SECURITY, ENTERPRISE IDENTITY, SOFTWARE SECURITY

Persistent Launches Innovative Cyber Recovery Solution with Google Cloud

Persistent | October 31, 2022

Persistent Systems, a global Digital Engineering provider, today announced the launch of a trailblazing solution that enables organizations to recover more quickly from cyber-attacks. Together with Google Cloud, the Persistent Intelligent Cyber Recovery (PiCR) solution provides a comprehensive and scalable cyber recovery approach, allowing organizations to reduce data loss and minimize the negative impact to brand reputation from prolonged downtime. Persistent Intelligent Cyber Recovery is now available on the Google Cloud Marketplace. Hackers are increasing the frequency and scale of ransomware attacks. They are using continually evolving and sophisticated techniques, which makes recovery from attacks more challenging. These attacks may lead to sensitive data leakage, loss of business, and damage to brand reputation. It is crucial for organizations to not only focus on protection against cyber-attacks but also strengthen their recovery process. Traditional backup and Disaster Recovery (DR) solutions are not designed for recovery from cyber-attacks. Persistent Intelligent Cyber Recovery includes tailored recovery plans, Persistent IP for finding and remediating malware, and the optional managed services to administer the recovery process. Persistent's solution integrates with Google Cloud to provide a secure recovery environment and Google Cloud Backup and DR for protecting the server images. Persistent Intelligent Cyber Recovery offers the following benefits: Reduction in data loss Decreased risk of recurrent attacks through the removal of malware Faster recovery from ransomware and zero-day attacks (from weeks/months to hours/days) Potential cyber insurance cost reduction Scalable solution depending on enterprise size challenges Nitha Puthran, Senior Vice President – Cloud, Infrastructure and Security, Persistent: "The digital environment today is constantly evolving and so are the risks associated with it. We are leveraging our strong relationship with Google Cloud and our product engineering expertise to create an industry-leading solution that allows enterprises to recover faster from cyber-attacks, thereby reducing the impact on their business. "Persistent Intelligent Cyber Recovery combines strategic planning and the creation of playbooks, integration with Google Cloud services and our own IP to find anomalies that indicate malware, remove the malware, and use automation to set up test and production environments to scale. It takes a services and product mindset to create a solution like Persistent Intelligent Cyber Recovery and Persistent is uniquely positioned in the market to deliver both." Dai Vu, Managing Director, Marketplace and ISV GTM Programs, Google: "As cyber threats become more prevalent, customers need solutions that can help them quickly address and recover from cyber-attacks. With the Persistent's Intelligent Cyber Recovery (PiCR) solution available on Google Cloud Marketplace, customers can quickly deploy PiCR to their Google Cloud environment and utilize it alongside Google Cloud technologies and capabilities to address cyber-attacks quickly and securely."

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

ThreatX Launches Robust Online Training to Increase Access to Cybersecurity Expertise

ThreatX | November 17, 2022

ThreatX, the leading API protection platform, today announced the launch of the ThreatX Academy, an online portal hosting an extensive library of cybersecurity training modules. These courses provide an accessible and approachable opportunity for those looking to begin, or advance, their cybersecurity careers. ThreatX is providing all foundational 100-level content at no charge. Training content spans many areas of cybersecurity, including Application Security, Data Protection and Privacy, Networking, Secure DevOps and Wireless Security, among others. The need for cybersecurity professionals has been growing at a rapid pace, and that demand is expected to continue. The number of unfilled cybersecurity positions worldwide grew 350% between 2013 and 2021 (from 1 million to 3.5 million). Further, it is predicted that the same number of jobs will still be open in 2025. This cybersecurity skills gap, along with the accelerated pace at which both technology and cyberattackers’ tactics are evolving, has made protecting digital assets increasingly difficult for businesses. In fact, 80% of organizations suffered one or more breaches due to a lack of cybersecurity skills and/or awareness within the last 12 months, underscoring the need for solid and robust training content. Alongside Massachusetts-based training company, Security Innovation, ThreatX developed more than 140 hours of online security training videos beginning at an introductory level and progressing to more advanced subjects, such as Blockchain Security and Automating Security Updates. All 100-level content will be available free of charge, while 200 and 300-level content will be accessible via subscription. Through the integrated learning management platform, users will be able to consume the content in sequential fashion and earn certifications. The ThreatX Academy experience is powered by Raven360, a Massachusetts-based digital Academy business. ThreatX will share all content, free of charge, with select nonprofit organizations, including participants of the Massachusetts Rehabilitation Commission’s (MRC) Networking Technology Program. In addition, ThreatX Academy has partnered with (ISC)2 and is now an approved (ISC)2 CPE Submitter Partner. ThreatX content may count toward (ISC)2 CPE credits. (ISC)², is an international nonprofit cybersecurity professional organization. Through (ISC)², members can earn several well-established security certifications, including: CISSP Certified in Cybersecurity SSCP - Security Administration CCSP - Cloud Security CSSLP - Software Security In order to maintain these certifications, members must earn Continuing Professional Education (CPE) Credits. Through ThreatX’s partnership with (ISC)², security practitioners will now be able to earn CPE Credits for consuming ThreatX Academy content. “Cybersecurity is a continuous learning experience, and the need for training resources in the industry is only growing stronger. “We are excited to announce the launch of ThreatX Academy, and we look forward to advancing the program in the future as part of our broader effort to close cybersecurity’s ongoing talent gap.” Gene Fay, CEO of ThreatX About ThreatX ThreatX’s API protection platform and complete managed services make the world safer by protecting APIs from all threats, including DDoS attempts, complex botnets, zero-day and multi-mode attacks. ThreatX applies artificial intelligence and machine learning to detect and respond to even the slightest indicators of suspicious activity in real-time. Today, ThreatX protects APIs for companies in every industry across the globe.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

New CyberRes Voltage File Analysis Suite Enables Proactive Data Protection with SmartScan

CyberRes | September 06, 2022

CyberRes, a Micro Focus (LSE: MCRO; NYSE: MFGP) line of business, today announced a new version of Voltage File Analysis Suite (FAS), a cloud platform that combines the latest in data discovery and data protection. Among the new features in Voltage FAS is SmartScan, a tool for intelligent sampling and dynamic tagging for petabyte scale data discovery, enabling data analysts to find the areas of higher data risk faster. "The new CyberRes Voltage File Analysis Suite takes data security to the next level with its data discovery and protection capabilities within one solution. "Since it is delivered as a SaaS solution, it possesses the scalability needed to meet the needs of any user's data estate. Furthermore, the dynamic Voltage SmartScan tool provides users with the resources needed to conduct more prescriptive, deeper scans of their data infrastructure and take more focused protective actions." Reiner Kappenberger, Director Product Management, Voltage Data Privacy and Protection Voltage FAS is not limited by the constraints of geographic or political boundaries, enabling users to achieve and maintain compliance standards for the growing number of privacy regulations around the world. Voltage FAS enhances global privacy awareness with dynamic data masking, contextually aware entity detection for thirty-nine-plus countries and economic regions. Also with this release, Voltage FAS is now available as a managed security services provider (MSSP) offering, which goes hand-in-hand with its availability as a software-as-a-service (SaaS) platform. Voltage FAS works with cloud, on-premise and all hybrid models by understanding and managing data in place. As some regions require data residency for organizations, Voltage FAS can also be deployed on private clouds, enabling organizations to effectively find and protect their sensitive data without having any data leave the region. "The release of our Voltage as a Service MSP/MSSP offering is designed to enable managed security services providers with flexible go-to-market options, pay-as-you-grow models, unified data discovery use cases to build managed services catalog offerings, thereby solving customer requirements for outcome-driven data discovery and protection with extremely quick time to value," said Marianne Van der Pluym, VP Global MSSP Strategy and Sales. One MSSP that has capitalized on the flexibility of Voltage FAS is Advania Sweden. "At Advania, we built our Data Management as a Service on the Voltage/FAS platform in our own data center and are able to be compliant with strict governmental rules and GDPR," said Tomas Wanselius, CEO of Advania Sweden. The new version of Voltage FAS is also receiving high marks from end users. "File Analysis Suite has a pivotal role in our environment, not only supporting Turkish Data Protection Regulation and PCI/DSS but also helping us to understand the other critical/sensitive data should be protected," Olcay Nisanoglu, IT Operations Director, BELBIM. "Since this project was a priority for the management team, we took an immediate action to start the project. Thanks to SmartScan's functionality with File Analysis Suite, all critical folders were quickly identified, allowing us to efficiently focus on these areas." Voltage FAS' data discovery capabilities can go deeper and broader across unstructured data repositories than most in the market. Voltage FAS supports more than 1,000 file types and discovery across the most common sources of unstructured data and collaboration platforms on premises and in the cloud including Microsoft 365, SharePoint, Exchange, Azure file and object stores, Google Workspaces, SMB (Samba), Amazon S3 object stores, as well as other source via a custom connector API. Voltage FAS includes the latest Optical Character Recognition (OCR) technology to enable users to discover sensitive data in images, such as scans of identifications and contracts. About CyberRes CyberRes is a Micro Focus line of business. We bring the expertise of one of the world's largest security portfolios to help our customers navigate the changing threat landscape by building both cyber and business resiliency within their teams and organizations. CyberRes is part of a larger set of digital transformation solutions that fight adverse conditions so businesses can continue to run today, keep the lights on, and transform to grow and take advantage of tomorrow's opportunities.

Read More