Enterprise Security, Platform Security, Software Security

ZeroFox Announces Generative AI Capabilities, Develops FoxGPT

Globenewswire | May 11, 2023 | Read time : 05:00 min

ZeroFox Announces Generative AI Capabilities, Develops FoxGPT

ZeroFox (Nasdaq: ZFOX), a leading external cybersecurity provider, announced its plans for releasing generative AI into its External Cybersecurity Platform with the preview of FoxGPT. FoxGPT capabilities will optimize intelligence analyst workflows with the ability to analyze and contextualize malicious content online, enhancing the ability to combat the growing sophistication of cybercriminals. Built by cybersecurity and intelligence professionals, for cybersecurity and intelligence professionals, ZeroFox commits to AI transparency, security, and privacy of information.

Recent cutting-edge advancements in AI, including the release of GPT 3.5, followed by GPT 4.0, are part of a larger, fast-paced AI revolution poised to change how humans and technology interact. As companies embrace these advancements to streamline and automate certain aspects of their business, threat actors are also embracing generative AI capabilities for more sophisticated phishing and fraud, social engineering, spam, and the production of malicious content. ZeroFox's adaptation of generative AI, FoxGPT, accelerates the analysis and summarization of intelligence across large datasets, allowing the identification of malicious content, phishing attacks, and potential account takeovers.

"We at ZeroFox are consistently dedicated to external cybersecurity innovation, and I'm thrilled to share the next step in our innovation roadmap with the development of generative AI capabilities within our platform, FoxGPT," said Mike Price, CTO at ZeroFox. "We understand the impact of generative AI and the risks of threat actors abusing it. We're committed to harnessing this technology while capturing explainable results and the security and confidentiality of customer data." ZeroFox has steadily integrated other machine learning capabilities into its platform over the past few years, enhancing its ability to keep pace with emerging technologies.

FoxGPT is a significant advancement for ZeroFox, enabling it to provide even more powerful external cybersecurity platform capabilities. ZeroFox is committed to AI transparency, security, and privacy of information in order to give customers the confidence that their data is secure.

ZeroFox plans to responsibly release FoxGPT to opt-in customers throughout the year.

About ZeroFox

ZeroFox (Nasdaq: ZFOX), an enterprise software-as-a-service leader in external cybersecurity, has redefined security outside the corporate perimeter on the internet, where businesses operate, and threat actors thrive. The ZeroFox platform combines advanced AI analytics, digital risk and privacy protection, full-spectrum threat intelligence, and a robust portfolio of breach, incident and takedown response capabilities to expose and disrupt phishing and fraud campaigns, botnet exposures, credential theft, impersonations, data breaches, and physical threats that target your brands, domains, people, and assets. Join thousands of customers, including some of the largest public sector organizations as well as finance, media, technology and retail companies to stay ahead of adversaries and address the entire lifecycle of external cyber risks. ZeroFox and the ZeroFox logo are trademarks or registered trademarks of ZeroFox, Inc. and/or its affiliates in the U.S. and other countries. Visit www.zerofox.com for more information.

Spotlight

Navigating the crowded GRC vendor market is complicated and time consuming - there are lots of requirements to meet and lots of vendors to sort through. Consistently and efficiently evaluate your vendor shortlist across five categories and dozens of weightable features and capabilities with LogicGate's free buyer's guide and ven

Spotlight

Navigating the crowded GRC vendor market is complicated and time consuming - there are lots of requirements to meet and lots of vendors to sort through. Consistently and efficiently evaluate your vendor shortlist across five categories and dozens of weightable features and capabilities with LogicGate's free buyer's guide and ven

Related News

Enterprise Security, Platform Security, Software Security

Jamf Teams With Google Cloud to Enable Collaborative, Mobile Workforces Through New Advanced Security and Management Workflows

Globenewswire | July 07, 2023

Jamf (NASDAQ: JAMF), the standard in managing and securing Apple at work, announced three new integrations with Google Cloud, enabling and protecting mobile workforces that use Google and Apple. Encompassing Zero Trust, observability, and identity workflows, Jamf continues to provide unique value for Google Cloud users with Apple devices. Bringing Zero Trust to Life: Google Cloud’s BeyondCorp Enterprise Now Available for iOS and iPadOS Jamf’s integration with BeyondCorp now supports device compliance signals for iOS and iPadOS. The addition of Apple’s mobile platforms builds on last year’s release of the Jamf and Google Cloud’s BeyondCorp integration for macOS. Jamf is the first management platform to support Apple desktop and mobile devices in this Zero Trust framework. “Some of the world’s most successful organizations choose to empower their employees with Mac and iPhone, while taking advantage of Google Cloud’s speed, security and flexibility for Cloud applications,” said Sam Weiss, Alliance Partner Manager for Google at Jamf. “Now these modern companies that choose Apple hardware and Google Cloud software can more effectively secure and manage their mobile workforces.” Jamf’s extensive Apple device management and security capabilities allow the enforcement and monitoring of device compliance status. When integrated with BeyondCorp, admins can create context-aware access policies that include Jamf compliance status. This combination of device-based and user-based access controls allows organizations to define policies specific to their needs, ensuring all devices and users can access corporate data wherever they choose to work from. "We at Unibuddy are thrilled about the seamless integration between Jamf and Google Cloud's BeyondCorp, which aligns with our Zero Trust security model. This partnership will enable us to efficiently manage our macOS and iOS devices while enhancing our security posture and ensuring the privacy of our employees," said Rupen Valand, Global IT Manager at Unibuddy. "Strong security is important for university partners and employees because it helps protect sensitive data and build trust. By providing an extra layer of security for accessing company resources, this solution empowers our employees to work remotely with ease and confidence, unencumbered by security or privacy concerns. We're excited to implement this solution and unlock its full potential with our teams at Unibuddy." Elevating Security Operations: Google Cloud’s Chronicle Enhances Jamf Integration Security teams are more effective when they have complete visibility of events in their environment. Google Cloud’s Chronicle is a modern security operations suite that enables threat detection, investigation and response with speed, scale and precision. Chronicle SIEM’s default parsers for Jamf Pro and Jamf Protect now map even more Jamf data into Chronicle’s unified data model (UDM). Additionally, Chronicle’s new support for Webhooks means Jamf Protect can automatically send security alerts and events to Chronicle as they occur. Now, IT and security teams can more effectively collaborate on security event detection and prevention by aggregating Jamf’s Apple device telemetry in Chronicle. The Chronicle parsers for Jamf Pro, Jamf Protect and support for Webhook, are all available now. “Directly integrating Jamf Protect into Chronicle has been a big win for us,” said Mikail Tunç, Head Of Security at Algbra. “The extensive detail provided by Jamf Protect Telemetry logs has heightened our ability to identify and mitigate more threats than ever, while staying resilient to Apple OS updates. We look forward to contributing to the broader community by open-sourcing our Chronicle detection rules over Jamf Protect data.” Simplifying end-user protection: Jamf brings Google Cloud Identity support to Jamf Trust Jamf has extended Google Cloud Identity support to Jamf Trust and improved the user app for endpoint security. This enhancement brings a consistent single sign-on experience for users with their Identity credentials, enabling robust endpoint security without complex integrations or additional assistance from IT. “At Spendesk, we’re thrilled to have our native identity provider Google Cloud supported by the Jamf Trust app. This will allow us to speed up our Zero Trust adoption. It’s really great how Jamf supports Google Cloud-based organizations like Spendesk,” said Hakim Boukir, IT Manager at Spendesk. About Jamf Jamf’s purpose is to simplify work by helping organizations manage and secure an Apple experience that end users love and organizations trust. Jamf is the only company in the world that provides a complete management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy. To learn more, visit www.jamf.com.

Read More

Platform Security, Software Security, Cloud Security

Stellar Cyber’s Open XDR Platform Now Secures OT Environments

Businesswire | July 25, 2023

Stellar Cyber, the innovator of Open XDR technology, announced today that all Stellar Cyber Open XDR Platform users can now secure their OT environments on the same platform with the same license they use to secure their IT environments. Combining IT and OT security in a single platform gives security teams a permanent advantage over attackers who frequently attempt to exploit weaknesses and vulnerabilities identified in an IT environment to move laterally into an OT environment to carry out an attack, and vice versa. Recent studies found that in 2021, over 90% of manufacturers had their production or energy supply impacted by a cyberattack. “With attacks so prevalent, you would think most security vendors would attempt to provide an easy-to-implement OT security solution, but that is not the case,” said Sam Jones, VP of Product Management at Stellar Cyber. “We found that with our open data architecture and built-in network security (NDR) capabilities, we can detect the most common OT environment cyber-attacks without burdening the security team to create OT-specific detection content.” OT environments require different deployment models based on their OT architecture. Stellar Cyber’s agentless deployment and its partnership with Garland Technology (a leading provider of network visibility products), make it easy for customers to incorporate their OT environment assets into the Stellar Cyber platform. With Stellar Cyber, security teams can now automatically detect the following: Many flavors of SCADA protocols SCADA network segmentation violations Network attacks Malicious or suspicious file transfers Anomalous communication IT-to-OT breaches Several existing Stellar Cyber customers are already incorporating their OT environment assets into the Stellar Cyber Platform and gaining never-before-seen insights into the attacks targeting their OT environments. “Securing my OT environment seemed unrealistic given my resources and budget, but now that I can use the Stellar Cyber Platform for both my IT and OT environments, my security team is delivering better security outcomes across the entire organization, protecting our bottom line,” said a SOC manager for a mid-sized manufacturing organization. “Securing an OT environment should not be exclusively available to organizations that have embedded OT expertise in their security teams,” said Sam Jones, VP of Product Management of Stellar Cyber. “With our platform, all customers can now reduce the risk of a widespread breach that might bring the shop floor, a utility turbine, or a critical manufactory line offline.” About Stellar Cyber Stellar Cyber’s Open XDR Platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill level to secure their environments successfully. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR.

Read More

Enterprise Security, Platform Security, Software Security

Conceal Unveils MSP Community Program

Business Wire | August 01, 2023

Conceal, the leader in browser security for managed service providers, today announced the launch of its Conceal MSP Community Program. A significant highlight of this initiative is the offer of a free NFR license for Managed Service Providers (MSPs), demonstrating Conceal's commitment to strengthening its partnerships within the MSP community. Conceal continues to build on its significant traction within the MSP ecosystem, always responsive to partner feedback and striving to simplify and enhance the effectiveness of its deployment process. The Conceal MSP Community Program marks a new chapter in this ongoing dialogue, with the free NFR license aimed at enabling MSPs to fully experience and understand the power of the ConcealBrowse solution, thus facilitating its integration into their service offerings. “Our partnership with Conceal has empowered us to offer a comprehensive cybersecurity package that's second to none," declared Dave Thompson of TeamLogic IT of San Ramon, CA. "Their ConcealBrowse solution, with its cutting-edge isolation technology, has been instrumental in defending our clients against malware and ransomware. The fact that it can be easily integrated into our existing security offerings has enhanced the overall value we deliver to our clients. We're proud to work with a partner who shares our commitment to cybersecurity resilience.” Furthermore, Conceal recognizes the cybersecurity challenges small to mid-sized companies face, notably ransomware and credential theft. Through the Conceal MSP Community Program, MSPs will be in a stronger position to offer innovative solutions to these threats. ConcealBrowse can easily be integrated into existing security packages or function as a standalone solution for companies lacking protection, thereby increasing overall cybersecurity resilience within limited budgets. About Conceal Conceal’s primary offering, ConcealBrowse, harnesses a sophisticated intelligence engine that works at machine speed with near-zero latency. It dynamically and transparently pre-processes and analyzes code, migrating suspicious, unknown, and risky browser activity to a secure cloud-based isolation environment. Conceal enables organizations to protect users from malware and ransomware at the edge. The Conceal Platform employs Zero Trust isolation technology to defend against sophisticated cyber threats. Globally, organizations of all sizes depend on Conceal to ensure their users and IT operations remain secure and isolated from potential attacks. For more information, visit https://conceal.io/. About TeamLogic IT TeamLogic IT is a national provider of advanced technology solutions for companies of all sizes. Local offices provide clients with the IT support they need to run their businesses more efficiently by leveraging the latest technology solutions, including managed IT services, cybersecurity, business continuity, cloud services, mobility solutions, unified communications, and consulting and support. With more than 150 independently owned and operated locations across North America, TeamLogic IT helps companies minimize downtime and improve productivity.

Read More