DATA SECURITY

Cybriant to Launch CybriantXDR, a Complete Solution forThreat Detection and Remediation

Bineesh Mathew | June 08, 2021

A leader in managed cybersecurity services, Cybriant, announced recently the launch of CybriantXDR, an extended threat remediation and detection service.

CybriantXDR is a complete cyber security solution that delivers extensive visibility across an establishment’s network, endpoints, and cloud workloads. By giving a more comprehensive picture of the setting, this service allows improved detection and more effective remediation of threats as compared to old-style methods.

By using CybriantXDR tools, which comprise of behavioural analytics and machine learning algorithms, the Cybriant security analysts constantly screen the telemetry from an administration’s whole threat landscape. This thorough level of acumen offers a more exact level of uncovering across a broader range of possible threats.

Another benefit of CybriantXDR is compliance. By mixing SIEM capabilities with vulnerability management technologies organizations and next generation EDR can attain compliance with most normal regulations and public security frameworks.

The objective of CybriantXDR is to professionally make a combined threat analysis so our safety team can implement more alert and more effective detection and remediation of doubtful actions.

Spotlight

Today's organizations are besieged by security threats. Like kids in a candy store, cybercriminals can't wait to get their hands on confidential information. Whether motivated by financial gain or just the opportunity to wreak havoc, attackers are also increasingly sophisticated in their methods. In fact, many security breaches go completely undetected for months.


Other News
ENTERPRISE IDENTITY,PLATFORM SECURITY,SOFTWARE SECURITY

Bearer Launches Data-First Security Solution

Bearer | November 15, 2022

Bearer, the data-first security software company, today announced the general availability of the Bearer Data Security Platform. Based on extensive interviews with more than 130 enterprise CISOs at high-growth and global 2,000 companies, Bearer is in beta use across multiple industries with one customer protecting the private data of more than 75 million medical patients. “At Bearer, we strongly believe the best approach for a data-first security approach is to start at the beginning of the journey, following the shift-left security trend. “Data-first security should start in the code. And to be truly effective, it should never impede developers and never allow access to private data itself while still providing ownership context and protecting against vulnerabilities created in the business logic of an application or service.” said Guillaume Montard, CEO and co-founder of Bearer Why Bearer Data Security Platform Now Data security is becoming a top priority for businesses, with customers and governments demanding better data protection driven by the demands of GDPR, CCPA, PDPA and more. Bearer’s detection engine protects PD, PHI, PII and financial data. Cloud native organizations have more complex and fragmented architectures than ever before, making properly-implemented data security risk controls impossible without a proper solution. More than two-thirds of the enterprise 2,000 are focusing on cloud-native applications. DevSecOps is gaining huge traction. 57% of security teams have shifted security left already or are planning to this year, making them ready to use a solution such as Bearer. Bearer has been tested on more than 20,000 open source software projects as well as more than 6,000 data repositories at beta users, partners and early customers. The Bearer Data Security Platform Bearer is a SaaS platform that enables scalable deployments and workflow automation for security management. It discovers sensitive data flows automatically by continuously scanning source code and associated metadata. By monitoring data security risks proactively, it can automatically detect gaps within data security policies during coding and in production. Finally, it can remediate data security issues at a massive scale, giving developers immediate actionable advice on how to mitigate as well as prioritize an issue. Bearer accomplishes these results through three major innovations: Identification of data security risks – Including business logic flaws: Bearer pinpoints data security technical and business logic flaws in code before it’s too late and costly to correct. It then provides actionable context and ownership information to fix issues quickly – in minutes. Before Bearer, pinpointing business logic flaws could only be achieved manually – often left ignored. Frictionless deployment: Bearer is a data security SaaS solution that fits into the development cycles of Global 2000 enterprises without requiring any changes to how software engineering teams work. Additionally, Bearer does not require access to the underlying source code nor the sensitive data itself. Extreme automation: Designed by developers for developers in a world of constant code iterations, Bearer automates the burden of data security compliance for software engineers so they don’t have to become experts on data security regulations across different global markets. Security and compliance teams love how Bearer prioritizes the most critical issues in remediation workflow to allow for speedy resolution between security and development. About Bearer Bearer, the data-first security software company, pioneered a solution for developers to automatically detect sensitive data flow and data security risks while coding. Its policy engine proactively monitors data security policies before releasing code and its unique remediation workflow prioritizes the most critical issues – including business logic flaws – for quick resolution between security and engineering teams. Venture-backed with more than $8 million in seed financing, Bearer is used in markets where privacy protection and data security are business-critical, including eCommerce, financial services, and healthcare.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Upstream Deepens Investment in Michigan, US with a New Vehicle Security Operation Center

Upstream | September 08, 2022

Upstream, the creator of industry-leading cloud-based cybersecurity and data management platform for connected vehicles and smart mobility, is opening its first U.S.-based vehicle security operation center (vSOC) in Ann Arbor, Michigan, to closely surveil and mitigate emerging cyber threats and risks for its U.S.-based automotive clients. Data and connectivity are the foundation of the automotive industry's transformation, unlocking new revenue streams and business opportunities for automotive stakeholders and users. But, connectivity and mobility applications bring a wide range of cyber risks. "Upstream enables OEMs to build trust into the connected vehicles ecosystem. "Our platform monitors over 12 million vehicles worldwide. We see new attack surfaces and threats on a regular basis, fueled by a wide variety of vulnerabilities, including EV charging networks, expanded use of smartphone apps that control basic car functions and infotainment systems. This is the right timing to open our U.S.-based vSOC, and Michigan is a natural choice." Yoav Levy, CEO and co-founder of Upstream "Companies continue to invest in Michigan because of our world-class talent, quality of life, low cost of doing business and culture of innovation," said Trevor Pawl, Michigan's Chief Mobility Officer. "Michigan remains committed to being the global epicenter of the next revolution of the automotive industry and we applaud Upstream's continued success and investment in Michigan's autonomous and electrified future." "Vehicles are benefiting from a wave of technology innovation, producing transportation that is safer and smarter thanks to connectivity," said Faye Francy, executive director of Auto-ISAC, a global information sharing community established by automakers to address cybersecurity risks. "The very technology that provides us with these new efficiencies also introduces potential cyber risk to the vehicle, and vSOC operations is an application for the automotive industry to proactively address the risk." In fact, Upstream found more than 50 percent of all reported automotive-related cybersecurity incidents took place during the past two years alone. "Customer experience applications, by OEMs and smart mobility providers, are one of the fastest growing attack surfaces and account for 6 percent of total attacks in 2022 so far compared to 2 percent in 2021, explains Yaniv Maimon, Upstream's director of vSOC. "Charging stations and infrastructure have also become a significant concern, especially given range anxiety concerns and the constant pressure to accelerate EV adoption." At the Michigan vSOC, Upstream is hiring and training experienced local cyber and automotive experts to operate the vSOC, offer cross-functional response and mitigate attacks in real time. "Southeast Michigan's emergence as a high-tech mobility hub and its proximity to our automotive customers, their Tier-1 suppliers and cybersecurity talent makes it a perfect setting for our new vSOC," Levy said, adding that traditional security operation centers focus on compliance and IT assets and lack the holistic and contextual view required to mitigate cybersecurity threats against vehicles, services and entire fleets. The Michigan-based vSOC is expected to be fully operational by the end of the year. It adds to Upstream's growing network of automotive-specific security centers already active in Israel, and coming soon in Japan. Additional vSOC investments are expected in Europe in the near future. About Upstream: Upstream provides a cloud-based data management platform purpose-built for connected vehicles, delivering unparalleled automotive cybersecurity detection and response (V-XDR) and data-driven applications. The Upstream Platform unlocks the value of vehicle data, empowering customers to build connected vehicle applications by transforming highly distributed vehicle data into centralized, structured, contextualized data lakes. Coupled with AutoThreat® Intelligence, the first automotive cybersecurity threat intelligence solution, Upstream provides industry-leading cyber threat protection and actionable insights, seamlessly integrated into the customer's environment and Vehicle Security Operation Centers (vSOC).

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Balbix Announces Cybersecurity Posture Automation Support for Google Cloud Platform

Balbix | November 17, 2022

Balbix, provider of the world's leading platform for cybersecurity posture automation, announced today the general availability of support for Google Cloud Platform (GCP). Security teams can now use Balbix to easily quantify, prioritize and mitigate risks in their Google Cloud environments. With this announcement, Balbix has also extended its Cyber Asset Attack Surface Management (CAASM) solution to support multi-cloud environments that span both GCP and Amazon Web Services. The rapid move to the cloud has made IT environments more complex to manage and secure. As a result, security teams struggle to get a consolidated view of risk. Yet, 63 percent of organizations say they look at security posture in the cloud separately from on-premises, according to Cybersecurity Insiders' 2002 State of Security Posture Report. "Our customers' environments can include over 1 million assets, spread across multiple clouds and their own facilities. Managing an attack surface this large is no longer a human-scale problem. "With Balbix's new support for GCP, our customers can use automation to manage cybersecurity posture across more of their environment." Gaurav Banga, Founder and CEO of Balbix Cyber Security Posture Automation for Google Cloud Platform Balbix now provides support for popular Google Cloud services, including Compute Engine, Cloud Storage, Cloud SQL, Google Kubernetes Engine (GKE) Cluster & Deployments, Cloud Functions, Cloud Key Management Service (KMS), Pub/Sub and Secret Manager. As a result, Balbix customers with Google Cloud environments can use automation and advanced analytics to: Get comprehensive, near real-time visibility of their Google Cloud assets. Combine data from Google Cloud with their other IT and security tools to gain security and business context for their assets. Discover misconfigurations – the most exploited attack vector for the cloud – as well as unpatched software vulnerabilities, weak credentials and trust issues. Measure risk in terms of breach likelihood and business impact in order to prioritize remediation. Calculate and report on cyber risk quantified in dollars (or other currencies) instead of risk scores Cyber Asset Attack Surface Management for Multi-Cloud Environments The addition of support for GCP extends Balbix's CAASM solution to multi-cloud environments. Security practitioners no longer need to use multiple tools or combine data manually from these tools in a custom spreadsheet to understand their security posture. They can see the relationships between assets, applications and users no matter where the assets are in the cloud or on-premises. They can also identify any gaps in coverage for security controls. Balbix provides more than just visibility. Unlike other vendors, Balbix combines CAASM with Risk-Based Vulnerability Management (RBVM) and Cyber Risk Qualification (CRQ) solutions so security teams are able to immediately take action to reduce their cyber risk. They can continuously identify, prioritize and mitigate security issues as they emerge, while quantifying and tracking residual cyber risk in dollars. Daily cybersecurity decisions – operational as well as executive – can be made using a unified and up-to-date view of cyber risk. "By adding support for Google Cloud, Balbix has broadened its risk model to be inclusive of multiple public cloud platforms and allowed organizations to better measure their overall cyber risk," said Ed Amoroso, Founder and CEO of research and advisory firm TAG Cyber. "Customers can leverage this unified risk model to quantify cyber risk by business unit, geography, site, asset type or business owner – and quickly remediate those risks." The API-based Balbix Connector for Google Cloud Platform collects asset inventory and misconfiguration data and is available now. Visibility into other types of vulnerabilities is provided by optional Balbix sensors. These sensors also catalog the software bill of materials (SBOM) of applications running in GCP. Data collected by Balbix connectors and sensors is automatically deduplicated, correlated and inferenced to provide security teams with an accurate and unified view of risk. About Balbix Balbix enables businesses to reduce cyber risk by identifying and mitigating their riskiest cybersecurity issues faster. Our SaaS platform, the Balbix Security Cloud™, ingests data from businesses' security and IT tools so they can understand every aspect of their cybersecurity posture, build a unified cyber risk model and obtain actionable insights for risk reduction. With Balbix, businesses can automate inventory of their cloud and on-premise assets, conduct continuous risk-based vulnerability management and quantify cyber risk in dollars. Executives and operational teams can make cybersecurity decisions based on data not opinions.

Read More

DATA SECURITY, PLATFORM SECURITY, SECURITY AUDIT AND COMPLIANCE

CrowdStrike and EY Expand Global Alliance to Deliver Cloud Security and Observability Services

CrowdStrike | October 27, 2022

CrowdStri, a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, and Ernst & Young LLP (EY US), a leading organization in cyber risk consulting services, today announced an expanded relationship to deliver Cloud Security and Observability services globally, powered by the CrowdStrike Falcon platform. This collaboration expands on existing services previously announced including: Ransomware Readiness and Resilience; Incident Response (IR), Recovery and Remediation; Identity Assessment; and Zero Trust capabilities. “The CrowdStrike-EY Alliance combines CrowdStrike’s leading cloud security and observability solutions with the transformational consulting capabilities and services provided by EY,” said Michael Rogers, vice president of global alliances at CrowdStrike. “Our expanded alliance now provides joint customers the ability to secure their cloud workloads with CrowdStrike Cloud Security, as well as ingest their log and event data at scale with CrowdStrike Falcon LogScale, providing real-time visibility to better understand and assess issues in their infrastructure environments.” “Cloud security and observability continue to be key priorities for our clients. Our expanded alliance with CrowdStrike is critical in helping organizations address new and emerging threats,” said Dave Burg, EY Americas Cybersecurity Leader. “As a result of this relationship expansion, EY will implement CrowdStrike Cloud Security and CrowdStrike Falcon LogScale to help clients confidently secure their cloud workloads and operationalize the data they are generating for increased visibility.” Cloud Security The EY Cloud Security service offering leverages CrowdStrike Cloud Security, a CNAPP solution with agent-based and agentless protection, with EY’s cybersecurity professionals to accelerate the journey of clients through alignment and implementation of appropriate controls as part of the shared responsibility model. This enables DevOps and infrastructure runtime scanning teams to: Securely move to the cloud: Build a secure and compliant path to production by assessing, architecting, implementing and optimizing key cloud security controls, whether hybrid or multi-cloud. Secure business-critical workloads: Reduce the overhead, friction and complexity associated with protecting cloud workloads, containers and serverless environments, and transform the lengthy risk and audit processes into automated and continuous ones. Shift left securely: Automate the secure development of cloud-native applications, delivering full-stack protection and compliance for containers, Kubernetes and hosts across the container lifecycle. Observability The EY NextGen SOC service offering utilizes CrowdStrike Falcon LogScale, a modern log management solution, with EY’s SOC transformation practice to help clients – such as Mondelēz International – transform and optimize their cyber risk management operations practices by assessing, designing, building, improving, operating and automating their security operations and cyber defense capabilities. This enables DevOps, SecOps and IT Ops teams to: Decrease mean time to detection (MTTD): Evaluate all security use cases with EY’s SOC Transformation services and optimize them with Falcon LogScale, which provides real-time streaming, searching and alerting. Reduce complexity and increase visibility: Spend less time managing and maintaining disparate environments and more time triaging incidents with Falcon LogScale, which centralizes all logs in a single dashboard and reduces the time spent filtering data. EY can guide clients in maximizing their most important resource – people. Lower total cost of ownership (TCO): Remove the limitations present in traditional logging solutions by leveraging Falcon LogScale’s index-free architecture, which provides seamless data ingestion, reduced infrastructure costs and lower operational costs. EY can help clients to reduce their TCO and drive relevant business insights by assisting in their identification and prioritization of their capital and operational investments. “EY and CrowdStrike Falcon LogScale have enabled a global, multi-functional log management solution for our growing IT, security and compliance requirements,” said Kostas Georgakopoulos, CTO & CISO at Mondelēz International. The Cloud Security and Observability services are generally available for customers. About CrowdStrike CrowdStrike, a global cybersecurity leader, has redefined modern security with one of the world’s most advanced cloud-native platforms for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.

Read More

Spotlight

Today's organizations are besieged by security threats. Like kids in a candy store, cybercriminals can't wait to get their hands on confidential information. Whether motivated by financial gain or just the opportunity to wreak havoc, attackers are also increasingly sophisticated in their methods. In fact, many security breaches go completely undetected for months.

Resources