DATA SECURITY

Hoxhunt and Cyber Intelligence House Announce Partnership to Connect Cyber Threat Exposure With Employee Cyber Awareness

Hoxhunt | November 22, 2021

Hoxhunt
Hoxhunt, a premium enterprise cybersecurity awareness training platform, and Cyber Intelligence House, a leading provider of cyber intelligence, today announced a first-of-its-kind partnership designed to equip organizations with unprecedented protection from email attacks leveraging advanced insight across their dark-web-to employee-inbox lifecycle.

Hoxhunt’s CEO, Mika Aalto stated:

“This partnership with Cyber Intelligence House will open a whole new category of proactive cybersecurity awareness. Their industry-leading Cyber Exposure Platform adds a superior breadth and depth of intelligence from the Darkweb, Deep web and cyberspace forums and marketplaces to our dynamic awareness platform, typically 16 times more data than other solutions. By connecting threat intelligence with awareness, we can transform insight into foresight. Just imagine knowing an attack is likely coming and being able to train your employees with simulations of the actual phishing templates hackers purchased for their attack”.


“We are very excited to be partnering with Hoxhunt. Their best-in-class Cyber Awareness and Training platform allows organisations to adapt and defend against the ever rising volume of cyber threats that our platform identifies”.

Cyber Intelligence House’s CEO, Mikko Niemela

About Hoxhunt:

Hoxhunt is a People-First Cybersecurity Platform that protects organizations and their employees from the risk of cyber attacks. Hoxhunt’s cognitive automation maps individually adaptive training curriculum to each employee’s skill level for optimal engagement. Hoxhunt empowers individuals with the tools and confidence to recognize and respond to attacks dynamically over time.

Hoxhunt enables security teams with real-time visibility into threats so they can react fast and limit their spread. The entire platform is autonomous, freeing up considerable time for security teams to focus on what matters.

About Cyber Intelligence House:

Cyber Intelligence House is a leading cyber intelligence company specialised in helping cyber security professionals and law enforcement to assess and monitor cyber exposure from the dark web, deep web, data breaches and online-assets. It is the trusted provider to government and law enforcement agencies globally, including Interpol and UNODC.

Cyber Intelligence House’s Cyber Exposure Platform (CEP) provides the world’s most comprehensive Cyber Threat database with over 10 years of data. 24/7 and collection and storing of new data at a rate of ~600 pages per second. CEP delivers unrivalled search and alerting performance with Deep scanning of over 250 metadata factors and machine learning enabled categorization of threats to provide deep insights into potential cyber threats.

Spotlight

There are a growing number of security breaches happening daily to both individuals and businesses. As a result, organizations and online services have shifted efforts in recent years to help educate employees and end users on proper password hygiene, two-factor authentication, signs of a phishing scam, and so on. Despite our worsening state of online security, are we becoming more security-minded individuals, and better yet, are we putting it into practice? Ponemon Institute is pleased to present the results of The 2019 State of Password and Authentication Security Behaviors Report, sponsored by Yubico.


Other News
DATA SECURITY, ENTERPRISE IDENTITY

Cervello Partners with ST Engineering to Provide Cybersecurity for Rail Operational Networks

Cervello | October 19, 2022

Cervello, a global leader in rail cybersecurity, announced today a new strategic partnership with ST Engineering, a global technology, defense, and engineering group, to incorporate ST Engineering’s cybersecurity services as part of Cervello's patented rail security solution for rail operators and infrastructure managers. This partnership, which has already proven its value by securing the operations of one of the busiest rail networks in APAC, enhances Cervello's ability to offer and support its solution globally. “We are pleased to officially announce our already proven strategic cooperation with ST Engineering, a proven technology and engineering powerhouse, as a significant step toward Cervello's continued global expansion,” states Roie Onn, Cervello's CEO & Co-Founder. “Combining ST Engineering’s decades of experience in empowering cyber resilience across various sectors, together with Cervello’s unparalleled expertise in rail-specific security, we are able to globally support rail organizations with cybersecurity solutions and services that enable them to operate more safely and efficiently.” “Threats in the cyber-physical world are growing at an exponential rate and conventional ways of securing systems and assets are no longer sufficient. “The joint cybersecurity capabilities of ST Engineering and Cervello allow us to build a more comprehensive effective suite of cybersecurity rail solutions that is reliable and ensures business continuity for rail operators." Goh Eng Choon, President, Cyber, ST Engineering About Cervello Cervello accelerates rail digital transformation by securing the industry’s infrastructure and operations from cyber threats. Cervello offers the industry's leading dedicated rail security platform, enabling rail companies to safely deliver connected service. Cervello’s platform gives you the confidence to see, secure, and manage all ​assets connected to your ​critical ​network, combining OT, IoT, IT and physical systems, and turn the associated data into a powerful resource. This means the end of any compromise between security​, safety​ and usability – put simply, this allows you to ​operate with confidence​. The world’s leading rail operators and infrastructure managers trust Cervello to minimize threats and prevent cybersecurity incidents, thereby increasing their safety, reliability, business continuity and service availability.

Read More

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Datadog Launches Cloud Security Management to Provide Cloud Native Application Protection

Datadog | October 20, 2022

Datadog, Inc., the monitoring and security platform for cloud applications, today announced the general availability of Cloud Security Management. This product brings together capabilities from Cloud Security Posture Management (CSPM), Cloud Workload Security (CWS), alerting, incident management and reporting in a single platform to enable DevOps and Security teams to identify misconfigurations, detect threats and secure cloud-native applications. As organizations' cloud architectures become more complex, assessing security risks and collaborating across teams to mitigate them has become increasingly difficult. While security engineers are responsible for identifying threats and misconfigurations, DevOps teams are responsible for remediating them. DevOps and security teams often use multiple point solutions and tools to report on and resolve issues, but these tools provide an incomplete view of security risks and create silos between teams. Datadog's Cloud Security Management brings together observability and security insights across an organization's entire cloud environment—without the need to deploy additional agents. This shared context provides security engineers with deeper insights to collaborate with DevOps teams and more quickly remediate security issues. "Tight collaboration between security and DevOps teams is required to mitigate security risks in today's environments. This change has been brought on by the move to the cloud. Security teams today cannot take countermeasures alone without potentially impacting the performance and reliability of production systems. "Datadog Cloud Security Management helps these teams work together to remediate issues quickly by providing a single platform—as opposed to multiple point solutions—that delivers a complete view of an organization's infrastructure and risk exposure." Prashant Prahlad, VP of Product at Datadog "Using Cloud Security Management was like having a member of the InfoSec team embedded within our DevOps team," said Chad Upton, Vice President of Infrastructure at FirstUp. "All the security metrics were front and center so they could easily see the number of misconfigured resources in a single view and they didn't have to wait for someone from InfoSec to reach out and let them know there was an issue." "Because Datadog Cloud Security Management shows observability and security data together, alongside the resource relationship graph, we were able to remove cloud resources that were no longer in use and easily understand the impact of misconfigured cloud resources by visualizing all dependencies," said Ben Collen, Senior Director of Engineering and CISO at Vertex. Cloud Security Management expands on the foundational capabilities of cloud security posture management and cloud workload security of a CNAPP solution through: Resource Relationship Graph: By providing a visual risk assessment of misconfigured resources and vulnerabilities across an organization's cloud infrastructure, DevOps teams can take remedial actions based on the impact of the risk. Custom Detection Rules: Teams can now create fine-grained threat detection rules across all cloud resources—including their associated logs and security incident events. Resource Catalog (Beta): Engineers can access a comprehensive visual representation of all security risks associated with each cloud resource in a customer's environment and identify the owners of every cloud infrastructure resource to remediate vulnerabilities and misconfigurations. About Datadog Datadog is the monitoring and security platform for cloud applications. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.

Read More

DATA SECURITY, PLATFORM SECURITY

BigID Wins “Compliance Software Solution of the Year” in 6th Annual CyberSecurity Breakthrough Awards Program

BigID | October 11, 2022

BigID, the leading data intelligence platform for privacy, security, and governance, today announced that it has been awarded “Compliance Software Solution of the Year” in the 6th annual CyberSecurity Breakthrough Awards program conducted by CyberSecurity Breakthrough, a leading independent market intelligence organization that recognizes the top companies, technologies and products in the global information security market today. “This recognition from CyberSecurity Breakthrough highlights our commitment to providing customers with security and compliance solutions that are designed for today and tomorrow’s data challenges. “We designed BigID to be an actionable data intelligence platform built for enterprise scale - all while meeting continuously shifting compliance requirements.” Dimitri Sirota, CEO and co-founder of BigID The mission of the CyberSecurity Breakthrough Awards is to honor excellence and recognize the innovation, hard work and success in a range of information security categories, including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, Email Security and many more. This year’s program attracted more than 4,100 nominations from over 20 different countries throughout the world. “Organizations need to be able to find, classify, inventory, and manage all of their sensitive data, regardless of where or what it is. It's a momentous task and requires addressing common challenges including, but not limited to: Siloed data, lack of visibility and accurate insight, and balancing legacy systems with cloud data. All while meeting a litany of compliance requirements,” said James Johnson, managing director, CyberSecurity Breakthrough. “BigID is purpose-built to discover and manage all enterprise data - business, regulated, sensitive, critical, and personal data. A hearty congratulations on winning the ‘Compliance Software Solution of the Year’ award.” With BigID, customers can automate alerts on cross-border data-sovereignty violations, and ensure compliance with CCPA, GDPR, HIPAA, PCI and other data privacy and protection regulations and security frameworks. About BigID BigID's data intelligence platform enables organizations to know their enterprise data and take action for privacy, security, and governance. Customers deploy BigID to proactively discover, manage, protect, and get more value from their regulated, sensitive, and personal data across their data landscape. BigID has been recognized for its data intelligence innovation as a 2019 World Economic Forum Technology Pioneer, named to the 2021 Forbes Cloud 100, the 2021 Inc 5000 as the #19th fastest growing company and #1 in Security, a Business Insider 2020 AI Startup to Watch, and an RSA Innovation Sandbox winner. Find out more at https://bigid.com. About CyberSecurity Breakthrough Part of Tech Breakthrough, a leading market intelligence and recognition platform for global technology innovation and leadership, the CyberSecurity Breakthrough Awards program is devoted to honoring excellence in information security and cybersecurity technology companies, products and people. The CyberSecurity Breakthrough Awards provide a platform for public recognition around the achievements of breakthrough information security companies and products in categories including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, Web and Email Security, UTM, Firewall and more.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Malwarebytes and Stellar Cyber Partner to Investigate and Mitigate Cyber Threats

Malwarebytes | November 28, 2022

Malwarebytes, a global leader in real-time cyber protection, today announced a new partnership with Stellar Cyber, an industry-leading Open XDR platform that delivers comprehensive, unified security without complexity. The partnership helps resource-constrained teams produce consistent security outcomes across all environments; on-premises, cloud and anything in between. The partnership comes at a critical time in the cybersecurity landscape, as security products become more complex and IT teams spend more time maintaining their security controls, instead of investigating and mitigating cyber threats. According to a 2020 report from Palo Alto Networks, only 46 percent of security operations decision makers are satisfied with their current ability to detect threats. "They point to wasted time chasing false leads, poorly integrated security tools, and a large learning curve for effectively using those tools," according to the report. "Every security team should be able to deliver continuous, consistent security regardless of their skills or experience. "By tightly integrating Malwarebytes' cutting-edge EDR technology with the Stellar Cyber Open XDR platform, IT teams are able to close the gaps between security controls that attackers exploit." Andrew Homer, Vice-President of Technology Alliances at Stellar Cyber The integration pairs Malwarebytes' EDR solution–which collects detailed threat information for analysis and investigation–with the Stellar Cyber Open XDR Platform that ingests, normalizes, and enriches security data, including endpoints, network, cloud and logs into a single repository. Malwarebytes EDR collects critical endpoint and server data and sends it to Stellar Cyber, which analyzes the data to identify potential threats. As security analysts complete investigation in Stellar Cyber, response actions are sent to Malwarebytes to eliminate the threat. "Today's IT and security teams spend more time sifting through data than eliminating actual threats. Organizations need real-time data sharing and visibility to enable decisive actions before attackers are successful," said Brian Thomas, Malwarebytes Vice President of Worldwide MSP and Channel programs. "Stellar Cyber shares our mission to simplify cybersecurity for resource-constrained organizations. Together we uniquely deliver an intelligent and automated solution that allows security teams to be more efficient, and organizations more productive and protected." About Stellar Cyber Stellar Cyber Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to successfully secure their environments. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley. About Malwarebytes Malwarebytes believes that when people and organizations are free from threats, they are free to thrive. Founded in 2008, Malwarebytes CEO Marcin Kleczynski had one mission: to rid the world of malware. Today, that mission has expanded to provide cyberprotection for every one. Malwarebytes provides consumers and organizations with device protection, privacy, and prevention through effective, intuitive, and inclusive solutions in the home, on-the-go, at work, or on campus.

Read More

Spotlight

There are a growing number of security breaches happening daily to both individuals and businesses. As a result, organizations and online services have shifted efforts in recent years to help educate employees and end users on proper password hygiene, two-factor authentication, signs of a phishing scam, and so on. Despite our worsening state of online security, are we becoming more security-minded individuals, and better yet, are we putting it into practice? Ponemon Institute is pleased to present the results of The 2019 State of Password and Authentication Security Behaviors Report, sponsored by Yubico.

Resources