DATA SECURITY

To prevent cyber attacks caused by compromised passwords, Enzoic and OneLogin partner

businesswire | November 18, 2020

Enzoic, a main supplier of bargained certification screening arrangements, today reported an association with OneLogin, a cloud-based character and access the board supplier. The joint effort will see Enzoic's qualifications screening administration incorporated into OneLogin's SmartFactor Authentication item, guaranteeing that accreditations uncovered in an earlier break can't be utilized.

Verizon's 2020 Data Breach Investigations Report distinguished that taken certifications are associated with 29 percent of information breaks and that 80% of hacking-related penetrates include bargained and feeble qualifications. These discoveries underscore that forestalling the utilization of uncovered qualifications is basic to diminish the probability of an effective assault.

The Enzoic and OneLogin association is intended to dispose of the danger of bargained accreditations. Through the arrangement, OneLogin will coordinate Enzoic's API so that each time a client makes a secret phrase, it will naturally be screened against Enzoic's live information base of different billions of uncovered username and secret phrase mixes. On the off chance that the qualifications are uncovered, it will request that the client make another exceptional secret phrase. This altogether decreases the danger of fruitful accreditation stuffing, account takeover or different types of information break occurring without adding superfluous contact.

“Preventing the use of exposed credentials is the key to shoring up password vulnerabilities,” said Josh Horwitz, COO, Enzoic. “As the number of breaches and cyber attacks show no sign of abating, it's critical that organizations take steps to protect against this threat by screening credentials. We are excited to partner with OneLogin to deliver this peace of mind to its customers that use SmartFactor Authentication."

“Cybersecurity threats are a part of our digital world,” said Venkat Sathyamurthy, Chief Product Officer OneLogin.“By integrating Enzoic’s intelligent technology, we’re preventing our users from inadvertently deploying credentials that have already been breached and exposed on the Dark Web. As a result, the risk of account takeover from compromised credentials is reduced while ensuring that the authentication process remains smooth for our customers.”

About Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection. Organizations can use Enzoic solutions to screen customer and employee accounts for exposed username and password combinations to identity accounts at risk and mitigate unauthorized access. Enzoic is a profitable, privately held company in Colorado.


About OneLogin
OneLogin is the number one value-leader in Identity and Access Management. Our Trusted Experience Platform provides everything you need to secure your workforce, customers, and partners at a price that works with your budget. Headquartered in San Francisco, OneLogin secures over 2,500 customers worldwide, including Airbus, Stitch Fix, and AAA.

Spotlight

At Adobe®, we take the security of your digital experience and assets seriously. Security practices are integrated into our internal software development processes, operations, and tools. Our cross-functional incident response teams are proactive and nimble in preventing, detecting, and responding to incidents. Furthermore, our collaborative work with partners, leading researchers, and other industry organizations helps us stay updated with the latest threats, vulnerabilities, and security best practices; thereby enabling us to continually build security into the products and services we offer and regularly incorporate advanced security techniques into our product and service offerings.

Spotlight

At Adobe®, we take the security of your digital experience and assets seriously. Security practices are integrated into our internal software development processes, operations, and tools. Our cross-functional incident response teams are proactive and nimble in preventing, detecting, and responding to incidents. Furthermore, our collaborative work with partners, leading researchers, and other industry organizations helps us stay updated with the latest threats, vulnerabilities, and security best practices; thereby enabling us to continually build security into the products and services we offer and regularly incorporate advanced security techniques into our product and service offerings.

Related News

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Application & Cloud Security Leader Chooses DTEX InTERCEPT to Manage Insider Risk and Prevent Data Loss

DTEX Systems | December 21, 2022

DTEX Systems, the Workforce Cyber Intelligence & Security Company™, today announced that one of the world’s leading application performance and cloud security vendors has selected DTEX InTERCEPT to secure patents, protect business process innovation, and prevent data loss. DTEX InTERCEPT™ is a first-of-its-kind Workforce Cyber Security solution that brings together the capabilities of Insider Threat Management, User and Entity Behavior Analytics, Digital Forensics, and Zero Trust DLP in an all-in-one lightweight, cloud-native platform. Only DTEX InTERCEPT delivers the behavioral context and activity intelligence that answers the Who, What, When, Where, Why, and How related to any potential insider threat situation, compromised account event or data loss scenario without invading personal privacy. In the face of changing global economic conditions, the increasing risk of corporate espionage, and a pending corporate reduction in force action, the application performance and cloud security vendor prioritized an immediate review of existing insider risk and data loss prevention technology. The vendor’s legal team was heavily involved in the RFP and vendor evaluation processes to ensure employee privacy would be protected as part of the adoption of any insider risk and data loss prevention solution in compliance with the European Union’s GDPR and California’s Privacy Rights Act (CPRA). After exhaustive review of DTEX InTERCEPT’s patented metadata collection model, the vendor’s legal, IT and, cyber security teams selected DTEX to replace its existing first-generation insider risk and data loss prevention solutions globally. DTEX InTERCEPT’s seamless integration with the application performance and cloud security vendor’s NGAV system, as well as its innovative Zero Trust approach to data loss prevention were also deciding factors in the enterprises choice to standardize on DTEX InTERCEPT across all enterprise workstations and servers. Upon selection, a senior cyber security executive said, “DTEX is a proven solution that won’t break our systems.” “It is incredibly gratifying to have our insider risk and data loss prevention technology chosen by a fellow cyber security vendor. In this case, it was again the uniqueness of our data set and ability to keep employee data private, while delivering dynamic, contextual human behavior visibility that was the deciding factor in the customer’s decision. “Likewise, a peer’s decision to adopt our technology makes a strong statement that traditional solutions focused on machine intelligence are insufficient to protect data in today’s distributed workforce reality. The difference is most definitely human.” Bahman Mahbod, CEO at DTEX Systems About DTEX Systems DTEX Systems helps hundreds of organizations worldwide better understand their workforce, protect their data, and make human-centric operational investments. Its Workforce Cyber Intelligence & Security platform brings together next-generation Zero Trust DLP, UEBA, digital forensics, user activity monitoring and insider threat management in one scalable, cloud-native platform. Through its patented and privacy-compliant meta-data collection and analytics engine, the DTEX platform surfaces abnormal behavioral “indicators of intent” to mitigate risk of data and IP loss, enabling SOC enrichment with human sensors and empowering enterprises to make smarter business decisions quickly.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Datadog Announces Integration with Amazon Security Lake

Datadog | November 30, 2022

Datadog, Inc., the monitoring and security platform for cloud applications, today announced a new integration with Amazon Security Lake. The integration, announced during AWS re:Invent, makes it easy for Amazon Security Lake users to send cloud security logs to Datadog in a standard format. Building data pipelines in order to aggregate and route security logs to various security analytics solutions can be a cumbersome and time-consuming process. For Amazon Security Lake customers, Datadog's integration provides an easy way to send security logs to Datadog with minimal configuration required. Once security logs are ingested into Datadog, customers can analyze and identify threats through out-of-the-box detection rules or by writing custom security rules. They can also do deeper investigations using Datadog's log management tools. "Amazon Security Lake makes it easier for teams to manage their cloud security data and analyze it with partner solutions of their choice," said Rod Wallace, General Manager for Amazon Security Lake. "Datadog's integration with Amazon Security Lake will allow customers to collect their security logs to improve their cybersecurity posture and send them to Datadog for analysis leveraging an open source schema." "Security threat detection and investigation is dependent on an effective logging strategy that ensures critical logs are being properly analyzed. However, managing dozens of log integrations from cloud-hosted accounts and entities can be cumbersome and lead to gaps in visibility. "Amazon Security Lake and Datadog are working together to provide an easy way to set up and manage important log integrations for Datadog Cloud SIEM, giving customers deep visibility into their most critical infrastructure." Pierre Betouin, SVP of Security Products at Datadog About Datadog Datadog is the monitoring and security platform for cloud applications. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

BlueVoyant Research Reveals Defending Digital Supply Chains Remains a Business Challenge

BlueVoyant | November 14, 2022

BlueVoyant, an industry-leading cyber defense company that combines internal and external cybersecurity, today released the findings of its third annual global survey into supply chain cyber risk management. The study reveals that 98% of firms surveyed have been negatively impacted by a cybersecurity breach that occurred in their supply chain. This is up slightly from 97% of respondents last year. Digital supply chains are made of the external vendors and suppliers who have network access that could be compromised. "The survey shows that supply chain cybersecurity risk has not decreased and, in fact, more enterprises than ever have reported being negatively impacted by a cybersecurity disturbance in their supply chain," said Adam Bixler, BlueVoyant's global head of supply chain defense. "The good news is that across industries and regions, organizations are making supply chain defense a priority, but these organizations need to better monitor suppliers and work with them to remediate issues to reduce their supply chain risk." Other key survey findings include: 40% of respondents rely on the third-party vendor or supplier to ensure adequate security. In 2021, 53% of companies said they audited or reported on supplier security more than twice per year; that number has improved to 67% in 2022. These numbers include enterprises monitoring in real time. Budgets from supply chain defense are increasing, with 84% of respondents saying their budget has increased in the past 12 months. The top pain points reported are internal understanding across the enterprise that suppliers are part of their cybersecurity posture, meeting regulatory requirements, and working with suppliers to improve their security. "While supply chain defense is a challenge, there are solutions for enterprises to better defend against this risk," said James Rosenthal, BlueVoyant's CEO and co-founder. "Enterprises should continuously monitor their supply chain to be able to quickly remediate threats. As companies are being negatively impacted by supply chain disturbances, they must prioritize this risk with the appropriate budget." The study was conducted by independent research organization, Opinion Matters, and recorded the views and experiences of 2,100 chief technology officers (CTOs), chief security officers (CSOs), chief operating officers (COOs), chief information officers (CIOs), chief info security officers (CISOs), and chief procurement officers (CPOs) responsible for supply chain and cyber risk management in organizations with more than 1,000 employees across a range of industries. These include: business services, financial services, healthcare and pharmaceutical, manufacturing, utilities and energy, and defense. It covered 11 countries: U.S., Canada, Germany, Austria, Switzerland, France, the Netherlands, the United Kingdom, Australia, the Philippines, and Singapore. The 2021 research was also conducted by Opinion Matters and recorded the views and experiences of 1,200 CTOs/CSOs/COOs/CIOs/CISOs/CPOs in similar enterprises and the same industries. It covered six countries: U.S., Canada, Germany, the Netherlands, the U.K., and Singapore. Analysis of the responses from different commercial sectors revealed considerable variations in their experiences of supply chain risk: While healthcare and pharmaceutical was the third-highest vertical in terms of experiencing greater board scrutiny for supply chain risk at 42%, the sector also indicates the lowest likelihood to increase budget for external resources to bolster supply chain cybersecurity, by a margin of 7% below the next closest vertical. This sector is also the least likely of any vertical (34%) to have no way of knowing if an issue arises with a third party's environment. The energy sector was most likely to report negative impact from at least one supply chain breach in the last year (99%) but 49% are monitoring supply chain cyber risk regularly or in real time, and 44% are updating senior leadership monthly or more frequently. In addition, energy companies say they are increasing their budget for supply chain cyber risk by an average of 60%. In manufacturing, 64% of respondents say that supply chain cyber risk is on their radar and 44% say they have established an integrated enterprise risk management program. About BlueVoyant BlueVoyant combines internal and external cyber defense capabilities into an outcomes-based platform called BlueVoyant Elements™. Elements is cloud-native and continuously monitors your network, endpoints, attack surface, and supply chain plus the clear, deep, and dark web for vulnerabilities, risks, and threats; and takes action to protect your business, leveraging both machine learning-driven automation and human-led expertise. Elements can be deployed as independent solutions or together as a full-spectrum cyber defense platform. BlueVoyant's approach to cyber defense revolves around three key pillars — technology, telemetry, and talent — that deliver industry-leading cybersecurity to more than 700 clients across the globe.

Read More