INFOSEC PROJECT MANAGEMENT

TestArmy Partners with HUB Security for Advanced Cyber Security Solutions

HUB Security | April 28, 2022

HUB Security
Today, HUB Security , a secure computing solutions provider, announced it has signed a strategic partnership with testing and cyber security leader, TestArmy, to offer HUB Security's Advanced DDoS Simulation Platform - D.Storm. HUB Security will be TestArmy cyber security partner to enhance current offerings and work together to reach ransomware resilience in the polish and central European market.

TestArmy Group is one of the fastest growing testing companies in Central Europe. Specializing in cyber security and quality assurance of digital products.

"With organizations challenged with increasing and new cyber incidents, we see great value in partnering with TestArmy and developing together future cyber solutions for the European market."

Eyal Moshe, CEO and co-founder of HUB Security

"With the growing list of customers we help protect and require the most advanced security solutions to maintain their operations," said Wojciech Humiński, CEO at TestArmy. "HUB Security's solutions will allow our customers a higher level of cyber readiness facing current and new cyber threats."

About HUB Security
HUB Security was established in 2017 by veterans of the 8200 and 81 elite intelligence units of the Israeli Defense Forces. The company specializes in unique Cyber Security solutions protecting sensitive commercial and government information. The company debuted an advanced encrypted computing solution aimed at preventing hostile intrusions at the hardware level while introducing a novel set of data theft prevention solutions. HUB operates in over 30 countries and provides innovative cybersecurity computing appliances as well as a wide range of cybersecurity professional services worldwide.

About TestArmy
TestArmy Group is one of the fastest growing testing companies in Central Europe according to the Deloitte ranking (2019). Security, UX and Quality Assurance testing company with 80+ professional IT software testers/pentesters who possess ISTQB or other world renowned certificates.

Spotlight

Answer the Demand for Certified Professionals Prepping for an (ISC)² credential, like the CISSP, is a big commitment. Maybe you’ve started, but life got in the way of your goal… We get it. That’s why we created the (ISC)² Exam Action Plan to help keep you on track for success. Because we need talented, skilled people like you w

Spotlight

Answer the Demand for Certified Professionals Prepping for an (ISC)² credential, like the CISSP, is a big commitment. Maybe you’ve started, but life got in the way of your goal… We get it. That’s why we created the (ISC)² Exam Action Plan to help keep you on track for success. Because we need talented, skilled people like you w

Related News

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Axonius Successfully Completes the Australian Information Security Registered Assessors Program (IRAP) Assessment

Globenewswire | May 04, 2023

Axonius, the leader in cybersecurity asset management, today announced the successful completion of the Australian Information Security Registered Assessors Program (IRAP) assessment, giving the Australian public sector confidence in the security of the Axonius Cybersecurity Asset Management solution. The Australian government recently made changes to the Securing of Critical Infrastructure Act. One of the core focus areas for the Act is Risk Analysis, which is impossible without comprehensive asset visibility. By aggregating and correlating data from all deployed IT tools, Axonius provides a holistic view of each unique asset, and the ability to more accurately assess the Risk associated with that asset. The Information Security Registered Assessors Program (IRAP) enables Australian government customers to validate that appropriate controls are in place and determine the appropriate responsibility model for addressing the requirements of the Australian government Information Security Manual (ISM) produced by the Australian Cyber Security Centre (ACSC). “Axonius continually monitors both hardware and software assets, giving government agencies the asset visibility and intelligence they need to accelerate their security programs,” said Vern Fernhout, Country Manager, Australia for Axonius. “With the IRAP assessment complete, Australian government agencies can now confidently adopt Axonius to discover security gaps and enforce security policies – two critical components of complying with new and existing government security requirements.” Axonius already works with several Australian government agencies on both the state and federal level, and completing the IRAP assessment will accelerate its ability to serve additional customers in the space. In addition to IRAP, Axonius has also been certified by the National Information Assurance Partnership (NIAP)having passed Common Criteria validation in the United States, further emphasising its commitment to the public sector. The completion of both assessments enables Axonius to help government agencies improve their cybersecurity posture and gain more visibility into their IT and security environments. To learn more about Axonius, visit the website or request a demo. About Axonius Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy. With solutions for both cyber asset attack surface management (CAASM) and SaaS management, Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically validate and enforce policies. Cited as one of the fastest-growing cybersecurity startups, with accolades from CNBC, Forbes, and Fortune, Axonius covers millions of assets, including devices and cloud assets, user accounts, and SaaS applications, for customers around the world. For more, visit Axonius.com.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

CyberArk Identity Flows Accelerates Cybersecurity Risk Response

Businesswire | May 10, 2023

CyberArk (NASDAQ: CYBR), the global leader in Identity Security, today announced enhancements to its CyberArk Identity Flows orchestration solution, including new integrations with Gurucul, Proofpoint and SentinelOne. Part of the CyberArk Identity Security Platform, CyberArk Identity Flows automates risk response tasks and processes through no-code app integrations and workflows, and improves response times, efficiency and productivity. CyberArk Identity Flows includes a user-friendly workflow builder with powerful integration and orchestration capabilities for identity-related business processes, data management and security event responses. New features enable organizations to orchestrate complex responses to a potential threat or security event and act on the valuable data provided by threat monitoring and alerting systems. For example, when a security alert is triggered due to continued failed login attempts, users can be automatically moved into a “risky persons” group to restrict access to specific resources. This feature can also automatically notify relevant parties of the risk, create IT tickets, or take other actions based on security policies. The new technology integrations, available on CyberArk Marketplace, expand these capabilities to work with the industry’s leading threat detection systems, including: Gurucul Security Analytics and Operations Platform – detects threats and provides analytics-driven risk scoring to quickly identify and prioritize new, emerging and unknown threats. CyberArk Identity Flows can gather the risk score from Gurucul and orchestrate appropriate responses and actions to reduce the manual effort associated with threat investigation and remediation while securing the associated identity(s). Proofpoint Targeted Attack Protection (TAP) – detects email threats and assigns a level of risk to individuals with a Very Attacked People (VAP) feature. CyberArk Identity Flows can utilize the insights provided by Proofpoint to orchestrate appropriate responses such as moving identities into different groups to change access permissions, change an authentication policy, send alerts, post notifications or create IT tickets. SentinelOne Singularity Platform – detects and hunts for threats across user endpoints, containers, cloud workloads and IoT devices. When risks are detected, CyberArk Identity Flows leverages that context to make decisions within workflow actions that need to take place across the identity infrastructure. With CyberArk Identity Flows, workflows can be built in minutes through a user-friendly visual editor and thousands of pre-built connectors to more than 700 applications. CyberArk Identity Flows now also integrates with CyberArk Identity Security Intelligence, a shared service of the CyberArk Identity Security Platform that leverages user behavior analytics to detect and remediate anomalous and risky activity by employees. When high-risk behavior is detected, CyberArk Identity Flows is used to orchestrate response actions to reduce response times to attacks to minimize risk. “Flexible automation and orchestration are critical to a proactive Identity Security program and vital to improving the security posture of our clients. That’s why we’ve been so focused on delivering new CyberArk Identity Flows innovations,” said Peretz Regev, chief product officer at CyberArk. “With these enhancements and integrations, we make it simple for organizations to use CyberArk Identity Flows to reduce IT overhead, accelerate service agility and strengthen their overall security, ultimately improving operational efficiencies.” CyberArk Identity Flows can be purchased as a standalone solution, or as part of the CyberArk Identity Security Platform. CyberArk applies intelligent privilege controls to all identities – human and machine – with continuous threat detection and prevention across the entire identity lifecycle. With the CyberArk Identity Security Platform, organizations can enable Zero Trust and least privilege with complete visibility, enabling every identity to securely access any resource, located anywhere, from everywhere. To learn more, please register for “Better Security with Threat Response Automation,” a webinar taking place on May 18, 2023 or visit https://www.cyberark.com/products/identity-flows/. About CyberArk CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit https://www.cyberark.com, read the CyberArk blogs or follow on Twitter via @CyberArk, LinkedIn or Facebook.

Read More

ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

ZeroFox Announces Generative AI Capabilities, Develops FoxGPT

Globenewswire | May 11, 2023

ZeroFox (Nasdaq: ZFOX), a leading external cybersecurity provider, announced its plans for releasing generative AI into its External Cybersecurity Platform with the preview of FoxGPT. FoxGPT capabilities will optimize intelligence analyst workflows with the ability to analyze and contextualize malicious content online, enhancing the ability to combat the growing sophistication of cybercriminals. Built by cybersecurity and intelligence professionals, for cybersecurity and intelligence professionals, ZeroFox commits to AI transparency, security, and privacy of information. Recent cutting-edge advancements in AI, including the release of GPT 3.5, followed by GPT 4.0, are part of a larger, fast-paced AI revolution poised to change how humans and technology interact. As companies embrace these advancements to streamline and automate certain aspects of their business, threat actors are also embracing generative AI capabilities for more sophisticated phishing and fraud, social engineering, spam, and the production of malicious content. ZeroFox's adaptation of generative AI, FoxGPT, accelerates the analysis and summarization of intelligence across large datasets, allowing the identification of malicious content, phishing attacks, and potential account takeovers. "We at ZeroFox are consistently dedicated to external cybersecurity innovation, and I'm thrilled to share the next step in our innovation roadmap with the development of generative AI capabilities within our platform, FoxGPT," said Mike Price, CTO at ZeroFox. "We understand the impact of generative AI and the risks of threat actors abusing it. We're committed to harnessing this technology while capturing explainable results and the security and confidentiality of customer data." ZeroFox has steadily integrated other machine learning capabilities into its platform over the past few years, enhancing its ability to keep pace with emerging technologies. FoxGPT is a significant advancement for ZeroFox, enabling it to provide even more powerful external cybersecurity platform capabilities. ZeroFox is committed to AI transparency, security, and privacy of information in order to give customers the confidence that their data is secure. ZeroFox plans to responsibly release FoxGPT to opt-in customers throughout the year. About ZeroFox ZeroFox (Nasdaq: ZFOX), an enterprise software-as-a-service leader in external cybersecurity, has redefined security outside the corporate perimeter on the internet, where businesses operate, and threat actors thrive. The ZeroFox platform combines advanced AI analytics, digital risk and privacy protection, full-spectrum threat intelligence, and a robust portfolio of breach, incident and takedown response capabilities to expose and disrupt phishing and fraud campaigns, botnet exposures, credential theft, impersonations, data breaches, and physical threats that target your brands, domains, people, and assets. Join thousands of customers, including some of the largest public sector organizations as well as finance, media, technology and retail companies to stay ahead of adversaries and address the entire lifecycle of external cyber risks. ZeroFox and the ZeroFox logo are trademarks or registered trademarks of ZeroFox, Inc. and/or its affiliates in the U.S. and other countries. Visit www.zerofox.com for more information.

Read More