DATA SECURITY

Modus Collaborates with AgileBlue to Introduce Modus Data Protector™, for Managed Breach Protection from Cybersecurity Threats

AgileBlue | April 30, 2021

Security threats grow rapidly, and proper investigation and response necessitate the use of people who are familiar with endpoints, networks, cloud systems, and other technologies. Many businesses need a professional SOC manager, an accomplished Security Analyst, a Threat Researcher, a Security Architect, a Security Analyst, a Cloud Security Architect, and so on. This ensures that you need a team that is always improving to have the best skills as you need them. Unfortunately, there is a critical lack of specialized cybersecurity expertise in the overall talent industry, and there are not enough qualified resources to fulfill the need.

Cybersecurity is complicated, and different technologies will often be needed to work together. Maintaining technical expertise to implement, update, and customize each component, as well as educating the staff on new versions and features, is needed. You must manage these distributor relationships, licenses, and training operations if you operate your SOC. Having coverage 24 hours a day, seven days a week is no longer discretionary. It's a must! Allowing an enemy to sow seeds for hours, days, or weeks makes it infinitely more difficult to control and eliminate risks. The adversary is aware that they only have a finite amount of time to do as much harm as possible, as in the case of ransomware, or to set back doors, as in the case of data exfiltration.

You have the best chance of recovery if you can investigate and answer within minutes, so having a solution that is available 24 hours a day, seven days a week is essential.

If money isn't a problem and you have the resources devoted to building out a 24x7 Security Operations Center, it could make sense to go in that direction. If you are limited on any of those fronts, Modus suggests that SOCaaS is a safer option. In summary, Modus Data ProtectorTM SOCaaS will allow you to:

• Leverage security insights from other organizations

• Have predictable spending – no need for surprise budget requests

• Handle alerts more efficiently and with more predictable results

• Have the agility and keep pace with your ever-changing organization’s IT demands

• Enjoy a 24 x 7 x 365 promise to you that includes human-based responses, asset discovery, vulnerability assessment, intrusion detection, behavior monitoring, log management, and cloud-based SIEM

About AgileBlue

AgileBlue is a software firm that offers a cutting-edge SOC-as-a-Service for 24X7 network monitoring, cloud security, data protection, and enforcement. AgileBlue's team of cybersecurity and technical experts created a new SOC-as-a-Service technology that safeguards the company's sensitive network infrastructure, cloud, and confidential data. AgileBlue, founded by Joe Marquette and Tony Pietrocola, is a premier 24X7 Autonomous CyberSOC. AgileBlue Leadership also advises executives and boards of directors on cyber threats, creating a cyber policy, and providing cyber risk management as a service.

About Modus

Modus Discovery, Inc is a relationship-driven data analytics firm founded by experienced founders and industry veterans. As corporate owners, CIOs/CTOs, general counsel, and cybersecurity professionals, we've been in your shoes. They understand the difficulties you are experiencing because they have faced them earlier. This empathy is what motivates them to provide you with the most successful solutions and to make each information governance or eDiscovery partnership a stunning success. Modus puts individuals, systems, and technologies together to assist clients with compliance and eDiscovery problems. The Modus team has gained subject matter expertise through decades of hands-on experience in their respective fields, resulting in informed and empowered advisors ready to make timely choices that support their clients and their needs.

Spotlight

In 2018, a large manufacturing organization experienced a ransomware attack resulting in a material security breach. The incident highlighted the need for a comprehensive cybersecurity program with greater visibility. The challenge was to implement a solution that was easy to manage and cost-effective while ensuring their sensit

Spotlight

In 2018, a large manufacturing organization experienced a ransomware attack resulting in a material security breach. The incident highlighted the need for a comprehensive cybersecurity program with greater visibility. The challenge was to implement a solution that was easy to manage and cost-effective while ensuring their sensit

Related News

NETWORK THREAT DETECTION, SOFTWARE SECURITY

ZeroFox Partners with Google Cloud to Disrupt Phishing Attacks and Malicious URLs

Globenewswire | April 11, 2023

Delivering on its mission to make the digital world a safer place, ZeroFox, a leading external cybersecurity provider is partnering with Google Cloud to disrupt phishing campaigns by quickly warning users of malicious URLs and fake websites. ZeroFox is utilizing the Google Cloud Web Risk Submission API, a service that verifies unsafe URLs and shows warnings across 5 billion devices using browser, social media, and other technology integrations. According to APWG, there has been an almost 75% increase in unique phishing websites detected in the last year. As the recognized leader in digital risk protection and domain takedowns serving over 2,000 global enterprises and brands, ZeroFox leverages deep expertise and advanced AI to rapidly uncover and take down malicious domains used in phishing attacks. With this new integration, ZeroFox automatically detects phishing domains for customers and submits verified, malicious URLs through Google Cloud’s Web Risk Submission API, disrupting attacks and warning users of malicious content on billions of devices using browser warnings. ZeroFox finds what others miss by leveraging global intelligence collection and analysis across a broad set of data sources, delivering continuous domain monitoring to accurately detect instances of phishing and fraud. Combined with the scope and scale of Web Risk, which warns users of malicious domains across five billion devices, users will have unmatched protection against a wide range of digital threats. “Partnering with an industry leader such as Google Cloud to support the Google Cloud Web Risk Submission API further demonstrates that ZeroFox is an innovative leader in protecting organizations beyond the perimeter,” said James C. Foster, Founder and CEO of ZeroFox. “External cyber threats are only growing more prevalent as the world becomes increasingly digital, creating an increased need for external cybersecurity. This partnership aligns well with our strategy of partnering with a global network of partners to defend against these threats and accelerate the disruption of malicious actors from hours and days to minutes.” “Securing cloud environments and devices from cyber threats is critical,” said Jenn Buchanan, Product Manager at Google Cloud. “We are happy to partner with ZeroFox to protect against malicious digital activity and make the internet a safer place.” ZeroFox will be onsite at RSAC, visit Booth #1527 to learn more about this partnership and our unified external cybersecurity platform. This partnership with ZeroFox and Google Cloud’s Web Risk Submission API service is operational as of January 2023. About ZeroFox ZeroFox, an enterprise software-as-a-service leader in external cybersecurity, has redefined security outside the corporate perimeter on the internet, where businesses operate, and threat actors thrive. The ZeroFox platform combines advanced AI analytics, digital risk and privacy protection, full-spectrum threat intelligence, and a robust portfolio of breach, incident and takedown response capabilities to expose and disrupt phishing and fraud campaigns, botnet exposures, credential theft, impersonations, data breaches, and physical threats that target your brands, domains, people, and assets. Join thousands of customers, including some of the largest public sector organizations as well as finance, media, technology and retail companies to stay ahead of adversaries and address the entire lifecycle of external cyber risks.

Read More

PLATFORM SECURITY, SOFTWARE SECURITY, CLOUD SECURITY

Keeper Security Launches Multi-Cloud Password Rotation, Enabling Organizations to Update Privileged Credentials Automatically

Prnewswire | May 25, 2023

Keeper Security, the leading provider of cloud-based zero-trust and zero-knowledge cybersecurity software protecting passwords, secrets, connections and privileged access, today announced the launch of password rotation, a new feature that allows organizations to securely rotate service accounts and other privileged credentials on-demand or on an automated schedule. Keeper's new password rotation capability enables organizations to automate the changing and resetting of system credentials including Active Directory service accounts, Azure AD accounts, AWS IAM accounts, SSH keys, database passwords, Windows local users, Linux users, Mac users and more. Password rotation is the latest enhancement to Keeper's next-generation Privileged Access Management (PAM) solution. Recognized as the 2023 Gold Winner by the Cybersecurity Excellence Awards and named Most Comprehensive PAM Solution by the Global Infosec Awards, KeeperPAM is revolutionizing privileged access management by providing comprehensive PAM capabilities including enterprise-grade password, secrets and connection management in one unified platform. With the addition of automated password rotation, KeeperPAM's capabilities continue to grow. KeeperPAM was designed to address the cybersecurity industry's growing demand for modern solutions that are cost-effective, easy to implement and engaging for end users. Keeper's recent Privileged Access Management Survey: User Insights on Cost & Complexity revealed that more than half of all IT and security leaders (56%) have tried to deploy a traditional PAM solution but never fully implemented it. Of those, a staggering 92% said it was because the solution was too complex. Unlike traditional PAM solutions, Keeper's Password Rotation architecture is managed through the cloud-based vault and admin console interface, with a lightweight component that's installed in the customer's cloud and on-prem environment, called the Keeper Gateway service. The Gateway service and Keeper's new multi-cloud routing infrastructure does not require security teams to make any firewall changes, and it uses native protocols for implementing rotation. "Administrative passwords must be updated regularly and automatically to reduce the risk of password-based breaches and cyberattacks. Traditional PAM tools with password rotation capabilities are often expensive and difficult to deploy," said Craig Lurey, CTO and co-founder of Keeper Security. "This leaves organizations that cannot afford or have never fully deployed those solutions vulnerable. We are excited to help minimize this risk with an affordable, modern and elegant solution that protects every user and every device in an organization." Password rotation enables customers to: Automatically rotate credentials for machines, service accounts and user accounts across their infrastructure, and schedule rotations to occur at any time or on-demand. Perform post-rotation actions such as restarting services or running other applications as needed. Securely store all credentials in the Keeper Vault, and control and audit access to credentials. Log all actions to Keeper's Advanced Reporting and Alerts Module (ARAM) and third party SIEM providers. Create compliance reporting on shared privileged accounts. Password Rotation through KeeperPAM is available through the web vault, desktop app for Windows/Mac/Linux and the admin console. The feature enables admins to seamlessly manage rotation for users and records, create gateways, configure cloud environments and enforce least-privilege access. Password Rotation as part of KeeperPAM supports Keeper's zero-knowledge, zero-trust architecture, which always encrypts and decrypts data at the local device level. About Keeper Security Keeper Security is transforming cybersecurity for organizations around the world with next-generation privileged access management. Keeper's zero-trust and zero-knowledge cybersecurity solutions are FedRAMP and StateRAMP Authorized, FIPS 140-2 validated, as well as SOC 2 and ISO 27001 certified. Keeper deploys in minutes, not months, and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by thousands of organizations to protect every user on every device, Keeper is the industry leader for best-in-class password management, secrets management, privileged access, secure remote access and encrypted messaging. Learn more at KeeperSecurity.com.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Appdome Launches Build-to-Test, New Automated Testing Option for Protected Mobile Apps

Prnewswire | May 24, 2023

Appdome, the mobile app economy's one and only Cyber Defense Automation platform, today announced Build-to-Test which enables mobile developers to streamline the testing of cybersecurity features in mobile apps. The new capability allows Appdome-protected mobile apps to recognize when automated mobile app testing suites are in use and securely completed without interruption by a vendor, logging all security events for the developer to track and monitor. The Build-to-Test service is part of Appdome's Dev2Cyber initiative and will accelerate the delivery of secure mobile apps globally. In continuous integration, continuous delivery (CI/CD) pipelines, mobile app quality assurance is done via automated testing services so the functionality of the mobile app can be validated across hundreds of real-world mobile devices and OS versions. However, automated testing services can also leverage methods and tools that violate cybersecurity policies or that cybersecurity professionals find problematic and dangerous such as emulators, virtualization, resigning, debugging, dual spaces, Magisk and more. Once protections are added to a mobile app, security features detect these methods and tools, and the resulting cyber defense may prevent testers from using parts of these testing services. The new Build-to-Test option on Appdome extends Appdome's support for automated mobile app testing services and allows Appdome-protected mobile applications to recognize the testing vendor and securely complete testing runs without interruption. "We've always supported automated testing," said Chris Roeckl, Chief Product Officer at Appdome. "Build-to-Test solves one of the last operational challenges of testing mobile applications at scale and maintains end-to-end security in the mobile DevSecOps pipeline." Appdome-protected mobile apps have always been testable on devices made available through automated mobile application testing vendors. Advantages of the new Build-to-Test feature include: Fully automated testing for Appdome-protected mobile apps; Fully automated mobile app testing services to validate cyber defenses in Appdome protected mobile apps; Reduced complexity when testing protected mobile apps in automated environments; Eliminate the need to test protected and unprotected builds separately; and Protect test builds with Appdome defenses to ensure improved DevSecOps compliance. "Mobile developers want to test complete Android and iOS builds that include cyber and anti-fraud defenses," said Jamie Bertasi, Chief Customer Officer at Appdome. "Our goal is to remove every ounce of friction that stands in the way of protecting the mobile app economy." Appdome's Built-to-Test option is available with Appdome-DEV and Appdome-SRM licenses and compatible with all major mobile app testing services including Microsoft App Center, Sauce Labs, BitBar, LambdaTest and BrowserStack to reduce time to market, improve app quality and increase pipeline efficiency. For more information on how to use Appdome Build-to-Test, please see this knowledge base article. About Appdome Appdome's mission is to protect every mobile app in the world and the people who use mobile apps in their lives and at work. Appdome provides the mobile industry's only mobile application Cyber Defense Automation platform, powered by a patented artificial-intelligence based coding engine, Threat-Events™ Threat-Aware UX/UI Control and ThreatScope™ Mobile XDR. Using Appdome, mobile brands eliminate complexity, save money, and deliver 300+ Certified Secure™ mobile app security, anti-malware, anti-fraud, mobile anti-bot, anti-cheat, MiTM attack prevention, code obfuscation and other protections in Android and iOS apps with ease, inside the mobile DevOps and CI/CD pipeline. Leading financial, healthcare, government and m-commerce brands use Appdome to protect Android and iOS apps, mobile customers and mobile businesses globally. Appdome holds several patents including U.S. Patents 9,934,017 B2, 10,310,870 B2, 10,606,582 B2, 11,243,748 B2 and 11,294,663 B2. Additional patents pending.

Read More