Top Seven Cybersecurity Trends in 2020

Securitymagazine | February 11, 2020

TÜV Rheinland  released its seventh annual report on Cybersecurity Trends for 2020. The report is a collaboration between many cybersecurity experts globally, and discusses seven key cybersecurity trends which will be important to be aware of in 2020. These include attacks on smart supply chains, threats to medical equipment and weaknesses in real-time operating systems."From our point of view, it is particularly serious that cybercrime is increasingly affecting our personal security and the stability of society as a whole," explains Petr Láhner, Business Executive Vice President for the business stream Industry Service & Cybersecurity at TÜV Rheinland. "One of the reasons for this is that digital systems are finding their way into more and more areas of our daily lives. Digitalization offers many advantages - but it is important that these systems and thus the people are safe from attacks.

Spotlight

The infographic below offers some best practice tips for safeguarding yourself against this increasingly common form of identity theft, which is tricky to detect. This infographic has been designed by Inspired eLearning, which is “dedicated to delivering the highest quality enterprise educational products that transform corporate culture.

Spotlight

The infographic below offers some best practice tips for safeguarding yourself against this increasingly common form of identity theft, which is tricky to detect. This infographic has been designed by Inspired eLearning, which is “dedicated to delivering the highest quality enterprise educational products that transform corporate culture.

Related News

DATA SECURITY, ENTERPRISE IDENTITY, SOFTWARE SECURITY

Persistent Launches Innovative Cyber Recovery Solution with Google Cloud

Persistent | October 31, 2022

Persistent Systems, a global Digital Engineering provider, today announced the launch of a trailblazing solution that enables organizations to recover more quickly from cyber-attacks. Together with Google Cloud, the Persistent Intelligent Cyber Recovery (PiCR) solution provides a comprehensive and scalable cyber recovery approach, allowing organizations to reduce data loss and minimize the negative impact to brand reputation from prolonged downtime. Persistent Intelligent Cyber Recovery is now available on the Google Cloud Marketplace. Hackers are increasing the frequency and scale of ransomware attacks. They are using continually evolving and sophisticated techniques, which makes recovery from attacks more challenging. These attacks may lead to sensitive data leakage, loss of business, and damage to brand reputation. It is crucial for organizations to not only focus on protection against cyber-attacks but also strengthen their recovery process. Traditional backup and Disaster Recovery (DR) solutions are not designed for recovery from cyber-attacks. Persistent Intelligent Cyber Recovery includes tailored recovery plans, Persistent IP for finding and remediating malware, and the optional managed services to administer the recovery process. Persistent's solution integrates with Google Cloud to provide a secure recovery environment and Google Cloud Backup and DR for protecting the server images. Persistent Intelligent Cyber Recovery offers the following benefits: Reduction in data loss Decreased risk of recurrent attacks through the removal of malware Faster recovery from ransomware and zero-day attacks (from weeks/months to hours/days) Potential cyber insurance cost reduction Scalable solution depending on enterprise size challenges Nitha Puthran, Senior Vice President – Cloud, Infrastructure and Security, Persistent: "The digital environment today is constantly evolving and so are the risks associated with it. We are leveraging our strong relationship with Google Cloud and our product engineering expertise to create an industry-leading solution that allows enterprises to recover faster from cyber-attacks, thereby reducing the impact on their business. "Persistent Intelligent Cyber Recovery combines strategic planning and the creation of playbooks, integration with Google Cloud services and our own IP to find anomalies that indicate malware, remove the malware, and use automation to set up test and production environments to scale. It takes a services and product mindset to create a solution like Persistent Intelligent Cyber Recovery and Persistent is uniquely positioned in the market to deliver both." Dai Vu, Managing Director, Marketplace and ISV GTM Programs, Google: "As cyber threats become more prevalent, customers need solutions that can help them quickly address and recover from cyber-attacks. With the Persistent's Intelligent Cyber Recovery (PiCR) solution available on Google Cloud Marketplace, customers can quickly deploy PiCR to their Google Cloud environment and utilize it alongside Google Cloud technologies and capabilities to address cyber-attacks quickly and securely."

Read More

ENTERPRISE SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Swimlane Launches First Comprehensive Security Automation Ecosystem for OT Environments

Swimlane | November 15, 2022

Swimlane, the low-code security automation company, today announced the formation of the first operational technology (OT) security automation solution ecosystem tailored to meet the combined OT and IT security requirements within critical infrastructure environments. The Biden Administration designated November as Critical Infrastructure Security and Resilience Month, drawing attention to the need for “fortifying our information technology and cybersecurity across sectors.” As cyber threats grow in frequency and severity, security operations teams within industrial organizations are regularly targeted due to the importance of their systems and infrastructure. Given the limited resources at their disposal, security teams within these organizations are struggling to keep up with rapidly evolving threats. The cybersecurity skills gap poses a particularly difficult challenge for organizations with OT environments due to the unique skill set required to navigate the convergence of OT and IT technologies. This is where modern Security Orchestration, Automation and Response (SOAR) plays an instrumental role. “Our public utilities and critical infrastructure face unique cybersecurity challenges to detect and respond to the convergence of threats targeting their combined OT and IT environments, and cyber-physical systems. “Swimlane is bringing together the best of OT security with our extensible security automation platform to create a robust system of record and control for security operations teams to more quickly process large amounts of security telemetry without needing more resources to defend against breaches.” Cody Cornell Co-founder and Chief Strategy Officer of Swimlane Swimlane’s security automation ecosystem for OT environments currently includes the following: Nozomi Networks for OT and IoT Security: Swimlane and Nozomi Networks, the leader in OT and IoT security, also announced today a technology integration that combines low-code security automation with OT and Internet of Things (IoT) security. The combined solution makes it possible for industrial and critical infrastructure security operations to maintain continuous asset compliance and mitigate the risks of attacks from combined OT and IT entry points. Dataminr Tackles Physical Risk: Swimlane’s integration with Dataminr leverages automated processes to mitigate risks and warn at-risk employees as soon as possible to ensure their safety. The cyber-physical threat response solution saves organizations crucial minutes when connecting with staff members who might be affected by a natural disaster, accident, or social unrest, or other types of physical risk. 1898 & Co. for Managed Threat Detection: 1898 & Co., a preeminent industrial control system (ICS) cybersecurity solutions provider, has selected Swimlane as the core automation platform for their managed threat detection services. These services include the detection of both OT and IT-born threats, machine-speed threat validation and scoring, and rapid remediation of threats using OT response methods. “Security teams chartered with protecting OT environments are struggling to keep pace with emerging threats given their limited resources,” said Joshua Magady, Practice Technical Lead at 1898 & Co. “As cyberattacks on critical infrastructure continue to rise and the cybersecurity skills shortage prevails, we are excited to be working with Swimlane to provide automation solutions that give these important organizations the tools to defend against rising cyber threats effectively.” Working with each technology partner, Swimlane will develop a portfolio of pre-integrated solutions that customers can quickly deploy either through managed services or add to their existing environment. About Swimlane Swimlane is the leader in cloud-scale, low-code security automation. Swimlane unifies security operations in-and-beyond the SOC into a single system of record that helps overcome process and data fatigue, chronic staffing shortages, and quantifying business value. The Swimlane Turbine platform combines human and machine data into actionable intelligence for security leaders.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Application & Cloud Security Leader Chooses DTEX InTERCEPT to Manage Insider Risk and Prevent Data Loss

DTEX Systems | December 21, 2022

DTEX Systems, the Workforce Cyber Intelligence & Security Company™, today announced that one of the world’s leading application performance and cloud security vendors has selected DTEX InTERCEPT to secure patents, protect business process innovation, and prevent data loss. DTEX InTERCEPT™ is a first-of-its-kind Workforce Cyber Security solution that brings together the capabilities of Insider Threat Management, User and Entity Behavior Analytics, Digital Forensics, and Zero Trust DLP in an all-in-one lightweight, cloud-native platform. Only DTEX InTERCEPT delivers the behavioral context and activity intelligence that answers the Who, What, When, Where, Why, and How related to any potential insider threat situation, compromised account event or data loss scenario without invading personal privacy. In the face of changing global economic conditions, the increasing risk of corporate espionage, and a pending corporate reduction in force action, the application performance and cloud security vendor prioritized an immediate review of existing insider risk and data loss prevention technology. The vendor’s legal team was heavily involved in the RFP and vendor evaluation processes to ensure employee privacy would be protected as part of the adoption of any insider risk and data loss prevention solution in compliance with the European Union’s GDPR and California’s Privacy Rights Act (CPRA). After exhaustive review of DTEX InTERCEPT’s patented metadata collection model, the vendor’s legal, IT and, cyber security teams selected DTEX to replace its existing first-generation insider risk and data loss prevention solutions globally. DTEX InTERCEPT’s seamless integration with the application performance and cloud security vendor’s NGAV system, as well as its innovative Zero Trust approach to data loss prevention were also deciding factors in the enterprises choice to standardize on DTEX InTERCEPT across all enterprise workstations and servers. Upon selection, a senior cyber security executive said, “DTEX is a proven solution that won’t break our systems.” “It is incredibly gratifying to have our insider risk and data loss prevention technology chosen by a fellow cyber security vendor. In this case, it was again the uniqueness of our data set and ability to keep employee data private, while delivering dynamic, contextual human behavior visibility that was the deciding factor in the customer’s decision. “Likewise, a peer’s decision to adopt our technology makes a strong statement that traditional solutions focused on machine intelligence are insufficient to protect data in today’s distributed workforce reality. The difference is most definitely human.” Bahman Mahbod, CEO at DTEX Systems About DTEX Systems DTEX Systems helps hundreds of organizations worldwide better understand their workforce, protect their data, and make human-centric operational investments. Its Workforce Cyber Intelligence & Security platform brings together next-generation Zero Trust DLP, UEBA, digital forensics, user activity monitoring and insider threat management in one scalable, cloud-native platform. Through its patented and privacy-compliant meta-data collection and analytics engine, the DTEX platform surfaces abnormal behavioral “indicators of intent” to mitigate risk of data and IP loss, enabling SOC enrichment with human sensors and empowering enterprises to make smarter business decisions quickly.

Read More