Argus | March 30, 2021
Argus Cyber Security, a global pioneer in the field of cyber automotive security, cooperated with Microsoft Azure IoT to help car manufacturers to track, identify, and mitigate cloud attacks.
Argus Fleet Protection, an Automotive Security Operation Center (ASOC) solution, in-vehicle insights from Argus Connected ECU Protection, and update capability with Argus Software Updates Over-the-Air comprise the Argus cybersecurity package for automotive applications, which is combined with Azure IoT. (OTA). The complete end-to-end cloud solution is one of the first to provide car manufactures with on-board and off-board tracking for the cyber wellbeing of their fleet.
This automotive collaboration allows car manufacturers better access to security-related in-vehicle information as well as extensive coverage of security incidents. Argus Connected ECU Protection detects operating system irregularities and unusual behavior in the vehicle using customer-defined hazard models and is implemented on connected ECUs such as telematics, infotainment centers, and ADAS systems. Threat models may be built on UNECE R 155 (WP.29), the MITRE Attack structure, or some other model that is selected. Vehicle warnings are sent to Argus Fleet Protection, where they are paired with information from other sources in dedicated automotive hazard hunting and investigation modules. Vehicle manufacturers will create a more reliable, all-encompassing cyber intelligence picture by combining end-to-end automotive cyber protection with Microsoft Azure IoT.
Furthermore, using Argus Delta OTA update technologies, car manufactures will immediately incorporate security upgrades to minimize vulnerability to cyber threats while reducing vehicle downtimes and deployment costs.
"We are thrilled to be joining the world's leading businesses on Microsoft Azure. It represents a significant step forward for vehicle manufacturers looking to minimize their exposure to cyber risk while still adhering to applicable requirements and regulations such as UNR 155 (WP.29) "said Miki Hakak, Argus Cyber Security's VP Marketing, and Business Development. "By collaborating with a global leader like Microsoft, we're making it easier for vehicle manufacturers to cost-effectively incorporate cyber protection into their vehicles without disrupting manufacturing cycles or project risk."
"Cybersecurity is a critical component in the transition to connected and autonomous vehicles," said Avijit Sinha, Microsoft's general manager for Azure Mobility. "Argus offers robust and flexible tools to ensure security through a vehicle's diverse computing resources and networks, whether it's avoiding attacks on safety-critical functions or personal data theft. The partnership of Argus and Microsoft Azure IoT offers a roadmap for automakers aiming to achieve their target of stable connected and autonomous vehicles."
ABOUT ARGUS CYBER SECURITY
To secure connected cars and commercial vehicles from cyber-attacks, Argus, a world pioneer in automotive cyber protection, offers in-vehicle solutions, consulting services, and an automotive security operation center (ASOC). Customers include automakers, retailers, and fleet managers.
Argus products and services, which are currently in development, assist in the prevention, tracking, and reaction to cyber threats on in-vehicle components, networks, and post-production fleets. Via a suite of customized advisory services that help incorporate data security standards and procedures into the whole product lifecycle, Argus professional services assist its clients in complying with applicable guidelines and regulations, such as UNECE R 155 (WP. 29). Argus' groundbreaking approaches and solutions are based on decades of cybersecurity and automotive research, which has resulted in more than 70 awarded and pending patents.
Argus was founded in 2013 in Tel Aviv, Israel, and has offices in Michigan, Stuttgart, Tokyo, Shanghai, and Korea. Argus is a wholly-owned subsidiary of Elektrobit, a multinational supplier of automotive products and services.
NETWORK THREAT DETECTION
Solvo | November 30, 2021
Solvo, a security automation enabler for cloud development and production environments", announced today the availability of its "IAMagnifier" – a cloud SaaS security platform, enabling developers, DevOps and cybersecurity stakeholders working in cloud development environments to reduce potential cybersecurity threats caused by misconfigured access permissions to cloud assets.
To truly enable a secured, yet productive development environment, a "least-privileged" permission mechanism should be employed – by using this methodology, the access level for each asset is defined by answering the question "How can I prevent access to that asset from anyone or anything other than anyone or anything that is supposed to access it to perform their intended task?".
Today, security-minded developers and security stakeholders within the organization had to manually inspect security permissions configurations for each asset, compare the permission levels found within the specific asset's configuration to the permission level stated by the relevant organizational policies, and if the actual permission level is too lenient – rectify the situation by updating the asset's permission configuration.
In addition to the need to perform these set of activities for each individual asset, a task which might entail an enormous waste of time and effort, the permission level to which the "wrong" configuration should be updated to may not be the best one according to the specific characteristics of each individual asset.
"Solvo's IAMagnifier turns this cumbersome, lengthy, inefficient, and error-prone process of managing cloud assets' access permissions, into an automated, centralized, fast and decision-assisted experience,It does so by constantly inspecting the assets' access permissions configurations, analyzing gaps between the current and desired permission level, suggests the needed changes to the configuration, and performs these changes if approved by the user."
Solvo's Co-founder and CEO, Shira Shamban
To present the most relevant and updated data about permission levels and potential risks derived from permission level gaps, Solvo's IAMagnifier offers visual experience, which turns boring tables and records into easy to comprehend mapping of connections and dependencies between Roles, Policies, assets and users. The IAMagnifier also highlights what its analyzer has declared as "excessive permissions", and suggests an alternative, least-privileged permission policy, which can then be enforced by the user just by approving the suggestion.
Unlike traditional infrastructure default definitions or human-set definitions, the "excessive" permission status definition and the alternative permission suggestion the IAMagnifier highlights and suggests are derived from analyzing actual real behaviour of the application and finding the balance between preventing unrequired access by irrelevant stakeholders, and keeping an uninterrupted workflow for relevant stakeholders (i.e least-privileged).
Sylvie Veilluex, Solvo's advisor and former CIO of Dropbox, added: "The team has been offering early access to the IAM Magnifier to selected customers, and the feedback has been nothing short of amazing. One of the CEO whose company was using the IAMagnifier went on to declare the ability to easily see the company's security posture, and effortlessly enhance it, made scaling the company's cloud and business infrastructure frictionless and even enjoyable."
Solvo's team will present IAM Magnifier during AWS' Re:Invent conference, which takes place in Las Vegas, NV, between November 29th and December 3rd, 2021. Solvo will also be providing a free AWS S3 Bucket policy auditing during the conference, and visitors can schedule a meeting with the team for a chance to get back from Vegas with a win.
Solvo allows security teams to empower software developers and accelerate their cloud delivery. The developer-centric security platform creates and maintains a least-privilege security policy for cloud native applications. It adapts the security configuration to every environment, creates it from scratch and monitors for changes, integrating with existing workflows seamlessly and automatically.
AgileBlue | April 30, 2021
Security threats grow rapidly, and proper investigation and response necessitate the use of people who are familiar with endpoints, networks, cloud systems, and other technologies. Many businesses need a professional SOC manager, an accomplished Security Analyst, a Threat Researcher, a Security Architect, a Security Analyst, a Cloud Security Architect, and so on. This ensures that you need a team that is always improving to have the best skills as you need them. Unfortunately, there is a critical lack of specialized cybersecurity expertise in the overall talent industry, and there are not enough qualified resources to fulfill the need.
Cybersecurity is complicated, and different technologies will often be needed to work together. Maintaining technical expertise to implement, update, and customize each component, as well as educating the staff on new versions and features, is needed. You must manage these distributor relationships, licenses, and training operations if you operate your SOC. Having coverage 24 hours a day, seven days a week is no longer discretionary. It's a must! Allowing an enemy to sow seeds for hours, days, or weeks makes it infinitely more difficult to control and eliminate risks. The adversary is aware that they only have a finite amount of time to do as much harm as possible, as in the case of ransomware, or to set back doors, as in the case of data exfiltration.
You have the best chance of recovery if you can investigate and answer within minutes, so having a solution that is available 24 hours a day, seven days a week is essential.
If money isn't a problem and you have the resources devoted to building out a 24x7 Security Operations Center, it could make sense to go in that direction. If you are limited on any of those fronts, Modus suggests that SOCaaS is a safer option. In summary, Modus Data ProtectorTM SOCaaS will allow you to:
• Leverage security insights from other organizations
• Have predictable spending – no need for surprise budget requests
• Handle alerts more efficiently and with more predictable results
• Have the agility and keep pace with your ever-changing organization’s IT demands
• Enjoy a 24 x 7 x 365 promise to you that includes human-based responses, asset discovery, vulnerability assessment, intrusion detection, behavior monitoring, log management, and cloud-based SIEM
AgileBlue is a software firm that offers a cutting-edge SOC-as-a-Service for 24X7 network monitoring, cloud security, data protection, and enforcement. AgileBlue's team of cybersecurity and technical experts created a new SOC-as-a-Service technology that safeguards the company's sensitive network infrastructure, cloud, and confidential data. AgileBlue, founded by Joe Marquette and Tony Pietrocola, is a premier 24X7 Autonomous CyberSOC. AgileBlue Leadership also advises executives and boards of directors on cyber threats, creating a cyber policy, and providing cyber risk management as a service.
Modus Discovery, Inc is a relationship-driven data analytics firm founded by experienced founders and industry veterans. As corporate owners, CIOs/CTOs, general counsel, and cybersecurity professionals, we've been in your shoes. They understand the difficulties you are experiencing because they have faced them earlier. This empathy is what motivates them to provide you with the most successful solutions and to make each information governance or eDiscovery partnership a stunning success. Modus puts individuals, systems, and technologies together to assist clients with compliance and eDiscovery problems. The Modus team has gained subject matter expertise through decades of hands-on experience in their respective fields, resulting in informed and empowered advisors ready to make timely choices that support their clients and their needs.