PLATFORM SECURITY

Delinea Onsite Survey Reveals Top Cybersecurity Concern in 2022

Delinea | June 10, 2022

Delinea
Delinea, a leading supplier of privileged access management (PAM) solutions for seamless security, today released the findings of its own anonymous onsite poll of cybersecurity experts attending this week's RSA Conference at the Moscone Center in San Francisco. The poll of over 100 cybersecurity experts questioned participants about their top cybersecurity worries for 2022, as well as where they stood on cyber insurance and cyber hygiene procedures.

Notably, the poll discovered that cloud security (37%) would be the top cybersecurity issue in 2022, surpassing ransomware (19%) and remote employees (17%).

According to the poll, 80% of respondents believe their company has not been infiltrated in the last 12 months. This positive effect might be attributed to greater cyber hygiene among workers. According to the poll, 59% of respondents do not use the same password on several accounts, and almost two-thirds (66%) utilize multi-factor authentication (MFA) wherever it is available.

"Protecting digital assets in the cloud is becoming priority number one, reflecting a more proactive approach to cybersecurity. As businesses become more reliant on the cloud for infrastructure, application development, and business process automation, security skills and solutions need to keep up. Securing privileged access to cloud infrastructure and workloads before attackers take advantage is imperative."

Joseph Carson, chief security scientist and advisory CISO at Delinea

Joseph Carson further added "Passwords should never be the only security control for accessing critical systems, applications, and privileges. By implementing MFA controls, it adds an extra layer of protection, should an attacker be able to compromise a password. MFA should be required not only at system log-in, but also at the point of horizontal and vertical privilege elevation."

Spotlight

"Phishing is defined by the Financial Services Technology Consortium (FSTC) as “a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree.”


Other News
PLATFORM SECURITY

Cybersecurity platform CrowdSec announces new Enterprise features

CrowdSec | July 13, 2022

CrowdSec, the French security startup enhancing the open-source and collaborative cyber security solution landscape, has today announced that its IP reputation tool has expanded its features in a paid version for enterprises. While CrowdSec's Community product remains available for individual users for free, the new Professional and Enterprise features will allow organizations to maximize scarce IT resources by crowdsourcing a higher volume of cyber threat intelligence (CTI). At a time where cyber attacks are on the rise and bad actors leverage vulnerabilities stemming from scarce IT budgets and talent pools, it is important that enterprises equip themselves with the right resources to increase their capacity. That is why CrowdSec, through crowd-power, compiles a collaborative IP reputation database from its tens of thousands of users in 160+ countries. With over 3.5 million malicious IPs reported and curated to date, CrowdSec makes cyber defense a collaborative effort and increases the capacity of individual defenders to protect themselves from the global network of bad actors. From $99 per month for the Professional tier (with custom pricing for the tailored Enterprise offering), users will benefit from: Data retention of 30 days compared to seven days in the free version Multi-user set up for organizations A brand new filter feature 500 IP intelligence requests per day The ability to subscribe to topic specific and verticalized IP blocklists (ecommerce, blockchain, TOR, VPN points, etc). Dedicated support service Filter internet background noise "Shifting to a collaborative approach is critical for enterprises to increase their capacity in light of skill shortages and scarce resources. Equipping enterprises of all sizes with crowd-sourced threat intelligence levels the playing field between small and large organizations and strengthens the resilience of the defense community as a whole. "Collaborative tools like CrowdSec are more important now than ever, which is why we've launched these enhanced offerings to strengthen what enterprises can do." CrowdSec founder and CEO Philippe Humeau About CrowdSec Based in Paris and founded in 2019, CrowdSec is an open-source & collaborative IPS generating crowd-sourced CTI. CrowdSec takes a collaborative approach to cybersecurity by analyzing behaviors, responding to attacks, and sharing signals across the community.

Read More

SECURITY AUDIT AND COMPLIANCE

NetWitness Launches Comprehensive XDR Offerings for Next Generation Security

NetWitness | June 08, 2022

NetWitness, a globally trusted provider of cybersecurity technologies and incident response, today announced NetWitness XDR, a family of products and capabilities delivering comprehensive detection and response on premise, in the cloud or as a hybrid of the two. This new offering and product architecture delivers the full range of deployment options enterprises seek today to meet their unique cybersecurity needs and use cases. NetWitness XDR delivers a robust set of capabilities enabling extended detection and response (XDR) and helping customers stay ahead of the most sophisticated cyber threats. These include: Unified collection, data, and visibility across multiple security layers Automatic enrichment of data using any technical or business source A wide toolset of detection technologies including, but not limited to, advanced behavioral analysis External and internal threat intelligence to identify known security risks and threat actors Truly insightful context, visualization, and investigation tools Threat hunting tools and methodologies to identify previously unknown threats Highly repeatable and measurable incident investigation and response processes A strong array of both automated and human response options “NetWitness has enjoyed the trust of some of the world’s most security sensitive organizations because of its unique ability to monitor the entire attack surface across the network, endpoint, cloud, IoT, logs and more,” said CEO of RSA and NetWitness, Rohit Ghai. “We have been delivering XDR capability to the market for several years and today we are delighted to announce new innovations in the platform and reintroduce it to the market as NetWitness XDR.” Under this new model, NetWitness XDR will be comprised of three main product lines that showcase its uniquely powerful support for all XDR use cases. NetWitness Platform XDR 12 is the newest major release of NetWitness Platform. This technology stack, typically deployed as customer-managed software or hosted by MSSPs, has been enhanced to focus on detection capabilities that identify threats faster and decrease their impact. The company’s new cloud-native SaaS version will be known as NetWitness Vision XDR and is currently in design preview. The third product line, NetWitness XDR Cloud Services, is a set of optional SaaS applications that take advantage of the cloud’s inherent elastic nature to deliver flexible and cost-effective components which can be used to augment either Platform XDR or Vision XDR. “Our network-forward approach allows us to stand out in this emerging space and highlights NetWitness XDR’s ability to detect across customers’ growing number of systems and devices. “We are embracing the belief that the best XDR must be consumable on prem, in the cloud, and hybrid.” Director of Product Management and Research, Kevin Bowers Developed initially in 1996, NetWitness began as a government-sponsored research project to inspect network packets for cyberthreats and tools to detect and respond to them. Since then, the technology has continuously evolved and been innovated to tackle today’s most complex attacks. NetWitness now features fully integrated components for network, log, endpoint and IoT detection and response that drive its threat intelligence and security orchestration platform, NetWitness Orchestrator. With its long history and global footprint, NetWitness XDR integrates directly with the world’s most critical and widely deployed tools, as well as many specialized and industry-specific solutions. NetWitness XDR will host demonstrations at its booth at RSA Conference this year for Platform XDR and Vision XDR. ABOUT NetWitness NetWitness, an RSA® Group Business, provides comprehensive and highly scalable threat detection and response capabilities for organizations around the world. The NetWitness Platform delivers complete visibility combined with applied threat intelligence and user behavior analytics to detect, prioritize, investigate threats, and automate response. This empowers security analysts to be more efficient and stay ahead of business-impacting threats.

Read More

SOFTWARE SECURITY

UL Launches New SafeCyber™ Solution and Platform Features to Address Mounting Security Threats

UL | June 07, 2022

UL, a global safety science leader, today announced the latest enhancements to its product security and compliance life cycle management platform, SafeCyber. Launched last year, SafeCyber aims to democratize product security and empower device manufacturers, suppliers and system integrators to take charge of their connected ecosystems and mitigate growing threats from chip to cloud. Amid an uptick in supply chain attacks, a shortage of security expertise and a dynamic regulatory environment, UL's new SafeCyber dashboard provides users with a comprehensive view of their product security maturity and projects in one place. SafeCyber also provides an easy-to-use portal to help users discover available device life cycle solutions to better manage and secure their ecosystems. Through this new dashboard, users can view all their product security testing and evaluation activities in a single, central location. The new feature provides visibility on the security maturity of their product lines and certification readiness to industry standards, including ISA/SAE 21434 and IEC 62443 4-1, among others. Additionally, UL formally announced Binary Check™, a new SafeCyber platform solution. Binary Check allows users to perform continuous, automated binary code analysis to ensure ongoing security and compliance readiness of connected devices and systems. This new solution includes the ability to generate a software bill of materials (SBOM), detect and manage vulnerabilities for faster remediation and obtain compliance readiness analysis. "The skyrocketing adoption of connected devices creates countless benefits and opportunities but also leads to an increasingly large and attractive attack vector for bad actors. "As devices become progressively connected, it's challenging for businesses to keep up with growing device and security system complexities, making them vulnerable to ransomware and firmware attacks. Hardening security requires a proactive approach. At UL, we are committed to enabling organizations to innovate and bring products to the marketplace safely and securely. With SafeCyber, customers benefit from a 360-degree view of their security governance and processes to better manage and mitigate product security risks." David Nosibor, platform solutions lead, Identity Management Security and head of UL's SafeCyber project About UL UL is a global safety science leader. We deliver testing, inspection and certification (TIC), training and advisory services, risk management solutions and essential business insights to help our customers, based in more than 100 countries, achieve their safety, security and sustainability goals. We believe our deep knowledge of products and intelligence across supply chains make us the partner of choice for customers with complex challenges.

Read More

PLATFORM SECURITY

Evo Security Announces the Launch of Evo Partner Identity Cloud for MSPs

Evo Security | June 21, 2022

Evo Security today announced the launch of Evo Partner Identity Cloud or EPIC. Evo Partner Identity Cloud is the first all-in-one identity and access management (IAM) solution designed exclusively with the needs of managed service providers (MSPs) and their business customers in mind. The enterprise-grade cloud platform is a comprehensive identity and access management solution that gives MSPs an easy and highly secure way to protect small and medium-sized businesses and enterprises from the most common types of cybersecurity attacks that frequently exploit login and access vulnerabilities to penetrate network and cloud assets. Evo Partner Identity Cloud includes multi-factor authentication (MFA), single sign-on (SSO), privileged access management (PAM), technician elevated access, secrets management, and unified directory services, among other critical security capabilities. Evo Partner Identity Cloud is the easiest and most complete way for MSPs to simultaneously protect login credentials and apply least-privilege access across applications, networks, and infrastructure for themselves and their customers in a single scalable, multi-tenant solution. "Traditional enterprise identity and access management solutions are built for 1:1 administration, which means they cannot adequately support the MSP and the MSP's customers simultaneously. Point solutions have helped bridge the gap, but don't provide the enterprise-grade security and platform approach required by MSPs seeking to build a sound security practice" said Evo Security's CEO and Founder, Mike Roth. "We built Evo Partner Identity Cloud with a multi-tenant architecture to provide MSPs an enterprise-grade level of security that they can use to protect themselves and all of their SMB and SME customers at scale with purpose-built platform that means business." said Evo's CEO and Founder, Michael Roth. "What's great about Evo Security's Partner Identity Cloud is that it works with our existing MSP managed technology stack to provide comprehensive identity and access management capabilities for us and our customers. It helps keep our internal systems secure, while providing cloudIT with new ways to generate revenue and enforce best security hygiene practices in our customers' networks." Vince Kent, CEO of managed service provider cloudIT The Evo Partner Identity Platform supports MSPs by providing the ability to: Turn identity and access management (IAM) into a highly profitable revenue center that can immediately produce new revenue with industry-leading margins; Replace multiple point solutions, including password vaults, password rotation tools, multi-factor authentication (MFA) tools, and privileged access management (PAM) tools, with a comprehensive identity and access management platform that reduces overhead expenses, provides enterprise-grade protection, and simplifies application and security administration for the MSP and its customers; Deploy login security at scale across customers for web applications, workstations, Macs, servers, VPNs, firewalls, switches, and other network devices; Establish least-privilege and exceed-compliance controls in managed and co-managed scenarios using granular permissions and security groups; Completely eliminate sharing of customer passwords and MFA codes, while simultaneously streamlining technician access across all customer endpoints and apps; Migrate from Microsoft to Evo as the sole Identity Provider (IdP) or build a hybrid IdP scenario based on customer configuration needs; Connect to common MSP tools, such as ConnectWise, Datto, and Microsoft, and improve internal management efficiencies; Gain visibility and real-time security intelligence across customer infrastructure to improve value of services delivery and stop attacks before they start. Evo Security CEO Michael Roth said "Evo Partner Identity Cloud isn't just an all-in-one MSP identity and access management platform. It's an all-in-one MSP business solution." About Evo Security Based in Austin, Texas, Evo Security is an identity and access management cybersecurity company that builds enterprise-grade security products with the MSP in mind. Evo Security's solutions are designed to protect MSPs and their SMB and enterprise customers with comprehensive, multi-tenant security solutions. They are easy to implement and help manage security across managed service providers' internal and external users, while providing MSPs new ways to generate new and highly profitable revenue streams.

Read More

Spotlight

"Phishing is defined by the Financial Services Technology Consortium (FSTC) as “a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree.”

Resources