DATA SECURITY

Use NetSPI's New Ransomware Attack SimulationTo Improve Ransomware Attack Resiliency

NetSPI | June 18, 2021

The leader in attack surface management and enterprise penetration testing, NetSPI,  has announced its new service for ransomware attack simulation., In collaboration with its ransomware security experts, the new service enables organizations to emulate ransomware families of real-world to find and fix dangerous susceptibilities in their defenses for cybersecurity.

Major cybersecurity gaps were exposed globally in the recent ransomware attacks. The Biden administration in the U.S. urges all business leaders to take enough precautions to get away from ransomware. Deputy national security advisor for emerging and cyber technology, Anne Neuberger, recommends various companies in a recent memo to use third-party pentester to test the security of the systems and the ability to defend a sophisticated cyber-attack effectively.

NetSPI closely collaborates during a ransomware attack simulation engagement with companies to simulate sophisticated ransomware techniques, tactics, and procedures (TTPs) utilizing its tailor-made technology for breach and attack simulation. Following each engagement, organizations get access to NetSPI's technology to run custom plays independently and unceasingly assess how well their cybersecurity platform will hold up to a ransomware attack.

About NetSPI

NetSPI, the leader in attack surface management and enterprise security testing, has a partnership with the most significant global cloud providers, nine of the top 10 U.S. banks, many of the Fortune® 500, and three of the world's five largest healthcare companies. NetSPI experts perform deep dive manual penetration testing of network, application, and cloud occurrence surfaces, historically testing over 1 million resources to find 4 million specific vulnerabilities. NetSPI is headquartered in Minneapolis, MN, and is a portfolio company of private equity firms Sunstone Partners, KKR, and Ten Eleven Ventures.

Spotlight

HIPAA security and privacy requirements are nothing new to healthcare - they have been part of doing business for years now. But the HITECH act, introduced in 2009, significantly raised the stakes. Learn about 9 solutions that can prepare you before any HIPAA audit occurs - without impacting your end users.

Spotlight

HIPAA security and privacy requirements are nothing new to healthcare - they have been part of doing business for years now. But the HITECH act, introduced in 2009, significantly raised the stakes. Learn about 9 solutions that can prepare you before any HIPAA audit occurs - without impacting your end users.

Related News

DATA SECURITY

Deloitte to Acquire Digital Terbium Labs, Risk Protection Solution Provider, to Expand its Offerings towards Threat Intelligence

Deloitte | June 21, 2021

Deloitte has announced its acquisition of assets of Terbium Labs, a Baltimore-based digital risk protection company. Terbium Labs helps organizations detect and remediate data theft, exposure, or misuse across the digital landscape. All services and solutions of Terbium Labs will join the cyber practice of Deloitte in its Detect & Respond operation services. These services by Terbium Labs include a platform for digital risk protection for leveraging artificial intelligence and patented data fingerprinting technologies and machine learning for identifying illicit use of sensitive online data. Including Terbium Labs, in 2021, it is the third cyber acquisition of Deloitte. It has previously acquired Root9B, LLC (R9B), a cyber-threat hunting provider, and CloudQuest, a cloud security posture management provider. Deloitte demonstrates its commitment to aiding global clients in managing all the cyber threats in running the businesses smoothly in all digital platforms through these acquisitions. According to Deloitte & Touche LLP’s Deloitte Risk & Financial Advisory's infrastructure solution leader and principal, Kieran Norton, finding complex or exclusive data once it leaves an establishment's limit can be exceptionally challenging. Advanced online threat intelligence, paired with remediation of data risk disclosure, needs a balance of progressive technology, a keen understanding of monitoring compliance, and acceptable alteration with an establishment's commercial needs and risk outline. Adding to it, Deborah Golden, Deloitte & Touche LLP’s Deloitte Financial and Risk Advisory Cyber and Strategic Risk leader and the principal said that their industry-leading cyber practice is dedicated to providing our customers with novel and ground-breaking ways to alter their cyber risk postures as they endeavor to reinforce their conviction equity, flexibility, and safety.

Read More

DATA SECURITY

Arctic Wolf Security Operations Cloud Reaches Massive Scale and a Global Footprint

Arctic Wolf | November 09, 2021

-Arctic Wolf®, a leader in security operations, today announced the global expansion of its industry-leading cloud-native platform, the Arctic Wolf Security Operations Cloud, to provide customers and partners with unified visibility, protection, and automation, through a growing number of technical integrations. With the establishment of a European Security Operations Center (SOC) in Frankfurt, Germany, Arctic Wolf customers in any location, will have full flexibility in how their native security solution data is stored and accessed to aid in their compliance with local and international data governance regulations. Built on an open XDR architecture, the Arctic Wolf Security Operations Cloud has scaled to ingest, parse, enrich, and analyze over 1.6 trillion security events and 1.3 petabytes of data each week from over one million licensed users at 2,000 global customers. By leveraging machine learning and artificial intelligence the Arctic Wolf Security Operations Cloud now processes events at an equivalent or greater rate than that of other market-defining cloud platforms. This momentum is driven by a strong uptick in demand for the technology in the enterprise market, demonstrated by Arctic Wolf’s 510% year-over-year large enterprise ARR growth in the first quarter of the fiscal year. Unlike the rest of the industry that is just now starting to parse solutions to integrate data from multiple attack surfaces, Arctic Wolf’s platform was built from day one on a cloud-native architecture that seamlessly ingests data from endpoint, network, identity, and cloud sources to deliver automated threat detection and response at scale. This unification of an organization’s security data ensures only verified security incidents are escalated to customers, effectively eliminating alert fatigue, and ensuring internal security resources have the time needed to focus on hardening their overall security posture. Powering Security Operations at a Global Scale To further support Arctic Wolf’s ongoing global expansion, the company has leveraged the scalability and extensibility of the AWS public cloud infrastructure, providing new customers the ability to have their native security solution data hosted within the Arctic Wolf Security Operations Cloud in their choice of the United States, Germany, or Canada. With five SOCs spread across North America and Europe, as well as a growing team of remote security analysts, organizations within Arctic Wolf’s global customer base can have confidence that the Arctic Wolf Concierge Delivery Model aligns with the needs of their compliance requirements on their security journey to end cyber risk. Delivering Critical Outcomes Across the Entire Security Operations Framework The massive growth in the power and scale of the Arctic Wolf Security Operations Cloud has been pushed by explosive market demand for security operations, which has resulted in the company doubling its sales for eight consecutive years and achieving a $4.3B valuation as part of a $150M Series F funding round in July. In addition to the business expansion driving the momentum of its cloud-native platform, Arctic Wolf has also made aggressive investments in ecosystem integrations, resulting in the Arctic Wolf Security Operations Cloud adding support for dozens of new security data sources over the last year. Arctic Wolf’s universal and unlimited approach to data ingestion allows customers to gain visibility and control over historically disparate security solutions, while removing the need for security leaders to choose which data sources are important or cost-effective to monitor. Supporting Quotes: “While every other aspect of the modern technology stack has a category-defining platform —think Salesforce, ServiceNow, and Workday— no one in cybersecurity has managed to unify the market and produce a true platform that serves all security operations use cases for midsize and enterprise customers,The Arctic Wolf Security Operations Cloud delivers exactly that – the unified security operations experience that owns the outcome for the customer, and our new global footprint makes it easier than ever for organizations to have full control over where their native security solution data is stored.” Nick Schneider, president and chief executive officer of Arctic Wolf “Accelerated digital transformation and the shift to cloud-based solutions require organizations to rethink data protection strategies and upscale their data security infrastructures to meet the ever-evolving privacy and data compliance landscape,” said Duncan Brown, vice president, European Enterprise Research, IDC. “This trend is global in nature and in Europe, in particular, we are seeing a rapid movement to adopt cloud environments. The vendors who will lead the market in that change will need to demonstrate a proven track record in delivering a mature, global cloud model that meets data sovereignty requirements without compromising speed and scalability.” With the Security Operations Cloud, Arctic Wolf is the first to deliver a cloud-based platform that gives organizations the protection, resilience, and guidance they need to defend against cyber threats, including Managed Detection and Response (MDR), Managed Risk, Cloud Security Posture Management (CSPM), and Managed Security Awareness —each delivered by the unique concierge delivery model. About Arctic Wolf: Arctic Wolf® is a global leader in security operations, delivering the first cloud-native security operations platform to end cyber risk. Powered by threat telemetry spanning endpoint, network, and cloud sources, the Arctic Wolf® Security Operations Cloud ingests and analyzes more than 1.6 trillion security events a week across the globe, enabling critical outcomes for most security use cases and optimizing customers’ disparate security solutions. Now deployed to more than 2,000 customers worldwide, the Arctic Wolf® Platform delivers automated threat detection and response at scale, and empowers organizations of any size to stand up world-class security operations with the push of a button.

Read More

DATA SECURITY

Certified as Coupa Business Spend Management Platform Ready SecurityScorecard Security Ratings

prnewswire | January 06, 2021

SecurityScorecard, the worldwide pioneer in network protection evaluations, today reported it has incorporated with Coupa Software (NASDAQ: COUP) to offer its Security Ratings information in the Coupa Business Spend Management (BSM) Platform. Coupa ensured SecurityScorecard's Security Ratings for use inside its cloud-based stage that engages organizations around the globe with the perceivability and control they need to settle on more brilliant spending choices. The coordination makes SecurityScorecard's information accessible in the Coupa BSM Platform, empowering clients to effectively comprehend and quantify the online protection stance of any association. With the reconciliation, obtainment experts can: Survey Vendor Cybersecurity Posture: View the general evaluation, the 10 factor evaluations of information that include a merchant's SecurityScorecard Security Rating, alongside discoveries related with each factor Assess a Vendor's Historical Performance: With admittance to a half year of a sellers' score history, Coupa clients can comprehend an organization's recorded exhibition Organize Vendors for Review: Use SecurityScorecard Security Ratings to figure out which merchants to organize for more profound surveys dependent on their online protection hazard act Build up Required Minimum Scores: Determine gauge SecurityScorecard grades for sellers and afterward influence nonstop observing to guarantee merchants stay on target Draw in Vendors: Invite sellers to join SecurityScorecard for nothing so they can improve scores by following up on issue-level remediation direction "As more organizations work with an increased number of third parties and expand their own digital footprint, the need for measuring the cybersecurity risk at scale is imperative now," said Roger Goulart, senior vice president of Business Development and Alliances at Coupa. "We're proud to integrate with SecurityScorecard to give our customers even greater cybersecurity risk insights and enable our customers to instantly rate, benchmark, and monitor the cybersecurity posture of their vendors." As an affirmed CoupaLink arrangement, the SecurityScorecard coordination for Coupa meets the prerequisites set up by Coupa through its CoupaLink Certified Technology program. The CoupaLink program empowers programming accomplices to fabricate correlative arrangements that effectively interface into the Coupa stage. Clients advantage by improving their business spend and diminishing business hazard while decreasing the expense of outsider programming incorporation. "Connecting SecurityScorecard Security Ratings into the Coupa Business Spend Management Platform provides our joint customers with a streamlined way to increase their visibility into vendor risk and decrease their overall risk exposure," said Randy Streu, Vice President of Strategic Alliances at SecurityScorecard. "We look forward to our relationship with Coupa to further help customers transform the way they assess vendor cyber health as a critical part of managing their business spend." About SecurityScorecard SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated. Founded in 2013 by security and risk experts Dr. Aleksandr Yampolskiy and Sam Kassoumeh, SecurityScorecard's patented rating technology is used by over 1,000 organizations for enterprise risk management, third-party risk management, board reporting, due diligence, and cyber insurance underwriting. SecurityScorecard continues to make the world a safer place by transforming the way companies understand, improve and communicate cybersecurity risk to their boards, employees and vendors. Every company has the universal right to their trusted and transparent Instant SecurityScorecard rating. For more information, visit securityscorecard.com or connect with us on LinkedIn.

Read More