RedShield appoints Cybersecurity veteran Kate Kuehn as Board Director

prnewswire | September 16, 2020

RedShield, specialists in web application shielding, has announced the appointment of industry thought-leader Kate Kuehn as a board director. Based in Chicago, Kuehn's appointment is part of RedShield's strategy to accelerate growth in the U.S; a push made possible by RedShield's USD$10M Series B funding last September. Her appointment follows that of fellow industry veteran James Carrigan Jr. to Chief Revenue Officer (CRO), who recently joined the company from Verizon. Kuehn joins RedShield from vArmour where she is currently Senior Vice President. Prior to this Kuehn was the U.S. CEO of Senseon where she focused on leading its business in the Americas. Over two decades, Kuehn has held roles including VP, CISO, and CEO at companies including BT Group plc, Verizon, and Wandera. As a leader of some of the industry's first projects in DDOS, Ethernet as a network (CPA), SaaS and IaaS - and an active thought leader in Security and Advanced Network Technologies for nearly 20 years - Kuehn brings significant gravitas to the New Zealand-born business.

Spotlight

Cyber-Attacken wie der SolarWinds-Angriff erinnern uns daran, dass unsere heutigen Gegenspieler – sowohl Cyberkriminelle als auch feindselige staatliche Akteure – nicht ruhen. Sie arbeiten beständig an innovativen Angriffsmethoden und werden immer raffinierter, arglistiger und beharrlicher. Bei der Entwicklung ihrer Angriffe ver

Spotlight

Cyber-Attacken wie der SolarWinds-Angriff erinnern uns daran, dass unsere heutigen Gegenspieler – sowohl Cyberkriminelle als auch feindselige staatliche Akteure – nicht ruhen. Sie arbeiten beständig an innovativen Angriffsmethoden und werden immer raffinierter, arglistiger und beharrlicher. Bei der Entwicklung ihrer Angriffe ver

Related News

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Lookout Announces Industry’s Only Endpoint to Cloud Security Platform

Lookout | January 31, 2023

Lookout, Inc., a business specializing in endpoint-to-cloud security, has announced enhanced capabilities and feature updates to its award-winning Lookout Cloud Security Platform, the only endpoint-to-cloud security solution available on the market. In addition to cloud, internet, and private applications, the cloud-native platform now includes a single policy architecture for administration and enforcement across all mobile devices. A single agent and a single control plane for mobile and cloud security services are also new platform upgrades, providing IT and security professionals with a cost-effective, streamlined administration experience. In addition, the Lookout Cloud Security Platform combines security service edge (SSE) with endpoint security to secure users and data regardless of location. It constantly monitors the risk posture of devices and users to provide dynamic and granular zero-trust access based on the sensitivity level of applications and data. As a result, it enables organizations to protect their workers, devices, applications, and data from unauthorized access and modern internet-based threats. In addition, the extended platform enables clients to make more educated choices about cloud security services using threat data from mobile endpoints. Lookout CEO, Jim Dolce, said, "Digital transformation and the significant adoption of the cloud have accelerated remote work and the use of mobile and unmanaged devices, which in turn exposes organizations to new security gaps that are ripe for exploitation from bad actors." He added, "Lookout's mission is to secure and empower the digital future where mobility and cloud are essential to all that we do for work and play; our endpoint to cloud security platform ensures that your data is protected – regardless of device, user or location." (Source – PR Newswire) The Award-Winning Lookout Platform The Lookout Cloud Security Platform integrates security services based on the company's unique technologies: Lookout Secure Private Access Lookout Secure Cloud Access Lookout Mobile Endpoint Security Lookout Secure Internet Access About Lookout, Inc. Lookout, Inc. is a cybersecurity firm that merges endpoint security with SASE technology to protect data while maintaining user privacy. Its single, cloud-native security platform protects data across devices, applications, networks, and clouds—a solution as fluid and adaptable as the current digital environment. Giving companies and people more control over their data empowers them to maximize its value and flourish. Lookout is trusted by organizations of all sizes, government agencies, and millions of individuals to safeguard sensitive data, allowing them to live, work, and connect freely and securely.

Read More

PLATFORM SECURITY,SOFTWARE SECURITY

Phosphorus Launches New xIoT Security Capabilities to Discover and Disable Risky Devices Prohibited by the U.S. Government

Phosphorus | December 13, 2022

Phosphorus, the leading provider of proactive and full-scope security for the extended Internet of Things (xIoT), today announced new security features that will enable organizations to discover and monitor their networks for the presence of xIoT devices that the U.S. government deems a significant security risk. The new features also include the capability to remotely disable and remove the devices from the network. Phosphorus’s security update follows the FCC’s ban on the sale or importation of devices made by several Chinese manufacturers that it considers to pose “an unacceptable risk to national security of the United States or the security or safety of United States persons.” The Covered List includes video surveillance and telecommunications equipment produced by Huawei Technologies, ZTE Corporation, Hytera Communications, Hangzhou Hikvision Digital Technology, and Dahua Technology (and their subsidiaries and affiliates). “The Phosphorus xIoT Security Platform is the industry’s only solution that can discover the presence of these prohibited devices and remotely render them inert at scale. “These unique capabilities will empower enterprises and government organizations across the U.S. to discover, disable, and remove banned or potentially dangerous devices from their enterprise environments.” John Vecchi, Chief Marketing Officer at Phosphorus Advanced Discovery Capability A recent study by Phosphorus’s global research division, Phosphorus Labs, found that organizations consistently struggle to identify all of their xIoT devices – this means many companies may not realize they have banned devices lurking inside their networks. According to its research, 80% of enterprise security teams can’t identify the majority of their xIoT devices and customer estimates of xIoT inventories are consistently off by 40-60%. Phosphorus’s Enterprise xIoT Security Platform has unique capabilities for discovering xIoT assets, and it is the only technology platform able to communicate with these devices (ranging from security cameras to PLCs) in their native languages. This enables a high degree of accuracy, granularity, and speed when discovering and analyzing these devices to create comprehensive inventories of xIoT assets that include device type, brand, model, firmware version, credential status, default/enabled protocols, certificate status, and more. Disabling and Isolating High-Risk Devices Phosphorus empowers organizations by giving them direct control over every single device in their wide-ranging xIoT deployments. Through the platform’s Hardening and Remediation capabilities, organizations can update and rotate a device’s credentials, manage firmware, disable remote services, turn off unnecessary connectivity features, check for valid certificates, and reboot the device. For organizations that have detected banned xIoT technologies in their networks, specific device-level actions such as changing passwords, disabling services and reducing connectivity will be critical for limiting the potential risks of these devices prior to their removal from the network. World’s First and Only Proactive xIoT Security Platform Phosphorus’s Enterprise xIoT Security Platform is the industry’s only consolidated xIoT security offering, delivering state-of-the-art Attack Surface Management, Hardening and Remediation, and Detection and Response across the full range of IoT, OT, and Network-connected devices – spanning both new and legacy devices. For the first time in industry history, teams in IT, Facilities, and Security are able to collaborate on a single platform to safely discover, assess, remediate, and monitor their xIoT devices. Phosphorus is now the solution of choice for enterprises to secure devices that were previously unknown or overlooked, beginning with fundamental xIoT security hygiene. The company’s Enterprise xIoT Security Platform is currently deployed in Fortune 100, Fortune 500, and government networks. ABOUT PHOSPHORUS Phosphorus Cybersecurity® is the leading xTended Security of Things™ platform designed to secure the rapidly growing and often unmonitored Things across the enterprise xIoT landscape. Our Enterprise xIoT Security Platform delivers Attack Surface Management, Hardening & Remediation, and Detection & Response to bring enterprise xIoT security to every cyber-physical Thing in your enterprise environment. With unrivaled xIoT discovery and posture assessment, Phosphorus automates the remediation of the biggest IoT, OT, and Network device vulnerabilities—including unknown and inaccurate asset inventory, out-of-date firmware, default credentials, risky configurations, and out-of-date certificates.

Read More

ENTERPRISE SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Nozomi Networks Introduces the Industry’s First OT and IoT Endpoint Security Sensor

Nozomi Networks | January 25, 2023

On January 24, 2023, Nozomi Networks Inc., one of the leaders in OT and IoT security, announced Nozomi ArcTM, the industry's first IoT and OT endpoint security sensor, intended to accelerate time to full operational resilience exponentially. Nozomi Arc is designed to automatically deploy across a large number of locations and devices anywhere a company needs visibility, and it provides vital data and insights about essential assets and network endpoints. This data is utilized to better analyze and prevent attacks, as well as correlate user behavior, without straining existing resources or interrupting mission-critical networks. Arc is a game-changer in terms of comprehensive asset visibility, deployment speed, and network coverage across complex and remote OT and IT networks. Nozomi Arc is designed to: Be deployed remotely Analyze endpoint vulnerabilities Accelerate monitoring deployments in mission-critical systems; and Identify compromised hosts Nozomi Networks Co-founder and CPO, Andrea Carcano, said, "Operational resiliency is the top business priority for critical infrastructure organizations, which can only be achieved by lowering cyber risks and increasing security." He added, "Nozomi Arc accelerates time to resiliency by transforming every computer on the network into an OT security sensor. It quickly extends visibility to attack surfaces and threats inside endpoint hosts and their local networks. With Nozomi Arc, users can quickly corollate more information from more sources for better diagnostics and faster time to response." (Source – GlobeNewswire) With Nozomi Arc, users get the following advantages: Faster time to resiliency: Nozomi Arc removes time, resource, geographic, and internal policy limits from network-based deployments. Lower cyber risk and increased security: The only OT solution in the market that can identify malicious hardware. Extended visibility and context: In addition to illuminating additional assets, devices, and possible vulnerabilities, Arc detects process irregularities and questionable user behavior. Lower operational overhead: Because Arc can be remotely deployed through a software download, Nozomi Arc does not need extensive network adjustments to be implemented anywhere in the world, even in the most remote locations. About Nozomi Networks Nozomi Networks, with headquarters in San Francisco, California, accelerates digital transformation by defending the world's critical infrastructure, industrial enterprises, and government enterprises from cyber-attacks. Its technology provides OT and IoT environments with superior network and asset monitoring, threat detection, and analytics. As a result, customers rely on the company's solution to reduce risk and complexity while increasing operational resiliency. In addition, the organization provides zero-trust security by delivering contextual data for policy decisions, such as endpoint posture checks, baseline monitoring, and device role data.

Read More