DATA SECURITY

Zuellig Pharma Selects CYFIRMA to Elevate Cyber-intelligence Capabilities and Strengthen Cybersecurity Posture

CYFIRMA | June 25, 2021

CYFIRMA, a threat discovery and cyber-intelligence platform company, funded by Goldman Sachs, Zodius Capital and Z3Partners, today announced that Zuellig Pharma, a leading healthcare services provider in Asia, has selected DeCYFIR, a cloud-based, AI-powered cybersecurity platform, to gain further visibility into its external threat landscape to uncover hacking campaigns and avert cyberattacks.

In the last 18 months, the COVID-19 pandemic has seen the global healthcare industry falling victim to cybercriminals taking advantage of the chaos. According to CYFIRMA researchers, cyberattacks on healthcare more than doubled in 2020. COVID-19 response efforts, including vaccine research and supply chain were the largest focus of these targeted campaigns.

With CYFIRMA's DeCYFIR platform, Zuellig Pharma has bolstered its cyber defence ammunition to accurately uncover cyberattacks at the early planning stage and take remedial actions to close vulnerabilities before hackers can compromise the network. The platform enables further visibility into the external threat landscape by monitoring the dark web, hacker forums and various closed communities to look for threat indicators that would signal cybercriminals planning to exploit security weaknesses that could lead to business disruption.

Spotlight

Globally Accenture surveyed nearly 2,000 executives in nine industries and 15 countries around the world, to explore how companies are applying digital technologies to improve their organizations. The following focuses on mobile applications.

Spotlight

Globally Accenture surveyed nearly 2,000 executives in nine industries and 15 countries around the world, to explore how companies are applying digital technologies to improve their organizations. The following focuses on mobile applications.

Related News

NETWORK THREAT DETECTION

Axonius Integrates with the New, Enhanced Amazon Inspector to Deliver Comprehensive Cyber Asset Attack Surface Management

Axonius | December 06, 2021

Axonius, a leader in cybersecurity asset management, today announced an integration with the new Amazon Inspector, an automated security assessment service. The integration will enable mutual customers to better understand and manage vulnerabilities across their Amazon Web Services (AWS) infrastructure. Amazon Inspector is a vulnerability management service that continually scans AWS workloads for software vulnerabilities and unintended network exposure. The solution automatically discovers all running Amazon Elastic Compute Cloud (Amazon EC2) instances and container images residing in Amazon Elastic Container Registry (Amazon ECR), at any scale, and immediately starts assessing them for known vulnerabilities. Because Axonius delivers a complete inventory of assets from many correlated data sources, customers can gain a comprehensive view of their cloud security posture, including vulnerability data found from Amazon Inspector. "Customers are burdened by the increasing number of security tools to protect the sprawl of cloud, physical, and virtual assets in their environments,It's not easy for them to surface which assets are not covered by their security controls that should be, or if they are covered, whether the control is actually working. Customers are exhausted with the highly manual, slow, and error-prone processes that negatively impact their risk mitigation, threat management, and compliance. With Axonius, customers can get a unified view of their assets and dramatically accelerate the process of strengthening security posture across all of their assets.” Mark Daggett, vice president of worldwide channels and alliances, Axonius Comprehensively Track and Assess the Security of AWS Assets: In just a few clicks, the Axonius Query Wizard can identify any AWS assets that have not been assessed with Amazon Inspector. Customers can also easily search for a set of assets based on their last scan time, or segment AWS assets with known vulnerabilities by common vulnerabilities and exposures (CVE) severity, CVE ID, and more. It can also be used to track the Amazon Inspector usage and coverage. Manage Vulnerabilities Within a Broader Context: Beyond simply identifying known vulnerabilities, Axonius delivers correlated data from tools such as endpoint detection and response, privilege access management, and more to help cloud security, DevOps, and security operations teams prioritize which vulnerabilities to remediate first. With an endless backlog of vulnerabilities to manage, this level of context is imperative to helping teams mitigate the vulnerabilities that are more likely to be exploited, or that would have the most impact if exploited. Improve Cloud Compliance Based on Industry Benchmarks: Customers can also ensure that their AWS assets adhere to security best practices, such as the CIS AWS Foundations Benchmark. Using Axonius and Amazon Inspector, cloud security teams can prioritize which assets pose the most risk due to any detected vulnerability or deviation from security standards and best practices. “To be effective, security and DevOps teams need to prioritize vulnerability remediation based on business impact”, said Michael Fuller, director of product management, AWS Security Services. “With the new Amazon Inspector, we’ve dramatically simplified continuous and automated vulnerability assessment for customers across their entire organization, whether they have one AWS account or five thousand. The Axonius integration then brings developers more contextual asset data to help prioritize vulnerability remediation.” About Axonius Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers gaps, and automatically validates and enforces policies. Deployed in minutes, the Axonius cyber asset attack surface management (CAASM) solution integrates with hundreds of data sources to give customers the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, automating response actions, and informing business-level strategy. Cited as one of the fastest growing cybersecurity startups, with accolades from CNBC, Forbes, and Fortune, Axonius covers millions of devices for customers around the world.

Read More

NETWORK THREAT DETECTION

BlackCloak Unveils New Deception Technology to Catch Cyberattacks Targeting Executives & High-Profile Individuals

BlackCloak | November 16, 2021

BlackCloak, Inc., the first Concierge Cybersecurity & Privacy™ Protection Platform for Executives and High-Profile Individuals, today officially unveiled proprietary deception technology to catch adversaries' brazen attempts to exploit a member's privacy, personal devices, or home networks. Commonly referred to as a honeypot, BlackCloak's deception technology lures attackers interacting with a service by simulating a real-world home network. Cybercriminals and advanced attackers will then be enticed by the potential data that appears within their reach. Once the attack is detected, BlackCloak's deception technology automatically alerts the company's Security Operations Center (SOC) to investigate and intervene before damage is done. "Our members are increasingly exposed to sophisticated cyberattacks. Hackers are diversifying their preferred attack vectors beyond corporations and supply chain partners to include executives, high-net-worth individuals and high-profile individuals, many of whom have easily exploitable vulnerabilities in their personal digital lives,Advanced deception technology increases our ability to proactively detect, mitigate, and respond to threats before they manifest. It is the perfect complement to BlackCloak's other concierge cybersecurity and privacy services." Dr. Chris Pierson, BlackCloak Founder & CEO BlackCloak's deception engine, which has been live with existing customers since earlier this year, has already spotted suspicious activity within home environments. The leader in digital executive protection is the first cybersecurity and privacy company to deliver enterprise-grade honeypot technology to consumers. "BlackCloak's design and implementation of deception technology into the personal lives of corporate executives further strengthens their concierge platform," said Bob Ackerman, Co-Founder of DataTribe. "The ability to know an adversary might be lurking inside the footprint of their digital home independent of other common controls is game changing." BlackCloak is a leader in digital executive protection on a mission to protect digital lives. To do so, the company is engineering a holistic, SaaS-based cybersecurity & privacy platform with a concierge experience. BlackCloak works with real people to safeguard their personal and corporate reputation, finances, and information using technology that secures their homes, devices, and online presence. Focusing on high-profile individuals with limited time and a lot to lose, BlackCloak makes sure everything they do is frictionless and discreet. About BlackCloak BlackCloak protects corporate executives and high-profile individuals from cybersecurity, privacy, financial, and other reputational risks. Used by Fortune 500 companies across all industries, the BlackCloak Concierge Cybersecurity & Privacy™ Platform is a holistic solution including mobile and desktop apps as well as concierge support. Executives and high-profile individuals get peace of mind knowing their family, reputation, and finances are secured. Companies rest assured that their brand, intellectual property, data, and finances are protected against threats coming through executives without having to invade their personal lives.

Read More

Mobileum has found a 5G Security Sample Vendor in Gartner's Hype Cycle Identity and Access Control Technologies

prnewswire | September 03, 2020

Mobileum Inc. ("Mobileum"), a leading global provider of analytics-based roaming, telco security, risk management and testing and monitoring solutions, is pleased to announce that it has been recognized in Gartner's Hype Cycle for Identity and Access Management Technologies, 2020 and in the Hype Cycle for Privacy, 2020, as a Sample Vendor for 5G security. According to Gartner, "5G will increase the number and diversity of connected objects, potential DDoS attack vectors and entry points; this also provides more telemetry for anomaly detection" and "5G infrastructure virtualization, automation and orchestration of a service-based architecture increases exposure." Gartner continues to say, "Slicing virtual networks across shared infrastructure impacts security due to lateral movement risk, and cross-slice permeability issues."

Read More