SOFTWARE SECURITY

iENSO and Firedome announce a partnership to bring real-time cybersecurity to IoT brands

iENSO | March 09, 2021

iENSO and Firedome announce a partnership to bring real-time cybersecurity to IoT brands
iENSO, a leading provider of embedded vision systems, and Firedome, an end-to-end cybersecurity provider for IoT brands and CES Innovation Award winner, announced today a partnership to protect connected devices with embedded vision.

The current explosive growth in connected embedded vision devices as well as the increasing demand for vision data processing have given a new platform to hackers and cyberattacks, compromising data security and user privacy. Firedome and iENSO's partnership will deliver a new generation of embedded vision systems, with built-in cybersecurity and privacy.

iENSO is an embedded vision system provider focused on Edge AI and cloud connectivity. It packs a global network of design, engineering and manufacturing expertise into every embedded vision system, module and component.

Firedome is the world's first provider of real-time endpoint cybersecurity for IoT devices, which have become common targets for hackers. Founded by security veterans, the endpoint solution includes a lightweight software agent and a cloud-based AI engine collecting and monitoring the device to provide end-to-end protection against hacks or device breaches.

The iENSO-Firedome partnership will set a new standard for protected embedded vision devices. The advanced cyber protection provided by Firedome is well aligned with iENSO's goal to enable IoT and products companies to build vision-based decision making into their products. The launch of protected embedded vision systems ensures that consumers will benefit from the highest level of privacy and cybersecurity protection in the market today. This approach provides end-to-end monitored cybersecurity protection, fully encrypted data and video, and the ability to protect and remediate the increasingly common attempts to access networks through IoT devices.

Spotlight

The insider threat is always present and manifests itself in many ways. This paper highlights that insider risks should be examined in the context of changing technical, social, business and cultural factors. Experience shows that an overreliance on technology without consideration of other factors can have disastrous results for managing the insider threat 1.1. Insiders can cause great harm The lethal consequences of armed insiders turning against their colleagues was demonstrated in November 2009 to UK forces in Afghanistan (BBC, 2009a,b) and US forces at Fort Hood, USA (BBC, 2009a,b). Such deadly attacks on people are not the focus of this paper but rather malicious threats to information assets e though many of the human factors discussed apply across all scenarios, especially the need to look for ‘warning signs’. It is important to remember that non-malicious threats, for example, the accidental loss or release of information, can also have a major, negative impact.

Related News

Leveraging Greater Social Engagement for Improved Cyber Hygiene

Cisco | May 19, 2020

Social Cybersecurity is a new and emerging concept and paradigm that basically involves how better cybersecurity behaviors can be inclined positively using social influence. Practicing proper cyber hygiene in order to protect themselves and others, from the ill effects of cybercrime or cybersecurity issues. There exist any number of tasks and approaches that can be undertaken to protect our computer systems from cybersecurity risks. You don’t have to look too far around to find someone who may not be practicing proper cyber hygiene in order to protect themselves and others, from the ill effects of cybercrime or cybersecurity issues. For example, despite the fact that we may be aware that using the same user ID or email account and password, for different cloud services, is considered risky behavior, and could result in a potential account hack or data breach, yet we do not change this behavior. How often do you share your best practices for securing your devices, cloud service applications, mobile applications and home networking equipment for connecting to the Internet with those around you in a social situation or manner? Do you recommend the use of available security settings to those around you in your social circles? Do you show them how to quickly implement the security settings? In this article we discuss some ways for improving cyber hygiene. Social Cybersecurity is a new and emerging concept and paradigm that basically involves how better cybersecurity behaviors can be inclined positively using social influence. It’s worth to keep an eye out for the research going on regarding social cybersecurity, because it may have some answers to getting people and companies to better protect themselves. Learn more: CORONAVIRUS-THEMED CYBERATTACKS ON BUSINESSES RISE, EXPERTS RECOMMEND BEEFING UP NETWORK SECURITY “Even if this approach has a small positive effect on improving cyber hygiene, it is worth it, because something must change if we are going to help individuals better protects themselves.” ~ Stan Mierzwa, Director Even if this approach has a small positive effect on improving cyber hygiene, it is worth it, because something must change if we are going to help individuals better protects themselves. There exist any number of tasks and approaches that can be undertaken to protect our computer systems from cybersecurity risks. This ranges from ensuring you install and keep your anti-virus or endpoint protection system up to date, apply software security updates, encrypt sensitive data, backup our important data, and this list can continue to grow. “Social Cybersecurity brings a dimension with consideration for the individual, not the computer, and how with social psychology, usable and powerful social forces, such as social norms, can have outsized influences on people’s behaviors and perceptions of risk.” Social Cybersecurity brings a dimension with consideration for the individual, not the computer, and how with social psychology, usable and powerful social forces, such as social norms, can have outsized influences on people’s behaviors and perceptions of risk. The Human-Computer Interaction Institute at Carnegie Mellon University and other researchers are bringing focus to this new scientific area of cybersecurity. As their website (www.socialcybersecurity.org) mentions, this group is leveraging insights from social psychology and other fields to develop novel interventions and strategies for nudging adoption of expert-recommended tools and practices. Can we leverage social interactions or the influence of social situations to enhance our cyber hygiene or help thwart cyber threats? The research results from interviews done provided a theme that the observability of security feature usage was a key enabler of socially triggered behavior change and conversation – in encouraging the spread of positive behaviors, discouraging negative behaviors, and getting participants in the study to talk about security. The work presented is innovative and brings encouragement and opportunities in how systems can be designed to encourage better cybersecurity behaviors. One can also think of Social Cybersecurity in contrast and comparison to the criminological theory called “Social Learning Theory”. In Social Learning theory, delinquents are likely to engage in deviant or criminal behavior when those actions have been positively reinforced. Learn more: PHISHING ATTACKS DISGUISED AS FAKE CERT ERRORS ON CISCO WEBEX USED TO STEAL USER CREDENTIALS

Read More

DATA SECURITY

Paubox to protect healthcare providers with One-of-its-kind Security tool

Paubox | July 01, 2021

Zero Trust Email, a new feature to the Paubox Email Suite, is announced by the leader in HIPAA compliant email, Paubox. Zero Trust Email, the only technology of its kind, has the purpose of protecting the sensitive data and information of healthcare organizations from cybersecurity attackers. A solution for protecting the data and information of healthcare organizations was necessary as at least 93% of healthcare organizations reported one cybersecurity breach during the last three years. Various accounts on servers run by American infrastructure companies such as AWS, GoDaddy, and Mailgun, are being set up by bad actors. This lets cybercriminals to pass virus checks and industry standard spam. Paubox has rolled out Zero Trust Email in response to it. According to Founder CEO of Paubox, Hoala Greevy, A core tenet of Zero Trust security is multi-factor authentication (MFA). Zero Trust Email needs an additional piece of evidence from the sender’s mail server to pass our Inbound Security checks. This additional layer of verification is critical to keeping bad actors away and under control. According to Cost of Data Breach report of IBM, in 2019, healthcare industry had almost lost $7 billion USD due to damages from data breaches caused by cyberattacks. Extra network admittance points created by a rising remote work force only open healthcare organizations to more cybersecurity susceptibilities and attacks. Zero Trust Email can minimize the damage due to both internal and external attacks in healthcare organizations.

Read More

NETWORK THREAT DETECTION

Detectify Teams up with Hackers for Change to Benefit Security and Ethical Hacking Communities, Bolster Security for Non-profit Organizations

Detectify | August 19, 2021

Detectify, the SaaS security company powered by ethical hackers, today announced its partnership with Hackers for Change. The collaboration will equip non-profit organizations with the tools required to strengthen security and decrease the likelihood of cyber-attacks, supporting the mission of Hackers for Change to provide charities and nonprofits with industry-quality cybersecurity services at no cost. By combining each organizations' experience and hacking knowledge, the partnership aims to better serve customers and positively impact the security and ethical hacking communities. Charities and non-profit organizations are becoming increasingly susceptible to cyber-attacks as cybercriminals seek to access and exploit their massive datasets. According to one report, 26 percent of charities experienced a cyber-attack or breach last year. As philanthropies collect more data, there is a growing need for nonprofits to stay ahead of cyber criminals and protect confidential information. However, many nonprofits lack the financial resources required to properly secure their networks. This is where Hackers for Change comes in. The Toronto-based volunteer-operated organization provides other charities and nonprofits with industry-quality cybersecurity services for free. In doing so, Hackers for Change also trains Canada's next generation of cybersecurity professionals, making the digital community more resilient. For individuals seeking employment in the security industry, a lack of formal work experience can be a significant barrier to entry. By volunteering with Hackers for Change, volunteers not only gain invaluable hands-on work experience to jumpstart their careers, but also make a positive social impact on the community. Partnering for a stronger community "By teaming up with Hackers for Change, we're helping nonprofits improve their security posture while simultaneously sharing knowledge between us that will benefit customers, hacker volunteers linked to Hackers for Change, and the security industry overall," said Rickard Carlsson, co-founder and CEO at Detectify. "Collaboration is essential within the security space, and by marrying our strengths, we can't wait to see what strides we can make together." Detectify's web application scanner, Deep Scan, lets non-profit organizations stay on top of critical patching; a vital component to improving security posture. Deep Scan allows organizations to automatically scan custom-built apps, find critical security vulnerabilities, and strengthen web application security with automated security findings sourced from leading ethical hackers that make up the Detectify Crowdsource community. In addition to empowering nonprofits to find, fix, and prevent critical security vulnerabilities, Deep Scan also helps determine which vulnerabilities to prioritize and provides remediation guidance. About Detectify At Detectify, we believe that world-class cybersecurity knowledge should be accessible to everyone. Detectify automates the latest security findings from leading ethical hackers and brings it into the hands of security defenders and web application teams. Powered by a network of handpicked ethical hackers, Detectify's security solutions check your application beyond the OWASP Top 10 and helps you stay on top of threats in the cloud.

Read More

Spotlight

The insider threat is always present and manifests itself in many ways. This paper highlights that insider risks should be examined in the context of changing technical, social, business and cultural factors. Experience shows that an overreliance on technology without consideration of other factors can have disastrous results for managing the insider threat 1.1. Insiders can cause great harm The lethal consequences of armed insiders turning against their colleagues was demonstrated in November 2009 to UK forces in Afghanistan (BBC, 2009a,b) and US forces at Fort Hood, USA (BBC, 2009a,b). Such deadly attacks on people are not the focus of this paper but rather malicious threats to information assets e though many of the human factors discussed apply across all scenarios, especially the need to look for ‘warning signs’. It is important to remember that non-malicious threats, for example, the accidental loss or release of information, can also have a major, negative impact.