DATA SECURITY

The Chubb Index highlights the importance of taking more protective steps against cyber attacks by the professional services industry

prnewswire | November 24, 2020

In the most recent version of the Chubb Cyber InFocus Report, Chubb information uncovers that the expert administrations industry need to take more proactive and defensive measures against potential digital assaults. Chubb has seen a 10% expansion in digital occurrences identifying with proficient administrations organizations. These are generally email-driven associations, which means there are numerous open doors for workers to tap on noxious connections, driven by email phishing.

"Most cyber attacks are coming from outside the company, leaving businesses at greater risk in the current work-from-home environment," said William A. Wise, Head of Chubb Cyber North America. "Due to the rise in incidents resulting from email phishing, employers with remote employees need to take additional steps to protect their companies against cyber threats."

For example, companies should use multifactor authentication for protected data and to keep software and applications up-to-date.

In addition to highlighting risks within the professional services industry, the latest Cyber InFocus report also examines:

Changes in cyber vulnerability by industry since 2016.
Breach sources over the last four years showing an increase in threats by external actors, including malware attacks.
Cyber crime examples in the most vulnerable industries, how they were exposed and what was learned in the process.

"As cyber incidents continue to evolve in complexity and focus, it's critically important that companies understand how cyber-and privacy-related incidents affect their organizations," added Anthony Dolce, Vice President, Cyber Lead, Chubb North America Financial Lines Claims. "The Cyber InFocus Report is a timely tool to help agents, brokers and companies understand the latest trends on cyber threats, helping to prevent issues from happening in the first place."

Chubb's Cyber InFocus report, which previously dispatched in mid 2018, gives experiences into the impacts of digital dangers and patterns on explicit enterprises or business portions each quarter. Such knowledge depends on Chubb's utilization of outsider exploration, just as exclusive cases information from over twenty years of protecting associations against developing digital dangers.
About Chubb Cyber:
Chubb is a leader in insuring cyber risk. Combining industry-leading underwriting and expert third-party incident response services, Chubb offers policies that are tailored to the specific needs and risks of its clients to ensure they are ready with the tools and expertise necessary should a cyber incident occur. Moving swiftly to connect clients with the proper parties to minimize data loss is only part of what Chubb delivers. Keeping an eye on the ever-evolving cyber security landscape, Chubb looks for ways to do more for its clients by offering cutting-edge products and holistic services to every client.

About Chubb
With operations in 54 countries and territories, Chubb provides commercial and personal property and casualty insurance, personal accident and supplemental health insurance, reinsurance and life insurance to a diverse group of clients. As an underwriting company, we assess, assume and manage risk with insight and discipline. We service and pay our claims fairly. The company is also defined by its extensive product and service offerings, broad distribution capabilities, exceptional financial strength and local operations globally. Parent company Chubb Limited is listed on the New York Stock Exchange (NYSE: CB) and is a component of the S&P 500 index. Chubb maintains executive offices in Zurich, New York, London, Paris and other locations, and employs approximately 33,000 people worldwide.

Spotlight

Employees are often the weakest link in your company's security chain. But with a little knowledge and foresight you can mitigate the risks. In this video, CIO.com senior writer Sharon Florentine explains the anatomy of a phishing scam and how you and your workers can avoid becoming a victim.

Spotlight

Employees are often the weakest link in your company's security chain. But with a little knowledge and foresight you can mitigate the risks. In this video, CIO.com senior writer Sharon Florentine explains the anatomy of a phishing scam and how you and your workers can avoid becoming a victim.

Related News

DATA SECURITY

The latest release of Cyber Observer provides new visibility into the risk posture of cybersecurity

businesswire | January 19, 2021

Digital Observer, the chief Continuous Controls Monitoring (CCM) arrangement, today declared a significant upgrade to its foundation that empowers CISOs and other security and danger the board heads to acquire new, constant, bound together perceivability into the viability of online protection instruments that are executed all through their endeavor. By ceaselessly recovering and examining Critical Security Controls (CSCs) from applications on-premises and in-cloud, Cyber Observer's CCM stage improves consistence, lessens mean opportunity to location and reaction, and advances hazard act the executives. Network protection groups are overpowered with multifaceted nature of overseeing many unique security apparatuses that have been executed across their mixture ventures. In spite of best endeavors to actualize security controls to limit dangers and dangers, venture heads are finding that misconfigured or failing apparatuses are time after time a vulnerable side and probably the most fragile connection in their security guards. Digital Observer's CCM stage disposes of this issue and now empowers ventures to keep a finger on the beat of how their security instruments are performing. Digital Observer associates and pulls information from a venture's on-premises and in-cloud apparatuses to make a complete perspective on the security instruments executed. Notwithstanding persistently examining in excess of 5,000 CSCs and giving controls status with regards to the executives, consistence prerequisites and different structures, Cyber Observer delivered a bunch of new highlights, including: Ongoing dashboards. Effectively show the status of each apparatus, status of the distinctive security regions, organize weaknesses, total danger act scoring, and alarm on deviation from ordinary conduct. Nonstop revealing. New announcing module robotizes gives an account of an association's network safety instruments status and digital stance sees. Open API upgrades. Empower endeavors to effortlessly share information gathered by Cyber Observer with outsider devices that give security data and occasion the executives (SIEM), mechanization (SOAR), and man-made consciousness. “Managing risks requires more than implementing security tools and checking the box,” said Shimon Becker, Cyber Observer Co-founder and VP Product. “It requires continuous monitoring, management, and oversight to ensure that people, processes, and technology are in fact protecting your data and your enterprise.” “The new release offers quick and easy remote implementation,” said Moti Ram, Cyber Observer Co-founder and VP R&D. “We support hybrid on-premises and in-cloud connectivity and deployment.” Cyber Observer is backed by Merlin Ventures, which strategically invests in and scales innovative cybersecurity companies. “Things like misconfigured or unpatched security tools are such easy targets for adversaries to exploit,” stated Seth Spergel, Vice President of Emerging Technology at Merlin Ventures. “Implementing a simple solution like Cyber Observer's Continuous Controls Monitoring platform should really be a part of any organization’s cyber hygiene protocol and a standard practice for all enterprises.” About Cyber Observer Cyber Observer is the premier Continuous Controls Monitoring (CCM) solution that reduces business losses and audit costs by continuously monitoring and auditing critical security controls and applications. The Cyber Observer platform integrates dozens of the most popular security tools into a single interface, enabling security and risk management executives to monitor tool performance in alignment with cybersecurity, business, and regulatory frameworks. This equips security and risk management executives with unprecedented visibility, control, and strategic oversight that empowers security and risk executives to proactively identify and close critical security gaps while demonstrating the effectiveness and maturity of their security programs and investments. About Merlin Ventures Merlin Ventures is a strategic investment firm that rapidly scales visionary companies and introduces disruptive solutions designed to help enterprises address today’s most critical cybersecurity challenges. Merlin Ventures’ unique business model combines robust infrastructure and capital, onboarding and market readiness acceleration, cybersecurity engineering leadership, and deep-rooted customer and market relationships to enable its portfolio of cybersecurity companies to accelerate growth and flourish.

Read More

DATA SECURITY

NETSCOUT Announces Availability of Omnis Cyber Intelligence

NETSCOUT | November 08, 2021

NETSCOUT SYSTEMS, INC.a leading provider of cybersecurity, service assurance, and business analytics solutions, today announced the availability of Omnis® Cyber Intelligence (OCI), the industry's fastest and most scalable network security software solution, built on the foundation of the industry's most prominent network monitoring and packet recording and analysis technology. It uniquely detects and investigates suspicious activities in real-time and retrospectively, identifies threats early in the attack life cycle to prevent infections from spreading, stops future attacks, and identifies compromised assets. With cyberattacks increasing and breaches making front-page news, IT security teams find that their existing tools are no match for this growing threat, and both their expenses and their cyber risk are growing out of control. This is the case because the typical data sets feeding these tools are reactive, not granular, and do not extend to the earliest indications of a potential attack. NETSCOUT's approach to turn the situation around is to leverage its market-leading visibility technology to increase the range and depth of security intelligence and make it accessible to security teams in real-time. The solution consists of an analytics stack and cyber security software sensors called Omnis CyberStreams. NETSCOUT's Omnis Cyber Intelligence arms security teams with proactive, actionable intelligence helping them to: Perform continuous scanning and analysis for reconnaissance to detect attacks earlier, minimizing exposure and, in many cases, thwarting the threat. Rapidly access high-resolution historical evidence far back in time to understand how an attack started to prevent similar breaches and stop ongoing malicious activity. Monitor exposed attack surfaces within their infrastructure to optimize the effectiveness of the defenses deployed. Evaluate the extent of penetration and impacted assets when attacks occur to prevent malware from spreading. Deploy on-premises, in virtualized data centers, and the public cloud, supporting an organization's evolving deployment preferences without impacting security governance and workflows. Integrate with their security ecosystem through APIs and partnerships with leading vendors such as Splunk, Palo Alto Networks, and AWS. As a result, the effectiveness of customers' existing security tools and the productivity of analysts improve, and they can get ahead of the vicious cycle of both rising costs and rising cyber risk. "NETSCOUT's unique ASI technology allows companies to truly unlock the actionable intelligence embedded in network transactions and packets,Where others have failed, NETSCOUT has made the use of packet data fast and affordable with their patented metadata extraction, intelligent reduction, and indexing. Omnis Cyber Intelligence provides security analysts with the information they need to quickly and accurately assess the scope and scale of an incident and reduce the associated risk and negative impact." Christopher Kissel, research director, security and trust products, IDC "Enterprises have invested heavily in cybersecurity solutions, but they are largely ineffective because they lack the actionable visibility needed to spot attacks before they have broad impact," stated Sanjay Munshi, vice president, product management, NETSCOUT. "As attack surfaces expand, the Omnis Cyber Intelligence solution extends throughout the infrastructure, integrates into existing ecosystems, and becomes part of the growing movement towards XDR, using meaningful metadata, or smart data, and powerful cyber analytics to quickly get to the root cause of the cybersecurity issue and mitigate risk." About NETSCOUT NETSCOUT SYSTEMS, INC. helps assure digital business services against security, availability, and performance disruptions. Our market and technology leadership stems from combining our patented smart data technology with smart analytics. We provide real-time, pervasive visibility and insights customers need to accelerate and secure their digital transformation. Omnis® Cyber Intelligence delivers the fastest and most scalable network security solution available on the market. NETSCOUT nGenius® service assurance solutions provide real-time, contextual analysis of service, network, and application performance. And Arbor® Smart DDoS Protection by NETSCOUT products help protect against attacks that threaten availability and advanced threats that infiltrate networks to steal critical business assets.

Read More

SOFTWARE SECURITY

Cybersecurity Startup ActZero Announces Partnership with Tech Data

ActZero | August 28, 2021

ActZero, a cybersecurity startup whose AI-driven managed detection and response (MDR) platform makes best-in-class security accessible for businesses of all sizes, today announced a strategic partnership with Tech Data, one of the world's largest technology distributors and solutions aggregators. Together, ActZero and Tech Data aim to help organizations accurately detect, learn from, and prevent emerging security threats. The ActZero platform combines next-generation antivirus protection, endpoint detection and response (EDR), and 24/7 automated and managed threat hunting capabilities, enabled by a purpose-built AI engine, delivered through its single, cost-effective solution. As a result, ActZero detects and prevents all types of threats, from commodity malware to sophisticated attacks, all in sub-second responses. The partnership will accelerate adoption of ActZero's novel security platform as part of the Tech Data edge-to-cloud portfolio and broaden access to superior security for small and mid-size businesses through the IT distributor and solutions aggregator's global footprint. In addition, this scale helps unlock powerful network effects that enrich ActZero's machine learning engines and improve its ability to detect and contain threats. "We're excited to roll out this partnership," said John Nurczynski, co-founder and Head of the Summit partnership program at ActZero. "Our goal is to democratize cybersecurity for small and mid-size businesses, and Tech Data's well known distribution platform and industry-leading security expertise unlocks the ability to get ActZero's superior approach in the hands of more companies." "With year-over-year cybercrime statistics increasing exponentially, making smart investments in security solutions is a no-brainer for businesses grappling with how to handle malware, ransomware and proliferating cyber threats," said Tracy Holtz, vice president of security solutions at Tech Data. "Adding cybersecurity innovators like ActZero to our portfolio of solutions arms Tech Data customers with critical online security tools so the businesses they serve – especially small and mid-sized companies – are equipped to protect from edge to cloud." ABOUT ACTZERO ActZero is a cybersecurity startup that makes small- and mid-size businesses more secure by empowering teams to cover more ground with fewer internal resources. Our intelligent managed detection and response service provides 24/7 monitoring, protection and response support that goes well beyond other third-party software solutions. Our teams of data scientists leverage cutting-edge technologies like AI and ML to scale resources, identify vulnerabilities and eliminate more threats in less time.

Read More