Research shows Boardroom investments in cybersecurity are most commonly the result of an incident or fears of compliance audit failure

prnewswire | October 08, 2020

Thycotic, provider of privileged access management (PAM) solutions to more than 10,000 organizations, including 25 of the Fortune 100, today released its CISO Decisions survey, an independent global study1 that examines what most influences the Board to invest in cybersecurity and the impact this has on CISO decision-making. Based on findings from more than 900 global CISOs/Senior IT decision-makers, the research shows Boardroom investments in cybersecurity are most commonly the result of an incident or fears of compliance audit failure. Because of this, the research shows more than half, 58 percent, of respondents say their organizations plan to add more towards security budgets in the next 12 months.

Spotlight

The ability to observe, diagnose, and subsequently improve the performance of business-critical applications is essential to ensuring a positive user experience and maintaining the highest levels of employee productivity and customer satisfaction. The challenge of establishing an effective application\ visibility and control function is only growing, as trends such as mobility, virtualisation, and cloud computing fundamentally alter data centre and application architectures. Download this white paper to discover how to solve the application visibility challenges with NetScaler insight centre.

Spotlight

The ability to observe, diagnose, and subsequently improve the performance of business-critical applications is essential to ensuring a positive user experience and maintaining the highest levels of employee productivity and customer satisfaction. The challenge of establishing an effective application\ visibility and control function is only growing, as trends such as mobility, virtualisation, and cloud computing fundamentally alter data centre and application architectures. Download this white paper to discover how to solve the application visibility challenges with NetScaler insight centre.

Related News

DATA SECURITY

Strangeworks and Quantinuum Collaborate to Integrate Quantum-enhanced Cryptographic Key Service

Quantinuum | January 06, 2022

A global leader in quantum computing software, Strangeworks, announced its collaboration with the largest integrated, stand-alone quantum computing company in the world, Quantinuum. Quantinuum offers various vertically integrated solutions, such as comprehensive, hardware-agnostic quantum software and the highest-performing quantum computer. This collaboration aims at implementing quantum-enhanced cryptographic keys, Quantum Origin, and Quantinuuminto the Strangeworks ecosystem. As the world's first commercial product to generate cryptographic keys using quantum computers, Quantum Origin will become an essential ecosystem component. It will also provide seamless access to superior cryptographic keys to its users to help protect them against current security threats. "It's fitting that Strangeworks would expand its industry-leading platform to include quantum technology to help defend against today's cyber threats,We are excited to integrate Quantum Origin to generate the strongest cryptographic keys for Strangeworks and their customers, based on verifiable quantum randomness." Duncan Jones, Head of Cybersecurity at Quantinuum and Cambridge Quantum Strangeworks, as the world's leading Quantum Service Provider™, is constantly improving to provide its users with the latest quantum-based security offerings through the ecosystem. It is crucial to enable the latest in cybersecurity technology, such as the variety of quantum systems available and the data sharing with its users. Once they implement Quantum Origin, they will become the first to do it. "We're excited to welcome Quantinuum into the Quantum Syndicate. Expanding our managed quantum services to encompass cyber security is a natural addition to our enterprise offerings," said William Hurley, founder and CEO of Strangeworks. "The integration of Quantum Origin enables enterprises around the world with a seamless path to quantum-generated cryptographic keys to protect their sensitive data."

Read More

DATA SECURITY

XSOC CORP Launches Four Foundational Patent Pending Cryptographic Systems Built to Secure Critical Data

XSOC CORP | May 12, 2021

XSOC CORP has emerged from stealth mode after three years of intense research and development, and today unveiled new cybersecurity solutions aimed at offering improved cryptographic capabilities for existing systems in local industrial and wireless environments. XSOC CORP is a post-quantum data security company that protects businesses' most sensitive data and communications from well-funded hacker groups and nation-state attackers using more sophisticated attacks. Senior software and hardware developers at XSOC CORP combine decades of algorithmic programming expertise with high-performance encryption techniques. Matching global-level cybersecurity innovations with the business and marketing acumen of a professionally experienced executive management team have boosted XSOC CORP's entry into the market. XSOC CORP expands on the idea that good security, together with stronger tools, is the only real way to ensure data and device safety against external threats – no matter how sophisticated. The new technology from XSOC CORP fills gaps in existing cybersecurity systems by providing specialized encryption products, utilities, and pluggable modules that are specifically tailored for the expanding Internet of Things (IoT) and Industrial Internet of Things (IIoT) markets. XSOC CORP is collaborating with the academic and professional sectors to solve some of the problems associated with outdated Public Key Infrastructure (PKI). SSL/TLS is the most commonly used mode of PKI, but it only provides a "static" certificate-based solution and, in many situations, only updates cryptographic key material certificates once per year. In the last 20 years, the certificate concept hasn't evolved or improved much; instead, it's gotten more expensive while being hard to configure and maintain. SOCKET is a breakthrough technology that allows for continuous cryptographic key rotation (updates) with or without SSL/TLS support. SOCKET is a cryptographic key exchange protocol designed for near-field/radio frequency (RF) and wireless transmissions in closed-circuit, limited-distance, or intermittent ad-hoc network environments that support hardened encryption protection. SOCKET also offers a relatively reliable and secure main infrastructure mechanism for more permanent network conditions. SOCKET, for example, can be used as an out-of-band (stand-alone) means of symmetric key transmission for legacy devices in an industrial (IT/OT) or commercial wireless surveillance environment, or modern streaming video cameras in a warehouse or embassy. SOCKET is an ideal companion to the XSOC Cryptosystem, and offers a safe solution for symmetric key sharing, allowing authentication in situations where TLS (SSL Certificates) are either impractical or impossible. SOCKET can be thought of as an “N-Tier” variant of Kerberos / X.509 technology, which has been around for 20 years and does not have a single point of failure. Although XSOC CORP's SOCKET technology focuses on the idea of protected key exchanges in private network environments, the technology has also been completely opened to the internet via WAN-SOCKET. SOCKET's Wide Area Network (WAN) version employs advanced Distributed Hash Table (DHT) and Peer to Peer (P2P) technologies to provide symmetric encryption keys safely and with reduced lag or delay. The reliability of SOCKET (and WAN-SOCKET) is due to the final pillar of XSOC CORP's main underlying technology set, Encrypted Broadcast Protocol, or "EBP." EBP is a native authentication protocol for network-efficient secure signal communications with 512bit or higher encryption strength. XSOC CORP has improved on the already effective UDP protocol, making it 100% stable and capable of providing completely encrypted data. XSOC CORP has shown that transfer of massive volumes of data over EBP can be achieved more than twice as fast as the leading FTP client/server while also being secured by 512bit encryption in a clear head-to-head challenge against the TCP/IP protocol. About XSOC CORP Founded in 2018, XSOC CORP is headquartered in Irvine, CA, and has a senior management and technology engineering team that has developed the XSOC Cryptosystem, which employs a supplied cryptographic cipher and a versatile SDK/API for fast integration into a wide range of software and platforms. XSOC Cryptosystem is designed to make the use of symmetric encryption easier. It eliminates the amount of time and code (or effort) taken to apply strong encryption directly to text, data, and, in particular, streaming-media services. SOCKET and WAN-SOCKET, which are powered by the modern and high-performance EBP protocol, expand the scope of symmetric cryptography globally.

Read More

DATA SECURITY

Vulcan Cyber to Introduce Risk Scoring Platform for Businesses

Vulcan Cyber | June 19, 2021

The only risk remediation platform of developers of the industry, Vulcan Cyber®, has announced a new for IT security organizations to measure risk compliance through IT asset health scores across logical business groupings. For the first time, this enables enterprise cybersecurity teams to track remediation progress against prioritized risks to measure business risk against customizable security compliance KPIs. This will help businesses protect themselves from various exploits such as ransomware attacks and data breaches. Other approaches lack many aspects in vulnerability risk prioritization and often only the risks at the individual, atomic, and asset levels. Customers of Vulcan Cyber now benefit from the ability to control custom risk parameters and improved vulnerability prioritizing scores weighted with industry asset data. These newest additions to the Vulcan Cyber risk model improve the industry's only threat remediation orchestration platform and are an indispensable second step after susceptibility scanning. Practically all subjugated vulnerabilities are known by IT and security teams in advance; they are exploited at the occurrence. As a result, the windows for vulnerability remediation presently span much time giving bad actors an intolerable amount of time to abuse businesses with significantly less capacity to protect themselves. Vulcan Cyber helps get the proper remedies to the right people, prioritize vulnerabilities, automate remediation tasks at scale, integrate with dozens of best-of-breed tools, and measure risk across the complete process to get it fixed finally. About Vulcan Cyber Vulcan Cyber developed the industry's first vulnerability remediation orchestration platform, which was built to help various businesses reduce the online threat risks using application security and measurable cloud. By curating and delivering the best remedies, prioritizing vulnerabilities, and automating processes and fixes via the last mile of remediation, the platform of Vulcan orchestrates and tracks the remediation lifespan from scan to fix. Vulcan Cyber platform’s unique capability has garnered Vulcan Cyber recognitions.

Read More