Data Security

Terralogic Adopts Stellar Cyber’s Open XDR Security Platform to Deliver Comprehensive View of Customer Security

Stellar Cyber, the leading security operations platform for MSSPs and innovator of Open XDR, announced today that a top 250 MSSP and technology integrator Terralogic has adopted the Stellar Cyber Open XDR platform to bring new levels of visibility and security to its customers across India.

“We are always seeking new tools that help us deliver world-class security services for our customers,” said Sandeep Vijayaraghavan, VP of Cybersecurity at Terralogic. “The Stellar Cyber Open XDR platform is the first we’ve seen that unifies and correlates data from our various security tools to present a single, comprehensive view of our customers’ security.”

Unlike stand-alone tools that simply capture device logs or protect network endpoints, Stellar Cyber’s Open XDR platform aggregates data inputs from all existing security tools, analyzes it for anomalies, and presents contextual, prioritized security incidents in an intuitive dashboard. For the first time, Stellar Cyber’s platform gives MSSP security professionals a single console to view customers’ entire security profiles and to take quick action when threats are detected.

“We aim to be the leading MSSP in the Indian subcontinent, and for years we have offered a range of cybersecurity services to our customers,” said Renil Komitla, CEO of Terralogic. “Stellar Cyber’s platform gives us a new ability to rise above the competition.”

“When an MSSP has dozens or hundreds of customers, it’s impossible to keep up with cyberattacks in a timely manner using siloed security tools,” said Brian Stoner, VP of the MSSP business unit at Stellar Cyber. “Our automated and intuitive platform helps MSSPs like Terralogic see the big picture and get a true grasp of what’s going on in a network and how to remediate issues.”

About Terralogic
Terralogic is the ideal cyber-expert for the next generation business. We provide intelligent cybersecurity solutions that help customers define the right framework, and our solutions include VAPT, Compromise Assessment, Cloud Security, Threat Hunting, Security Solution Deployment & Incident Management. Since 2008, Terralogic has been rendering futuristic technology services for the forward-looking connected world. Our target centric DNA ensures ahead of the time engineering expertise following client roadmap and business needs. Our services encompass, UI/UX, Digital Transformation, Engineering, SAAS, IT Infrastructure services, MSSP, Cloud and Support Services, not to mention our innovations in the field of Emerging technologies viz IoT, AR/VR, and Data Science. We deep dive into enterprise goals to get to the heart of the criteria, maintaining a macro-view while researching trends and evolving models. Terralogic provides advisory consulting and IT services for Automotive, Communications, Construction, E-commerce, Gaming, Healthcare, Manufacturing, Media & Entertainment, Retail, Travel & Transportation industries.

About Stellar Cyber
Stellar Cyber’s Open XDR platform delivers Everything Detection and Response by ingesting data from all tools, automatically correlating alerts into incidents across the entire attack surface, delivering fewer and higher-fidelity incidents, and responding to threats automatically through AI and machine learning. Our XDR Kill Chain™, fully compatible with the MITRE ATT&CK framework, is designed to characterize every aspect of modern attacks while remaining intuitive to understand. This reduces enterprise risk through early and precise identification and remediation of all attack activities while slashing costs, retaining investments in existing tools and accelerating analyst productivity. Typically, our platform delivers an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley.

Spotlight

Cyber attacks are increasing in volume, sophistication, and severity, and the federal government has taken notice. Now, they’re taking action — most recently in the form of new cybersecurity rules from the Securities and Exchange Commission. In “11 Ways to Streamline SEC Cybersecurity Compliance with Risk Cloud,” we explore a va


Other News
Software Security

Malwarebytes Announces Consumer Identity Theft Protection Solution to Defend Against Online Fraud and Theft

PR Newswire | October 27, 2023

Malwarebytes, a global leader in real-time cyber protection, today launched an essential new consumer solution, Identity Theft Protection. The new service helps individuals secure their digital identities and defend against identity and online threats. Malwarebytes Identity Theft Protection includes real-time identity monitoring and alerts, robust credit protection and reporting and live agent-supported identity recovery and resolution services – backed by up to a $2 million identity theft insurance policy. The new service, paired with Malwarebytes' award-winning antivirus and VPN software, helps prevent criminals from stealing or using personal information to drain financial accounts, hack or impersonate social media accounts, damage a user's reputation or other online and identity-based attacks. Today's digital life is complex and sometimes deceptive. According to new research from Malwarebytes, identity theft ranks as people's third biggest concern when it comes to online security, just behind fear of financial accounts and personal data being breached – both of which play into identity theft. Of those surveyed 64% agree that identity theft protection is important, but only 13% have it. Consumers are also increasingly fearful of new technology. Malwarebytes gives consumers protection they can trust, alerting them when we see their information has been stolen and providing live agent support to restore their identity and replace lost items. Even as we spend more and more of our lives online, we all know that the internet today can't be trusted, said Mark Beare, GM of Consumer Business Unit, Malwarebytes. Consumers need a tool that not only blocks threats like malware and phishing, but that also monitors and protects their digital identity, be that social media profiles, bank accounts or email. With Malwarebytes Identity Theft Protection, we provide a robust and exhaustive suite of services so individuals and families can rest easy knowing that we are actively working to keep them safe and protect their digital identity. Malwarebytes Identity Theft Protection is available globally through a variety of tiered offerings that provide protection via computers and mobile devices across multiple operating systems including Windows, macOS, Android and iOS. Key features include: Identity Monitoring & Alerts: Continuously scours a multitude of websites and data sources, including the Dark Web, to alert if personal information is being illegally traded or sold. Recommends actions to take to protect yourself. Credit Monitoring and Protection: Ongoing tracking of credit for critical changes, such as new accounts or inquiries and applications for new lines of credit. A credit freeze also can be activated*. Breach IQ: Provides a safety score and alerts if personal information is part of a known breach*. Identity Recovery & Resolution: Assistance in the event of an identity theft incident, including guided steps to report the crime, dispute fraudulent charges, restore identity and recuperate financial losses incurred. Includes up to a $2 million insurance policy. About Malwarebytes Malwarebytes believes that when people and organizations are free from threats, they are free to thrive. Founded in 2008, Malwarebytes CEO Marcin Kleczynski had one mission: to rid the world of malware. Today, Malwarebytes' award-winning endpoint protection, privacy and threat prevention solutions along with a world-class team of threat researchers protect millions of individuals and thousands of businesses across the globe daily. Malwarebytes solutions are consistently recognized by independent tests including AVLAB and AV-TEST. The company is headquartered in California with offices in Europe and Asia. For more information and career opportunities, visit https://www.malwarebytes.com.

Read More

Software Security

ZeroFox Unveils New Anti-Phishing Features to Stop Attacks at Source

ZeroFox | September 22, 2023

ZeroFox, an industry-leading provider of enterprise software-as-a-service for external cybersecurity, has announced the unveiling of multiple anti-phishing product enhancements. These updates solidify ZeroFox's position as the world leader in digital risk protection. Developed using cutting-edge AI/ML technologies and designed by a team of top-tier security experts, these new anti-phishing features boost escalated alert volume, reduce the occurrence of false positives, and expedite the process from threat identification to initial disruption and successful takedowns for all our customers. The importance of these new features cannot be overstated, especially given the rising threat landscape. In the first half of 2023, ZeroFox Intelligence has recorded a substantial increase in the volume and complexity of phishing attacks, including a 30% surge in domain takedowns compared to the first half of 2022. New ZeroFox phishing trend research also highlights the adoption of evasion techniques like cloaking alongside emerging tactics such as SEO poisoning and phishing-as-a-service. These developments underscore the critical role of these new capabilities in safeguarding against evolving cyber threats. Continuous and Complete Protection Against Domain-based Threats ZeroFox adopts a unique approach to phishing compared to email security and conventional anti-phishing providers. Its strategy revolves around the identification, disruption, and elimination of the domains necessary for launching phishing campaigns. With daily monitoring of over 65 million domains, ZeroFox combats various threats like typo squats, subdomain spoofs, homoglyphs, and other malicious domain and URL-based attacks, effectively shielding customers and preventing any disruptions to business operations. Incorporate advanced domain protection capabilities to enhance their cybersecurity measures, aiming to achieve substantial and measurable business outcomes: Reduce Phishing Risks with Anti-Cloaking Capabilities: Strengthen Compliance and Trust with SSL Monitoring Secure Brand Identity with Favicon Search Improve Operational Efficiency with Enhanced Subdomain Coverage Enhance User Experience (UX) with Weblog Monitoring Mike Price, Chief Technology Officer of ZeroFox, said, ZeroFox has been detecting and disrupting phishing attacks for the last decade, constantly enhancing our solution to protect our customers from changing phishing techniques used by threat actors, including the widespread use of malicious cloaking and subdomains techniques. [Source – Globe Newswire] Price stated that the enhanced capabilities being announced represented their ongoing commitment to tackling the increasing phishing challenge encountered by security teams. He emphasized that as phishing continued to evolve, ZeroFox would remain a trusted anti-phishing partner dedicated to safeguarding customers from both current and future phishing techniques. About ZeroFox ZeroFox, a prominent enterprise software-as-a-service provider in the field of external cybersecurity, has revolutionized security beyond the corporate perimeter on the internet, where businesses conduct their operations and threat actors are active. Their platform seamlessly integrates cutting-edge AI analytics, digital risk and privacy protection, full-spectrum threat intelligence, and a robust set of breach, incident, and takedown response tools. This enables them to uncover and disrupt various threats, including phishing and fraud campaigns, botnet exposures, impersonations, credential theft, data breaches, and physical threats that target domains, brands, personnel, and assets.

Read More

Data Security

Cohesity and Carahsoft Partner to Offer Data Security to Public Sector

Cohesity | September 07, 2023

Cohesity, an industry leader in data security and management, and Carahsoft Technology Corp., a provider of trusted government IT solutions, announced entering into a partnership. Under the agreement, Carahsoft plans to act as a distributor for Cohesity, making Cohesity's data cloud platform accessible to the Public Sector via Carahsoft's reseller partners, Information Technology Enterprise Solutions – Software 2 (ITES-SW2), NASA Solutions for Enterprise-Wide Procurement (SEWP) V, National Association of State Procurement Officials (NASPO) ValuePoint, OMNIA Partners, National Cooperative Purchasing Alliance (NCPA), and E&I Cooperative service contract. The extensive data cloud platform from Cohesity consolidates data sources, assists in the elimination of infrastructure silos, and automates data management tasks. The platform streamlines data management by offering a single, user-friendly interface for managing data in cloud, on-premises, and edge environments. Cohesity's data security and management solutions offer the public sector with granular control over their data, enabling them to comply with legal and regulatory requirements and protect sensitive data. The Cohesity Data Cloud’s key capabilities include: Data Protection: Captures backup copies of data that are preserved inalterably and are instantaneously recoverable in an instance of a ransomware attack or other business disruptions. Data Security: Provides enhanced resilience to cyber threats via cyber vaulting, data classification, threat intelligence and scanning, and bidirectional integration with the security operations center of agencies. Data Mobility: Enables agencies to transfer data across hybrid multi-cloud environments in a secure and efficient manner, thereby reducing costs and increasing flexibility. Data Access: Eliminates unnecessary copies and efficiently manages files and objects at scale. Data Insight: Enables agencies to search, classify, and analyze data worldwide across their entire infrastructure in order to provide business value or pinpoint sensitive data for compliance. Kit Beall, Chief Revenue Officer at Cohesity, said, We are pleased to partner with Carahsoft and its resellers to provide U.S. government agencies with powerful novel capabilities based on our leadership position in data security and management. [Source – GlobeNewswire] Beall also added that they look forward to expanding their strategic partnership with Carahsoft to assist public sector customers in strengthening their cyberspace resilience in the face of evolving advanced adversaries. About Cohesity Cohesity is an industry leader in AI-powered data management and security. The company makes it simple to secure, protect, manage, and extract value from data — across the data center, cloud, and edge. It provides organizations with comprehensive data security and management capabilities, such as AI-based threat detection, immutable backup snapshots, and monitoring malicious behavior, among others, to defend against cybersecurity threats. About Carahsoft Carahsoft Technology Corp. is a trusted government IT solutions provider serving public sector organizations across local, state, and federal government agencies and healthcare and education markets. As the master government aggregator for vendor partners, the company provides solutions for multicloud, DevSecOps, cybersecurity, Big Data, AI, customer experience and engagement, open source, and other domains. Working with resellers, systems integrators, and consultants, Carahsoft's sales and marketing teams provide hundreds of contract vehicles with industry-leading IT products, services, and training.

Read More

Software Security

Keeper Security Protects Against Supply Chain Attacks with New Open Source Project

PR Newswire | October 20, 2023

Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software protecting passwords, passkeys, privileged access, secrets and remote connections, today announces a new open source project for software developers and DevOps to easily and securely sign git commits with their Keeper vault. Through Keeper Secrets Manager (KSM), users can now use Secure Shell (SSH) keys stored in their Keeper Vault to digitally sign commits to confirm the authenticity of their code. Git is a version control system that tracks changes in your software projects, and a git commit is a snapshot of these changes at a specific point in time, accompanied by a brief message describing the modifications. Keeper and developers at The Migus Group teamed up to create the open-source solution to sign git commits using the SSH keys stored in a user's Keeper Vault. The integration provides developers with a secure and encrypted repository for their SSH keys and removes the practice of storing them on disk, both increasing security and streamlining DevOps workflows. The rise in software supply chain attacks highlights the need for organizations to prioritize security around the software supply chain. Signing git commits is a recommended best practice for developers to confirm the authenticity and integrity of code releases. As developers sign commits with SSH keys, they are provided with cryptographic proof of authorship, which helps secure the supply chain by assuring users the software originates from a legitimate source and remains unaltered since its signing. Digital signatures can also feed into a Software Bill of Materials (SBOM) to indicate whether a line-item in the SBOM is trusted, depending on the code signature status. The ability to store SSH keys and other credentials in Keeper Vault offers a layer of protection and ease-of-use that hasn't been the standard, said Craig Lurey, CTO and Co-founder of Keeper Security. Our integration enables developers to validate the software code with a cryptographic digital signature and transparent logging, making what historically has been a complex process into a simple one. In the future, all code will be signed, and the software supply chain will have one source of truth that will reduce supply chain attacks. "Our customers are asking for help insulating themselves from supply chain attacks, so we were already working to do that, often using Keeper," said Adam Migus, Founder and CEO of The Migus Group. "So, we thought working with them to make the git commit-signing process both safer and easier would be a win-win-win. Our customers can now seamlessly sign commits with keys that never leave their vaults. However, the broader community also gains an example of secure commit signing with benefits of central key management." The SSH keys for signing commits are secured in KSM, a fully managed cloud-based, zero-knowledge platform for securing infrastructure secrets such as API keys, database passwords, SSH keys, certificates and any type of confidential data. KSM eliminates secrets sprawl by removing hard-coded credentials from source code, config files and CI/CD systems. The fully managed, cloud-based and IT friendly solution was named an overall leader on the 2023 KuppingerCole Leadership Compass for Secrets Management. KSM is supported on Windows, MacOS and Linux. It utilizes a zero-knowledge security architecture and is highly secure withISO 27001 and SOC 2 compliance, as well as FedRAMP and StateRAMP Authorization, among numerous other certifications. Keeper's integration helps support a broader government and industry effort to bring increased security and visibility to the open source community. The ease of providing a cryptographic digital signature allows developers to validate that the software in use is exactly what it is claiming to be and enhances security for both developers and end-users alike. About Keeper Security Keeper Security is transforming cybersecurity for organizations around the world with next-generation privileged access management. Keeper's zero-trust and zero-knowledge cybersecurity solutions are FedRAMP and StateRAMP Authorized, FIPS 140-2 validated, as well as SOC 2 and ISO 27001 certified. Keeper deploys in minutes, not months, and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by thousands of organizations to protect every user on every device, Keeper is the industry leader for best-in-class password management, secrets management, privileged access, secure remote access and encrypted messaging. Learn more at KeeperSecurity.com.

Read More

Spotlight

Cyber attacks are increasing in volume, sophistication, and severity, and the federal government has taken notice. Now, they’re taking action — most recently in the form of new cybersecurity rules from the Securities and Exchange Commission. In “11 Ways to Streamline SEC Cybersecurity Compliance with Risk Cloud,” we explore a va

Resources