DATA SECURITY

When Safeguarding Digital Communications,IT Security Leaders Come Across Continued Vulnerabilities

SafeGuard Cyber | July 13, 2021

The only SaaS platform dedicated to managing the entire lifecycle of digital risk protection, SafeGuard Cyber, has released conclusions from a survey of 100 IT security leaders about their safeguarding digital communications and digital risk processes. The finding of the survey indicates that cybersecurity leaders recognize what is required for adequate digital risk protection. But, they are still dealing with boundaries and susceptibilities in defending these communications, such asthird-party cloud application engagement.

The survey was conducted in June 2021 in coordination with the research community Pulse. The main point covered in the survey was uncovering how cybersecurity leaders are managing digital risks on third-party applications. In addition, the survey was also focused on recognizing who owns the responsibility for securing them and what all can be done to progress their administration's security posture for various cloud applications. 100 senior enterprise IT and security professionals from companies with over 5,000 employees were included in the survey.

The main findings from the survey include:

• The biggest challenge for security leaders, who targets to uphold security and compliance across all professional communications, is lack of visibility (39%)
• Security leaders are most concerned about data loss (46%) regarding digital communication risks, followed by malware and ransomware attacks (37%).
• Only 10% of cybersecurity leaders have a tech stack that provides complete visibility for detecting and responding to threats in cloud applications outside of their network.
• Security leaders often restrict access as a means of managing risk where they lack granular visibility. For example, to ensure security and compliance on social media, collaboration, and mobile chat applications, most security leaders (77%) turn to tools that restrict access to third-party communication apps.


About SafeGuard Cyber 

SafeGuard Cyber guards the human connections establishments need to flourish in a digital world. The cloud-native SafeGuard platform authorizes the secure and compliant acceptance of social, mobile, and cloud-based communication channels at the scale of worldwide corporate. With SafeGuard, customers gain business agility with better security and time to value. Current customers include small businesses, Global100 enterprises, municipalities, and various national governments.

Spotlight

The ransomware epidemic has forced IT organizations to think differently about how they surveil and defend their digital assets. Passive observation of transactions on the network empowers IT departments to detect, investigate, and mitigate cryptoransomware attacks in minutes. This paper describes how real-time ransomware detection for the entire environment is made possible through analysis of all data in flight. Ransomware is a low-risk, high-reward way for cybercriminals to make money. Increasingly, these criminals are targeting businesses, hoping to hold network shares or even entire file servers ransom for millions of dollars.

Spotlight

The ransomware epidemic has forced IT organizations to think differently about how they surveil and defend their digital assets. Passive observation of transactions on the network empowers IT departments to detect, investigate, and mitigate cryptoransomware attacks in minutes. This paper describes how real-time ransomware detection for the entire environment is made possible through analysis of all data in flight. Ransomware is a low-risk, high-reward way for cybercriminals to make money. Increasingly, these criminals are targeting businesses, hoping to hold network shares or even entire file servers ransom for millions of dollars.

Related News

DATA SECURITY

Deloitte to Acquire Digital Terbium Labs, Risk Protection Solution Provider, to Expand its Offerings towards Threat Intelligence

Deloitte | June 21, 2021

Deloitte has announced its acquisition of assets of Terbium Labs, a Baltimore-based digital risk protection company. Terbium Labs helps organizations detect and remediate data theft, exposure, or misuse across the digital landscape. All services and solutions of Terbium Labs will join the cyber practice of Deloitte in its Detect & Respond operation services. These services by Terbium Labs include a platform for digital risk protection for leveraging artificial intelligence and patented data fingerprinting technologies and machine learning for identifying illicit use of sensitive online data. Including Terbium Labs, in 2021, it is the third cyber acquisition of Deloitte. It has previously acquired Root9B, LLC (R9B), a cyber-threat hunting provider, and CloudQuest, a cloud security posture management provider. Deloitte demonstrates its commitment to aiding global clients in managing all the cyber threats in running the businesses smoothly in all digital platforms through these acquisitions. According to Deloitte & Touche LLP’s Deloitte Risk & Financial Advisory's infrastructure solution leader and principal, Kieran Norton, finding complex or exclusive data once it leaves an establishment's limit can be exceptionally challenging. Advanced online threat intelligence, paired with remediation of data risk disclosure, needs a balance of progressive technology, a keen understanding of monitoring compliance, and acceptable alteration with an establishment's commercial needs and risk outline. Adding to it, Deborah Golden, Deloitte & Touche LLP’s Deloitte Financial and Risk Advisory Cyber and Strategic Risk leader and the principal said that their industry-leading cyber practice is dedicated to providing our customers with novel and ground-breaking ways to alter their cyber risk postures as they endeavor to reinforce their conviction equity, flexibility, and safety.

Read More

DATA SECURITY

Tammy Moskites, a Veteran CISO, has been Appointed to AppViewX's Advisory Board

AppViewX | May 04, 2021

AppViewX, the leader in next-gen machine identity management via automation and application delivery automation, today announced the appointment of Tammy Moskites, CEO and founding father of CyAlliance®, as Executive Board Advisor. Tammy joins the AppViewX planning board to supply strategic cybersecurity guidance to customers and across go-to-market channels to drive awareness, growth, and customer success. With over 30 years of technology experience, security acumen and leadership Tammy may be a result-driven and passionate executive who helped create the Machine Identity Management market category and enterprise requirements to raised govern keys and certificates. As a distinguished career CISO, Tammy actively guides peer CISOs and security architects worldwide to assist defend their organizations from cyber attacks, unplanned outages, and failed audits. Tammy has previously held executive security and technology leadership roles at Accenture, Venafi, Time Warner Cable, and residential Depot. "We're delighted to possess Tammy Moskites to join AppViewX as an Executive Board Advisor," said Gregory Webb, AppViewX CEO. As cryptographic keys and certificates became the critical infrastructure for DevOps, SecOps, and NetOps, the importance of Machine Identity Management to an organization's overall security posture and digital transformation has become a top priority. As a highly experienced and influential executive, Tammy will add significant value to our team. Her experience as a successful career CISO is invaluable to us as we still accelerate growth and supply the foremost comprehensive, next-gen machine identity management solution for global enterprises." Tammy may be a highly recognized cyber and ladies in technology social influencer. Amongst the various things she is involved in, she may be a Ventture Advisor to YL Ventures, a Distinguished Fellow with the Ponemon Institute, and volunteers her time with many technology organizations. She is an internationally recognized keynote/speaker, not only on security and governance but also on career building, women in technology, and leadership mentoring. She is currently an executive company board advisor to Blue Lava, Raxis, RiskIQ, and SecureAuth and a seed investor at Grip Security. "I was an early voice, champion, and adopter of what's now, Machine Identity Management, which dates back nearly 10 years," said Tammy Moskites, Executive Board Advisor at AppViewX. "As a career CISO, I even have always had a passion and expressed the need to manage your keys and certificates and shared that zeal worldwide. I even have certainly been excited to observe the expansion and maturity during this cybersecurity space as an entire. I feel that AppViewX is maturing Machine Identity Management and also within the areas of IoT Key/Certificate Lifecycle Automation, PKI Management/PKIaaS, and Application Delivery Automation. I'm truly impressed by their dedication, focus, and most significantly, their passion for 'doing the proper things right' – which has allowed them to require Machine Identity and Automation to a subsequent level! I'm super excited to be an Executive Board Advisor at AppViewX and appearance forward to their partnership with CyAlliance® and welcome them to our Cy'Alliance' portfolio of partners!" According to Gartner's Top Security and Risk Management Trends for 2021, Machine identity Management may be a top trend for 2021. "Machine identity management aims to determine and manage trust within the identity of a machine interacting with other entities, like devices, applications, cloud services, or gateways. Increased numbers of nonhuman entities are now present in organizations, which suggests managing machine identities has become an important part of the safety strategy." About AppViewX AppViewX is revolutionizing the way NetOps and DevSecOps teams deliver Machine Identity Management and Application Delivery Automation solutions services to Enterprise IT. The AppViewX Platform may be a modular software application that permits the automation and orchestration of network infrastructure using an intuitive, context-aware, visual workflow. It quickly and simply translates business requirements into automation workflows that improve agility, enforces compliance, eliminate errors, and reduce cost. AppViewX customers are among the world's most demanding Fortune 1000 organizations in financial services and banking, healthcare, oil and gas, manufacturing, and high tech.

Read More

DATA SECURITY

F-Secure has Launched a Modular Platform for Cyber Security Servitization

F-Secure | May 20, 2021

Today, cybersecurity provider F-Secure launched F-Secure Elements: a replacement cloud-based platform that streamlines how organizations provide cybersecurity services. Available from F-Secure's service partners with fixed-term license subscriptions, or usage-based billing for greater flexibility, F-Secure Elements empowers organizations to select cybersecurity services on terms that accommodate their needs. Many organizations operate in complex environments dominated by a variety of dynamic risks and opportunities. Keeping these complexities in mind, also because of the rising costs of security and therefore the lack of experienced security professionals, it's no surprise that an awesome number of organizations want to simplify how they source cybersecurity capabilities. F-Secure Executive vice-chairman of Business Security Juha Kivikoski says these demands are driving a shift toward providing cybersecurity as services instead of products. "Even with updates, products are static and can't adapt fast enough to stay up with threats, or businesses, as they evolve. Services help businesses stay agile and are less expensive when delivered right, which is why the longer term of our industry is in delivering everything as a service," he explained. "Having a platform designed for the servitization of cybersecurity can help organizations recover protection, which is why simplicity and adaptability are F-Secure Elements' core design principles." F-Secure Elements may be a modular platform that mixes endpoint protection, endpoint detection and response, vulnerability management, and collaboration protection for cloud services (such as Microsoft Office 365). F-Secure Elements' key capabilities and benefits include: • Comprehensive situational awareness and meaningful visibility across assets, configurations, vulnerabilities, threats, and events. • Streamlined and autonomous operations to make sure efficient workflows and faster responses to real threats. • Real-time, connected data flow between elements to enable faster detection of threats. • Intelligent, extended detection and response capabilities for data-informed decisions. • On-demand choice to elevate difficult cases to F-Secure experts. About F-Secure Nobody has better visibility into real-life cyber attacks than F-Secure. We're closing the gap between detection and response, utilizing the unequaled threat intelligence of many of our industry's best technical consultants, many devices running our award-winning software, and ceaseless innovations in AI. Top banks, airlines, and enterprises trust our commitment to beating the world's most potent threats. alongside our network of the highest channel partners and over 200 service providers, we're on a mission to form sure everyone has the enterprise-grade cybersecurity we all need.

Read More