US Scraps Missiles Over Cybersecurity Concerns

Infosecurity | March 13, 2020

America has abandoned plans to introduce an Israeli-made missile system over fears that it may not be cyber-secure. The US Army spent $373m on the purchase of two batteries of Iron Dome missiles last year. Plans to spend a further $600m on two new batteries and Iron Dome components by 2023 have now been scrapped after Israel reportedly refused to hand over the system's source code. Without access to the source code, the army cannot integrate the batteries with its other air defense systems. The army is concerned that failure to integrate the batteries could create serious cybersecurity vulnerabilities. Speaking to the House Armed Services Tactical Air and Land Forces Subcommittee on March 5, Gen. Mike Murray, commander of Army Futures Command, said: "It took us longer to acquire those [first] two batteries than we would have liked.

Spotlight

Governments around the world are undergoing change. Whether reducing data center footprints, virtualizing existing services to reduce costs and "go green", or advancing security strategies to thwart advanced attacks in the field or at home, governments are demanding more from their cybersecurity solutions today.


Other News
SOFTWARE SECURITY

UL Launches New SafeCyber™ Solution and Platform Features to Address Mounting Security Threats

UL | June 07, 2022

UL, a global safety science leader, today announced the latest enhancements to its product security and compliance life cycle management platform, SafeCyber. Launched last year, SafeCyber aims to democratize product security and empower device manufacturers, suppliers and system integrators to take charge of their connected ecosystems and mitigate growing threats from chip to cloud. Amid an uptick in supply chain attacks, a shortage of security expertise and a dynamic regulatory environment, UL's new SafeCyber dashboard provides users with a comprehensive view of their product security maturity and projects in one place. SafeCyber also provides an easy-to-use portal to help users discover available device life cycle solutions to better manage and secure their ecosystems. Through this new dashboard, users can view all their product security testing and evaluation activities in a single, central location. The new feature provides visibility on the security maturity of their product lines and certification readiness to industry standards, including ISA/SAE 21434 and IEC 62443 4-1, among others. Additionally, UL formally announced Binary Check™, a new SafeCyber platform solution. Binary Check allows users to perform continuous, automated binary code analysis to ensure ongoing security and compliance readiness of connected devices and systems. This new solution includes the ability to generate a software bill of materials (SBOM), detect and manage vulnerabilities for faster remediation and obtain compliance readiness analysis. "The skyrocketing adoption of connected devices creates countless benefits and opportunities but also leads to an increasingly large and attractive attack vector for bad actors. "As devices become progressively connected, it's challenging for businesses to keep up with growing device and security system complexities, making them vulnerable to ransomware and firmware attacks. Hardening security requires a proactive approach. At UL, we are committed to enabling organizations to innovate and bring products to the marketplace safely and securely. With SafeCyber, customers benefit from a 360-degree view of their security governance and processes to better manage and mitigate product security risks." David Nosibor, platform solutions lead, Identity Management Security and head of UL's SafeCyber project About UL UL is a global safety science leader. We deliver testing, inspection and certification (TIC), training and advisory services, risk management solutions and essential business insights to help our customers, based in more than 100 countries, achieve their safety, security and sustainability goals. We believe our deep knowledge of products and intelligence across supply chains make us the partner of choice for customers with complex challenges.

Read More

SOFTWARE SECURITY

Noetic Cyber Delivers Platform Update to Bring Data Science into Cyber Asset Management

Noetic Cyber | June 06, 2022

Noetic Cyber, an innovator in Cybersecurity Asset Attack Surface Management (CAASM), today announced the availability of a new version of its Continuous Cyber Asset Management and Controls platform. The latest version of the Noetic platform is focused on delivering immediate time to value for security teams by identifying high priority security gaps and exploitable vulnerabilities, using innovative data science techniques. Since its public launch in July 2021, Noetic has been working with security leaders in the United States and the United Kingdom to help them reduce their growing attack surface and improve their cybersecurity posture. The challenge these cyber leaders often face is to understand cyber risk across complex environments, where assets can exist for a short period of time in public or private cloud platforms, as well as having to manage legacy on-premises workloads. To gain the insights needed to be effective, they need confidence in their data quality, full visibility across all assets and contextual intelligence to help prioritize decision making. "The continued innovation we are delivering reflects the expanding use cases we see across our customer base. "Security teams are putting cyber asset intelligence at the heart of their security programs and our ability to continuously adapt and respond to changing environments is critical to their success." Paul Ayers, CEO and co-founder, Noetic Cyber Delivering Immediate Time to Value Security teams need to know what assets they have, and understand which ones are creating the most cyber risk. Noetic is delivering innovative cyber asset intelligence to help customers assess their current cyber posture readiness and focus the security team's efforts on the highest priority activities. The Noetic platforms helps customers successfully do this with: External Cyber Asset Intelligence – Mapping industry data including CISA's Known Exploited Vulnerabilities catalog, MITRE ATT&CK® mitigations and others to provide greater context on asset risk and exposure. Coverage Gap dashboards –Helping security teams quickly identify common and easily resolved security coverage gaps. Support for ad-hoc security data – Many organizations keep important information on critical applications or security risks in spreadsheets. Noetic's new data ingestion capability supports importing ad-hoc data into the model. Simplifying and Extending Cyber Asset Management use cases The Noetic platform uses Graph database technology to map cyber relationships between assets. This innovative technology approach enables Noetic to navigate deep hierarchies and find hidden connections, providing the context to help security teams to make more informed decisions. The latest release of the Noetic platform builds on native Graph capabilities to deliver additional value such as: Understanding & improving data quality –Noetic's new data analytics feature automatically and continuously analyzes data for each different source for completeness and accuracy, providing a data quality score. Simplifying Graph queries – Noetic has adopted openCypher, a widely used open query language. Noetic has developed a graphical point-and-click UI to guide security analysts through the steps of creating powerful relationship-based queries with little or no training. Supporting Cloud and On-premises applications – Organizations need to protect assets across public and private clouds, as well as traditional on-premises networks. Noetic Outpost supports secure ingestion from behind the corporate firewall, and private clouds. "The challenge of identifying and managing assets in the context of cybersecurity has grown considerably in recent years," said Dr. Ed Amoroso, CEO of TAG Cyber. "Noetic's innovations are important as their ability to prioritize and automate helps security teams to focus on critical areas of cyber risk." About Noetic Cyber Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, fix and improve their security posture and enterprise ecosystem. Our goal is to improve security tools and control efficacy by breaking down existing siloes and improving the entire security ecosystem. Founded in 2019, Noetic is based in Boston and London.

Read More

DATA SECURITY

Cyble Launches Dedicated Managed Security Service Provider (MSSP) Program to Empower Industry-leading MSSPs

Cyble | June 16, 2022

Cyble, the Y Combinator-backed leader in AI-powered global cyber threat intelligence, is proud to announce its latest threat intelligence platform for the Managed Security Service Providers (MSSPs). Through the new program, Cyber MSSP partners can benefit from a comprehensive dashboard comprising advanced threat intelligence and cybercrime monitoring and mitigation. It will be instrumental in enabling both customers and partners to work in tandem towards achieving their cybersecurity goals. The platform is designed to empower Cyble’s MSSP partners with an enhanced control to provide, configure, and monitor all services provided by Cyble Vision as a software suite to its end customers. This new update brings in features such as a multi-admin management console, seamless access to the user hierarchy dashboard for the easy understating of customer distribution and ownerships, centralized dashboards and consoles for access, and the ability to manage and maintain end-user dashboards from their own accounts. Additionally, it also enables tracking of all customer alerts, thereby fostering early intervention and safeguarding customer assets & interests. Manish Chachada, COO and Co-founder of Cyble, said, “The launch of our MSSP program is a key development in Cyble’s journey. It will enable our partners to extend Cyble’s Threat Intelligence, Digital Risk Protection Services, and Darkweb and Cybercrime Monitoring capabilities to customers worldwide, ensuring seamless integration with their environment. We are completely committed to the needs of our clients and partners, and the ability of our MSSP program to provide users with a single intuitive dashboard for AI-enabled threat management, advanced threat hunting, and mitigation response has been a key differentiating factor against competitors.” “Strategic partnership is a critical necessity for organizations due to the unprecedented need to quickly and efficiently address takedowns, incident response, 3rd party risk scoring, and monitoring emerging risks etc. The MSSP program will pave way for cost savings with ROI and access to increased visibility, operational efficiencies, control, and actionable intelligence for our partners' clients.” Mandar Patil, Vice President International Market and Customer Success at Cyble The MSSP platform comes with upgraded threat detection abilities backed by AI-based innovation, unlimited scalability, open platform with the capability to integrate effectively, and is governed by the GDPR privacy mandates. The news closely follows Cyble’s recent announcement on being the winner in 8 categories of the prestigious 10th Annual Global InfoSec Awards by the elite Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine. “We are incredibly excited to release this core module to a broader partner base and can’t wait to help a larger enterprise community. This is an outcome of having worked tirelessly to design a solution that enhances the threat detection and proactive mitigation capabilities of our clients. MSSP partners look for nothing more than comprehensive, easy-to-navigate, secure solutions that provide the best-in-class threat intelligence and digital risk protection. Our solution does just that! Our excitement knows no bounds as we look forward to strengthening our existing strategic MSSP partnerships besides onboarding new partners worldwide,” said Beenu Arora, CEO, and Co-founder of Cyble. About Cyble Cyble is a global threat intelligence SaaS provider that helps enterprises protect themselves from cybercrimes and exposure on the Surface web, Deepweb, and Darkweb. Its prime focus is to provide organizations with real-time visibility into their digital risk footprint. Backed by Blackbird Ventures, Xoogler, and Y Combinator as part of the 2021 winter cohort, Cyble has also been recognized by Forbes as one of the top 20 Best Cybersecurity Start-ups, along with several other industry recognitions. Headquartered in Georgia, United States, and with offices in Dubai, Australia, Singapore, and India, Cyble has a global presence.

Read More

SOFTWARE SECURITY

Involta Partners With Tech Startup HacWare to Expand Enterprise Cybersecurity Awareness Services

Involta | August 08, 2022

Involta, an award-winning data center, hybrid IT, and cloud-forward consulting firm, announces today a partnership with HacWare, an AI-driven cybersecurity awareness and training SaaS (Software-as-a-Service) product that combines threat intelligence with user behavior to help lean IT teams combat today's most advanced phishing attacks. "Today, email phishing attacks remain the number one source of security breaches, causing over 90% of data breaches," states Tiffany Ricks, Founder and CEO of HacWare, Inc. "The average employee is vulnerable because they spend 1,500 hours a year using email, and many are unaware of email security best practices. Partnering with Involta gives us the opportunity to help businesses improve their email security awareness and build up their first line of defense against cyberattacks." HacWare's internal risk assessment provides real-time threat intelligence to show internal vulnerabilities. HacWare learns from the intelligence to provide personalized phishing simulations and training. The phishing technology leverages behavioral psychology best practices to improve cyber posture, saving businesses up to 40% in labor costs. "At Involta, we know the two most important things our customers can do to protect themselves from a phishing attack is awareness and education," comments Mark Cooley, Involta VP of Security and Compliance. "Making sure that your company's employees understand the prevalence and sophistication of these attacks is crucial. HacWare's security awareness technology combines open-source data and data science to show employees how to avoid scams while significantly saving on traditional security training and awareness labor costs. The automated, easy-to-use platform is the perfect addition to our robust security solution suite." Ricks' motivation comes from an entrepreneurial spirit and the desire to help people. She has led HacWare, Inc. to be widely recognized by leading publications such as The Wall Street Journal, Dark Reading, TechCrunch, Forbes and Women's Business Council. "We are thrilled to partner with Tiffany and her team at HacWare to bring her expertise and innovative solutions to our customers and prospects. "Not only is her product both superior and necessary in today's security landscape, but she is also a true role model for our industry's next generation of female leaders. As more women continue to enter into the world of security and digital infrastructure, it's critical to align with them and help bolster their positions while working alongside them to close the gender gap." Jim Buie, Involta President and CEO Involta's commitment to supporting women in tech and empowering girls to explore STEM fields includes a partnership with Girls, Inc. of Pinellas County, Florida, where they recently introduced digital infrastructure as a potential career path. About Involta Involta is an award-winning hybrid IT and cloud-forward consulting firm orchestrating digital transformation for the nation's leading enterprises. Involta's ongoing mission is rooted in partnership. Its personalized approach identifies customers' requirements while earning their trust to ultimately deliver Superior Infrastructure and Services, Operational Excellence and People Who Deliver, keeping with the Involta brand promise.

Read More

Spotlight

Governments around the world are undergoing change. Whether reducing data center footprints, virtualizing existing services to reduce costs and "go green", or advancing security strategies to thwart advanced attacks in the field or at home, governments are demanding more from their cybersecurity solutions today.

Resources