SOFTWARE SECURITY

Whistic Announces Support of Google’s Minimum Viable Secure Product Framework

Whistic | May 23, 2022

Whistic
Today, Whistic, the proactive vendor security network for both buyers and sellers, announced support for the Minimum Viable Secure Product (MVSP) framework, a security baseline developed by Google in a collaborative effort with Okta, Slack, and Salesforce.

Until the introduction of MVSP, there was no commonly accepted baseline available among security professionals that indicated the importance of security controls. With MVSP, vendors can demonstrate to their customers that they are meeting, at a minimum, the baseline of security as outlined by some of the industry’s top security professionals.

“We believe a vendor-neutral security baseline is an important step in establishing minimum acceptable security requirements for enterprise software and services. “By assuring enterprise solutions include the core security building blocks, we can work to reduce third-party risk, and promote security as a key part of the product development lifecycle.”

Chris John Riley, Senior Security Engineer at Google

Vendors that utilize Whistic to share security documentation via the MVSP help streamline and accelerate the security review process for their customers, helping them to rapidly understand the vendor’s security posture.

“Enabling companies to showcase their security posture using the MVSP and other industry frameworks is a key step toward ensuring transparent relationships between vendors and their customers,” stated Nick Sorensen, Whistic CEO. “In addition to announcing support of MVSP, we recently launched Whistic Basic Profile that enables any business regardless of size to proactively share their security posture with customers and publish it to the Whistic Vendor Security Network for free.”

Basic Profile allows vendors to self-assess against industry standard frameworks, including MVSP. It also includes a limited number of Profile shares, and the ability to publish to the Whistic Trust Catalog, enabling Whistic customers to conduct Zero-Touch Assessments of the vendor’s security posture.

“Okta has already added MVSP to our Whistic Profile and we look forward to seeing more and more of our vendors adopt this baseline in their Profiles,” said Gen Buckley, Director, Customer Assurance Customer Trust at Okta Security and founding committee member of MVSP. “We are always looking for ways to streamline our vendor security reviews and drive a more secure ecosystem, and MVSP helps accomplish that while also promoting transparency and collaboration between vendors and customers.”

Marat Vyshegorodtsev, Enterprise Security JAPAC representative at Salesforce adds, “Organizations of all sizes often purchase dozens of software products managed by third parties. The onboarding process alone can take weeks or months, especially when it comes to vetting the security posture for each. MVSP helps solve this—it standardizes this process and eliminates overhead, complexity, and confusion for both parties while ensuring the minimum-security requirements.”

About Whistic
Located in the heart of the Silicon Slopes in Utah, Whistic is the network for assessing, publishing, and sharing vendor security information. The Whistic Vendor Security Network accelerates the vendor assessment process by enabling businesses to access and evaluate a vendor’s Whistic Profile and create trusted connections that last well beyond the initial assessment. Make security your competitive advantage and join businesses like Airbnb, Okta, Betterment, and Atlassian who are leveraging Whistic to modernize their vendor security programs.

Spotlight

Erzielen Sie bessere Geschäftsergebnisse und beschleunigen Sie den ERP-Auswahlprozess (Enterprise Resource Planning) mit einem neuen Ansatz für die Bewertung von ERP-Lösungen. Nutzen Sie praktische Anleitungen, die Ihnen dabei helfen, den ERP-Bewertungsprozess für Ihr Unternehmen effizienter und effektiver zu gestalten.
In diesem Whitepaper erfahren Sie mehr über einen neuen und verbesserten Ansatz für die ERP-Bewertung:

  • Verstehen Sie die Geschichte und Entwicklung von ERP-Systemen.
  • Identifizieren Sie die Fehler in herkömmlichen ERP-Auswahlprozessen.
  • Richten Sie den Bewertungsprozess an den individuellen Anforderungen Ihres Unternehmens aus, um eine höhere Effektivität zu gewährleisten.
  • Verkürzen Sie den Bewertungszyklus.
  • Vermeiden Sie teure und unnötige Upgrades und Anpassungen.

Spotlight

Erzielen Sie bessere Geschäftsergebnisse und beschleunigen Sie den ERP-Auswahlprozess (Enterprise Resource Planning) mit einem neuen Ansatz für die Bewertung von ERP-Lösungen. Nutzen Sie praktische Anleitungen, die Ihnen dabei helfen, den ERP-Bewertungsprozess für Ihr Unternehmen effizienter und effektiver zu gestalten.
In diesem Whitepaper erfahren Sie mehr über einen neuen und verbesserten Ansatz für die ERP-Bewertung:

  • Verstehen Sie die Geschichte und Entwicklung von ERP-Systemen.
  • Identifizieren Sie die Fehler in herkömmlichen ERP-Auswahlprozessen.
  • Richten Sie den Bewertungsprozess an den individuellen Anforderungen Ihres Unternehmens aus, um eine höhere Effektivität zu gewährleisten.
  • Verkürzen Sie den Bewertungszyklus.
  • Vermeiden Sie teure und unnötige Upgrades und Anpassungen.

Related News

DATA SECURITY

SentinelOne and Cribl Partner to Deliver Data Flexibility Across Cybersecurity and Observability

Cribl | August 04, 2022

Cribl, the leader in enabling open observability, today announced a new partnership with SentinelOne, an autonomous cybersecurity platform company. The partnership enables SentinelOne customers to leverage Cribl's observability product suite to streamline cybersecurity triage, optimize data collection, and provide security teams control of their data. By integrating Cribl's observability product suite with Singularity XDR, SentinelOne customers can now unlock the value of all observability data. Key benefits include the ability to: 1) Operationalize endpoint and extended detection and response (EDR & XDR) of data sources in joint customer environments, 2) Streamline for triage and investigative functions in the Security Operations Center (SOC), and 3) Progress cybersecurity programs with enhanced threat intelligence, threat hunting, and adversary simulation. "Today's cybersecurity risk levels are increasingly associated with the ability to understand data across enterprise assets. "Our partnership with Cribl helps optimize data collection at scale, enabling security teams to minimize risk and save time." Chuck Fontana, SVP Business Development at SentinelOne "We're excited to partner with the SentinelOne team," said Zac Kilpatrick, VP of Channel and Alliances at Cribl. "To keep up with persistent threats and the ever-changing security landscape, SOC activity must move from reactivity to proactivity. SentinelOne's autonomous and proactive approach to cybersecurity is differentiated in the market and aligns with Cribl's objective of optimizing analytics platform cost and performance." Integration with SentinelOne's Cloud Funnel Cribl's product suite now integrates with SentinelOne's Cloud Funnel, a data subscription enabling XDR data to be stored locally in an enterprise's data lake. This solution works with any data type, such as file, process, DNS, flow, behavioral, registry, commands, scripts, and more. Cloud Funnel's flexibility provides SentinelOne customers the ability to choose which data type they need, optimize it to find the right signal, and route it for maximum efficiency - all at machine speed. Integration with DataSet Cribl Stream now supports SentinelOne's DataSet as a destination to seamlessly route data from legacy log analytics solutions. DevOps and IT teams choose DataSet to analyze data in real-time, effortlessly scale to petabytes, and cost-effectively retain data for longer periods of time for compliance and audit purposes. The new integration enables Cribl customers to pipeline their data to DataSet without changing their data instrumentation, collection, and ingestion. SentinelOne and Cribl will also continue bringing new offerings to market, including integrating Cribl Stream into SentinelOne's Singularity XDR platform. About Cribl Cribl makes open observability a reality for today's tech professionals. The Cribl product suite defies data gravity with radical levels of choice and control. Wherever the data comes from, wherever it needs to go, Cribl delivers the freedom and flexibility to make choices, not compromises. It's enterprise software that doesn't suck, enables tech professionals to do what they need to do, and gives them the ability to say "Yes." With Cribl, companies have the power to control their data, get more out of existing investments, and shape the observability future. Founded in 2017, Cribl is a remote-first company with an office in San Francisco, CA.

Read More

SOFTWARE SECURITY

Turing AI Launches Search Attribute in Video Security Platform

Turing AI | June 16, 2022

Turing AI has added people attribute search, a game changing feature in AI Security, to their flagship AI-powered video security platform Turing Vision. Whereas other camera-based security system depends on facial recognition and object detection alone to safeguard facilities and locate events, people attribute search adds several factors to identification, enhancing speed and accuracy of finding and recognizing people at the scene of events. With the inclusion of individuals attribute search, customers can now search for a people inside Turing Vision based on: Object detection of people Identity detections based on facial recognition* Attribute detection* based on: Clothing color, long or short sleeve shirts; pants vs. shorts Bags Hats Weiwei Chen, VP of Engineering at Turing AI said that, “Security is the number one priority for our clients. With the addition of people attribute search, we now have three algorithms: object detection, identity recognition and attribute detection to improve both the speed and accuracy of evidence collection significantly, allowing our clients to streamline their security workflow.” Turing AI is committed to guarantee its platform comply with applicable regulations. Activation depends on state regulations and the compliance with Biometric Information Protection Act (BIPA) (BIPA). Please refer to our privacy policy, and compliance available. Ron Rothman, President of Turing AI emphasized on “I truly believe this is where the industry is heading when it comes to AI security and Turing AI is proud to be among the leaders implementing this technology.” Ron broke it down this way, “People are more likely to accurately remember clothing and accessories rather than the physical description of a person. People attribute Search broadens the spectrum of elements when it comes to identification. For example, if someone suspicious near the scene was wearing a short-sleeved red shirt and a hat, clients can search for those attributes rather than relying solely on remembering race, eye color or hair color, which can be challenging when someone is wearing a hat.”

Read More

SOFTWARE SECURITY

Bugcrowd Launches Reseller Partnership with SocialProof Security

Bugcrowd | June 27, 2022

Bugcrowd, the market leader in crowdsourced cybersecurity, announced today a strategic reseller collaboration with SocialProof Security, advancing the organization's objective to keep clients ahead of growing cyber threats. As part of the cooperation, Bugcrowd will resell SocialProof Security's services, including social engineering prevention training, protocol and practitioner seminars, and penetration testing. In addition to reselling social engineering services, Bugcrowd continues to innovate and invest in its award-winning Security Knowledge Platform, which provides the most comprehensive suite of security solutions such as bug bounty, vulnerability disclosure programs, attack surface management, and pen testing as a service. Bugcrowd, for example, allows consumers to buy pen tests from a single supplier for any sort of use case, from basic assurance of simple web apps and networks to continuous testing of cloud services and APIs, and now, social engineering. Due to their friendly hacker approach to boosting customer defenses against human-based assaults, SocialProof Security and CEO Rachel Tobac, the market leader in social engineering prevention services, have gained prominence. Twitter, PayPal, Uber, Prudential Insurance, Cisco Systems, WhatsApp, NATO, and the US Air Force are among the noteworthy clients of SocialProof Security. "We are excited to work with Bugcrowd on this reseller partnership as we move forward with our aligned mission to arm organizations with a proactive means to reduce social engineering risk through education, identity verification protocol improvements, technical tools, and measuring those updates with social engineering penetration testing. The majority of cyber attacks now start with some element of social engineering—manipulating people to take actions that could harm organizations. This partnership illustrates the priority Bugcrowd places on actionable and measurable social engineering risk mitigation in a well-rounded security program," said Tobac. "Even with current elevated threat levels, many organizations are surprisingly unprepared for the threats from social engineering attacks, as we repeatedly find low awareness across organizations, outdated or inconsistent identity verification, and limited practitioner skill sets. Fortunately, taking a multidimensional approach that combines prevention training and tools, human-based protocol updates, and pen testing can dramatically reduce the risk of social engineering attacks. We look forward to bringing this innovative solution to market as a part of our services." Ashish Gupta, CEO of Bugcrowd SocialProof specializes in defending against social engineering attacks, in which attackers deceive workers in order to get personally identifiable information (PII), passwords, and unauthorized access to accounts, money, or other sensitive information. Common attack vectors like phishing, impersonation, and pretexting can be used to carry out such manipulation. In fact, respondents to ISACA's 2021 State of Cybersecurity Survey rated social engineering as the #1 cyber threat.

Read More