SOFTWARE SECURITY

Talon Launches First Corporate Secure Browser for the Hybrid Work Era Backed by Renowned Cyber Security Industry Leaders

Talon | October 08, 2021

Talon Cyber Security, the leader in browser-based security solutions for the distributed workforce, launched TalonWork, a first-of-its-kind browser-based endpoint solution created to address the unique threats imposed by the hybrid workforce and designed with employee experience in mind.

Talon also announced investment from top cyber security global leaders: George Kurtz, CEO of CrowdStrike, John Thompson, until recently Microsoft's Chairman of the Board and former CEO of Symantec, and Mark Anderson, CEO of Alteryx and previously the President of Palo Alto Networks.

"Today's work from anywhere world demands a flexible and secure working environment, and as a result, modern security must be frictionless by design," said George Kurtz, co-founder and CEO of CrowdStrike. "Talon's browser-based security solution takes a fresh approach, putting the user experience front and center while extending the security of the enterprise."

Talon is working with some of the largest employers in the US to protect their evolving global hybrid workforce via its unique patent-pending technology. Talon's corporate browser can be deployed across the organization in less than an hour, empowering security leaders to make the browser their first line of defense with minimum complexity, cost and without additional hardware. With hassle-free operation, Talon allows organizations to better secure and control access to sensitive data and resources, accelerates onboarding in multiple work scenarios and enables rapid and efficient endpoint disaster recovery.

"With the shift towards a hybrid workforce, more known and unknown devices are accessing the organization's most sensitive data on premise and in the cloud. Therefore, we must ensure frictionless and secure access to the data, no matter the device or the employee location. Talon provides exactly that," explained John Thompson, recent former Microsoft Chairman.

"It is equally important that the next generation of cyber solutions are designed for ease of use, and optimized for a remote work environment," explained Mark Anderson, former President of Palo Alto Networks. "In this regard, Talon's solution is spot on."

The workforce revolution and increasing reliance on SaaS services, accelerated by the pandemic, made the browser a main gateway to the organization. The browser is also the most vulnerable application according to CVE; and the industry has witnessed info-stealers extracting credentials stored in browsers, malicious extensions stealing corporate data and browser zero-days exploited in the wild. Earlier this month, Google issued a critical fix for 2 billion Chrome users, Chrome's 11th 'zero day' exploit reported this year. On top of it all, malicious downloads and phishing attacks, which are the means for ransomware, are most likely to occur in the browser, where the user is more susceptible to these attacks.

Talon's multi-layered approach provides enterprise-grade security regardless of the endpoint: resilience against malware on the device, browser hardening against zero-day exploits and data leakage prevention mechanisms integrated in the browser. With Talon, security leaders gain full context-aware visibility into all work-related activity in the browser, gaining better control and governance across sanctioned and unsanctioned SaaS services as well as internal web applications.

To enable this instant shift to distributed workforce, many organizations were forced to quickly patch security gaps using their current IT stack. Talon offers a new and first to market approach and a strategic alternative that is practical and more sustainable,We are honored to have the leaders who shaped the face of cybersecurity on board with us, sharing our vision and mission.

Ofer Ben Noon, Talon's Co-founder and CEO

About Talon Cyber Security 
Talon Cyber Security is the pioneer in cyber security solutions for the hybrid workforce. Talon's browser-centric security approach is redefining enterprise cyber security by making the browser the organization's first-line of defense and leveraging it to enable and secure the distributed workforce. Deployed in less than one-hour, Talon provides security leaders with unprecedented visibility into all employee corporate activity across locations, devices and SaaS services. Talon's technology is built with employee-experience and privacy in mind, providing a native and frictionless experience, on top of superior enterprise-grade security. Talon's founders include proven entrepreneurs and former leaders of Unit 8200, Israel's elite military technology and intelligence unit.

Spotlight

Despite the dangerous security landscape for businesses today, many are only reactive when it comes to a security breach. This infographic dives into game-winning strategies to go on the defensive line when it comes to hackers, and what to do proactively to keep your data safe.


Other News
DATA SECURITY

HackNotice Releases First-Ever Combined Security and Threat Awareness Service for Free

HackNotice | February 07, 2022

HackNotice, the world's leading threat awareness company, announced the first-ever security and threat awareness combined service, accessible to new and existing users. The added security awareness training course enables individuals to deepen their understanding of good cyber hygiene practices. The course offers 50 training videos, a security exam, and a certification. Cybersecurity training is mostly offered to company employees, often costing hundreds of thousands of dollars for intensive, week-long seminars and lectures. However, having good security awareness is vital for any individual. The newly released self-paced course ensures that anyone online can learn good cyber practices. "What makes the combined service great is that our threat modeling and security awareness course work together. When someone faces a large amount of personal information exposure, we recommend more phishing training. When someone has several passwords stolen, we have them focus on our password training. Now, users can receive the critical training that they need instantly, tailored to their specific risks," Steve Thomas, CEO, and Co-Founder of HackNotice For customers of HackNotice Teams, HackNotice's security and threat awareness service, the new course is an excellent addition for companies looking to strengthen their enterprises' security programs. Quick, in-the-moment, lessons are a perfect way to engage employees and business departments within the organization. Clients can also access dynamic reports to see user and departmental progress, and areas of improvement. About HackNotice Hacknotice is the only company-wide threat awareness platform, making employees more cautious online. Users monitor, review, and take swift actions against their real cyber-threats. The platform focuses on bridging the gap between security teams and other employees through real-time alerts, around-the-clock monitoring, recovery recommendations, and additional education. HackNotice's mission is to make all employees threat aware, creating a resilient culture of security.

Read More

SOFTWARE SECURITY

Illumio Collaborates with IBM Security to Bolster Cyber Resilience for Modern Organizations

Illumio | May 06, 2022

Illumio, Inc., the Zero Trust Segmentation company, today announced an expanded relationship with IBM Security and a new integration between the companies’ technologies for advanced end-to-end threat detection and response. The integration combines IBM Security QRadar XDR with Segmentation from Illumio to provide pre-attack protections for accelerated detection and automated containment and remediation capabilities to help defend against the impacts of aggressive cyberattacks, including ransomware. “In 2021, over half of organizations globally reported suffering a ransomware attack that blocked access to critical systems or data,” said Frank Dickson, Program Vice President at IDC. “As ransomware, and the attackers behind it, continues to plague every industry, organizations must act now to bolster cyber and business resiliency. The best way firms can safeguard their organizations is to address the five core elements of a ransomware attack: initial compromise, lateral movement, privilege escalation, data exfiltration and the encryption. Given the complexity and difficulty of the task, security tools should be adaptable, scalable and emphasize real-time visibility to enable real-time action.” The integration provides customers with enhanced visibility into network traffic and can help limit the potential spread of attacks by segmenting application networks. When an intrusion takes place, an attacker’s external communication and movement throughout an organization’s network can be quickly detected, denied, and analyzed with the help of Illumio and QRadar SIEM. This centralized visibility and analysis can help with the detection of threats and ransomware that moves, often undetected, throughout organizations. Beyond detection, Illumio’s integration with QRadar SOAR enables incident responders to activate Illumio’s emergency ransomware containment controls in near real time, helping them to reduce the impact of ransomware and accelerate the eradication and recovery process. “The onslaught of ransomware attacks demands end to end visibility, advanced analytics and automated actions based on an open platform – which are the foundational elements on which QRadar XDR was designed. “By leveraging its open architecture and segmentation platforms like Illumio, QRadar XDR helps customers achieve early detection, orchestration, and rapid, automated response to ransomware and other fast-moving attacks.” Chris Meenan, VP of Product Management at IBM Security “In February 2022, the Cybersecurity and Infrastructure Security Agency reported ransomware incidents against 14 of the 16 U.S. critical infrastructure sectors, which signals the urgent business resilience risk it poses,” said John Skinner, VP, Business Development at Illumio. “Not only is ransomware today becoming more sophisticated and targeted, but incident rates are climbing. Successful detection and response depends on segmentation aligned with Zero Trust principles to isolate and stop ransomware before it spreads. Together, Illumio and IBM Security are empowering organizations to minimize the business impact of devastating attacks by combatting known risks at every phase.” About Illumio Illumio, the Zero Trust Segmentation company, prevents breaches from spreading and turning into cyber disasters. Illumio protects critical applications and valuable digital assets with proven segmentation technology purpose-built for the Zero Trust security model. Illumio ransomware mitigation and segmentation solutions see risk, isolate attacks, and secure data across cloud-native apps, hybrid and multi-clouds, data centers, and endpoints, enabling the world’s leading organizations to strengthen their cyber resiliency and reduce risk.

Read More

SOFTWARE SECURITY

Sysdig Open Source Is Extended to Secure Cloud Services

Sysdig | May 16, 2022

Sysdig, the unified container and cloud security leader, announced that Sysdig open source, the incident response standard for containers, has been extended to the cloud. Using system calls, Sysdig open source (Sysdig OSS) traditionally offers deep observability into running applications, as well as file system access and network activity, which speeds incident response and troubleshooting. Teams can quickly filter information from Sysdig OSS and take action. With the announcement of this new integration, these capabilities have been extended beyond containers to any cloud environment. Today, Sysdig announced Edd Wilder-James has joined Sysdig from Google to lead the company’s open source ecosystem team. The complexity of cloud-native applications – with countless components and variables – makes it extremely difficult for security analysts and system administrators to quickly triage alerts and debug problems. Sysdig OSS captures process, file system, and network activity in real time and with a high degree of granularity. The tool, which has nearly two million downloads and 6,850 GitHub stars, surfaces everything from executed commands and file system activity to network activity. Sysdig OSS then offers advanced filtering and troubleshooting capabilities, supporting root cause analysis for security and performance issues.Using a new plugin framework – originally developed by the open source community for the CNCF project Falco – Sysdig extends the number of sources Sysdig OSS can be connected with to anything that generates logs or events, including Azure, Google, and AWS CloudTrail logs. Going forward, every plugin developed for Falco can also be leveraged by Sysdig OSS. Using one tool, like Sysdig OSS, to observe events from the entire cloud-native environment streamlines investigations. Using a different tool for each environment adds complexity, which makes it massively harder to troubleshoot. Sysdig’s Commitment to Open Source Sysdig was founded as an open source company and Sysdig Secure and Sysdig Monitor were both built on an open source foundation to address the security challenges of modern cloud applications. Both projects were created by Sysdig to leverage deep visibility as a foundation for security, and they have become standards for container and cloud threat detection and incident response. Falco, which was contributed to the CNCF in 2018, is now an incubation-level hosted project with more than 45 million downloads. Sysdig OSS and Falco can be used together as a powerful open source solution to reduce risk at runtime. Sysdig OSS acts as a flight recorder, capturing a detailed record for inspection. Falco acts as a security camera, continuously detecting unexpected behavior, configuration changes, intrusions, and data theft in real time. Teams can use Sysdig OSS and Falco together to detect and respond to threats. “If you want to see what is going on inside an application, Sysdig OSS gives you that record. “Sysdig open source was the inspiration for Falco. While Falco will monitor and alert based on your policies, Sysdig open source will tell you what happened at a particular time, before and after the event. Having the ability to use both open source tools in the cloud is extremely powerful.” Loris Degioanni, Founder and CTO of Sysdig About Sysdig Sysdig is driving the standard for cloud and container security. The company pioneered cloud-native runtime threat detection and response by creating Falco and Sysdig as open source standards and key building blocks of the Sysdig platform. With the platform, teams can find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance. From containers and Kubernetes to cloud services, teams get a single view of risk from source to run, with no blind spots, no guesswork, no black boxes. The largest and most innovative companies around the world rely on Sysdig.

Read More

INFOSEC PROJECT MANAGEMENT

TestArmy Partners with HUB Security for Advanced Cyber Security Solutions

HUB Security | April 28, 2022

Today, HUB Security , a secure computing solutions provider, announced it has signed a strategic partnership with testing and cyber security leader, TestArmy, to offer HUB Security's Advanced DDoS Simulation Platform - D.Storm. HUB Security will be TestArmy cyber security partner to enhance current offerings and work together to reach ransomware resilience in the polish and central European market. TestArmy Group is one of the fastest growing testing companies in Central Europe. Specializing in cyber security and quality assurance of digital products. "With organizations challenged with increasing and new cyber incidents, we see great value in partnering with TestArmy and developing together future cyber solutions for the European market." Eyal Moshe, CEO and co-founder of HUB Security "With the growing list of customers we help protect and require the most advanced security solutions to maintain their operations," said Wojciech Humiński, CEO at TestArmy. "HUB Security's solutions will allow our customers a higher level of cyber readiness facing current and new cyber threats." About HUB Security HUB Security was established in 2017 by veterans of the 8200 and 81 elite intelligence units of the Israeli Defense Forces. The company specializes in unique Cyber Security solutions protecting sensitive commercial and government information. The company debuted an advanced encrypted computing solution aimed at preventing hostile intrusions at the hardware level while introducing a novel set of data theft prevention solutions. HUB operates in over 30 countries and provides innovative cybersecurity computing appliances as well as a wide range of cybersecurity professional services worldwide. About TestArmy TestArmy Group is one of the fastest growing testing companies in Central Europe according to the Deloitte ranking (2019). Security, UX and Quality Assurance testing company with 80+ professional IT software testers/pentesters who possess ISTQB or other world renowned certificates.

Read More

Spotlight

Despite the dangerous security landscape for businesses today, many are only reactive when it comes to a security breach. This infographic dives into game-winning strategies to go on the defensive line when it comes to hackers, and what to do proactively to keep your data safe.

Resources