News – Digital IT News https://digitalitnews.com IT news, trends and viewpoints for a digital world Thu, 05 Sep 2024 16:08:32 +0000 en-US hourly 1 https://wordpress.org/?v=5.4.16 Summer Security Trends: Influencing Technologies https://digitalitnews.com/summer-security-trends-influencing-technologies/ Fri, 30 Aug 2024 18:45:54 +0000 https://digitalitnews.com/?p=11877 Technology plays a determining role in cybersecurity’s effectiveness and the threats it must protect against. For individuals, organizations and governments to prepare for potential threats, they need to stay up-to-date on the influencing technologies in play.  Below, security professionals have shared which technologies have influenced summer security trends and how. Generative AI  The ongoing proliferation [...]

The post Summer Security Trends: Influencing Technologies appeared first on Digital IT News.

]]>
Technology plays a determining role in cybersecurity’s effectiveness and the threats it must protect against. For individuals, organizations and governments to prepare for potential threats, they need to stay up-to-date on the influencing technologies in play. 

Below, security professionals have shared which technologies have influenced summer security trends and how.

Generative AI 

The ongoing proliferation of generative AI technologies is deeply influencing cybersecurity technologies. Existing security products on the market are proving to be highly vulnerable to deepfakes, which are being used to trick unprepared identity verification systems and fool unsuspecting employees. We’ve seen an AI arms race for detecting deepfakes, yet cyberattacks only escalate, with bad actors social engineering employees using voice, video and image deepfakes. Following a winter and spring of crippling deepfake attacks, businesses are looking to adopt stronger AI-powered cyber defenses by implementing identity verification solutions that focus not on passive detection, but on active prevention of digital injection attacks and the use of AI deepfakes. – Aaron Painter CEO at Nametag

Balancing Cybersecurity Strategy with Risk Tolerance

Relying on just one security component barely leads to actual protection. A museum can have the most advanced surveillance system in the world — but without physical measures in place, security personnel can only observe a theft, not prevent it. Along the same lines, even if businesses invest in monitoring tools, they won’t be able to actually respond to threats without an effective incident response plan and the right team to execute it.

A balanced cybersecurity strategy supports tools with people and processes, which play a crucial role in protecting infrastructure without much financial investment. For example, establishing a process that requires business users to annually review their data repository permissions can minimize your attack surface by eliminating superfluous permissions. This process-based approach that emphasizes least privilege security can be particularly helpful for SMBs, as it provides a solid foundation that can be scaled up as the business expands.Illia Sotnikov,  Security Strategist & Vice President of User Experience at Netwrix

Zero-Trust, EDR and IAM  

Typically, summer months lead to an increase in cybersecurity risks and threats due to employees traveling on vacation and having more relaxed “work from home” policies. It’s crucial that organizations have a heightened alert when it comes to gaining visibility into employee usage and access to corporate devices to pinpoint unusual behavior. Technologies such as Identity and Access Management (IAM), Endpoint Detection and Response (EDR), and Zero-Trust Architecture are being adopted by businesses to secure their organizations and employees.

The concept of Zero-Trust is being adopted by enforcing strict controls over every individual or machine, inside or outside the network, looking to gain access to the environment. “Never trust, always verify”.

EDR platforms are being adopted by organizations to gain visibility into assets, whether that be in the cloud or on-premises devices, to detect abnormal behaviors and allow for quick automated remediation.

Lastly, IAM solutions are being adopted to authorize and authenticate users, including multi-factor authentication, to mitigate unwarranted and suspicious activity. – Jeremy Ventura, Field CISO at Myriad360

Moving Target Defense (MTD)

Moving Target Defense (MTD). This is a technology that can tear down and rebuild a compute environment in seconds, making it nearly impossible for a hacker to gain persistence in the environment. MTD requires the use of containers and specific application conditions, so it demands a lot of implementation effort. However, once in place, an environment becomes extremely difficult to attack. Examples of this technology are Morphisec and Phoenix. – Andrew Plato, author of The Founder’s User Manual and Founder of Zenaciti

Security News

The post Summer Security Trends: Influencing Technologies appeared first on Digital IT News.

]]>
How to Prevent a CrowdStrike IT Outage Repeat https://digitalitnews.com/how-to-prevent-a-crowdstrike-it-outage-repeat/ Wed, 14 Aug 2024 13:00:37 +0000 https://digitalitnews.com/?p=11675 A CrowdStrike software issue caused widespread problems with its Falcon Sensor product. This IT outage caused by a content update affected millions of Windows hosts across multiple industries worldwide.   Let’s talk about the cause of the CrowdStrike issue, what unscathed companies did right, and what professionals have to say about preventing this from happening again. [...]

The post How to Prevent a CrowdStrike IT Outage Repeat appeared first on Digital IT News.

]]>
A CrowdStrike software issue caused widespread problems with its Falcon Sensor product. This IT outage caused by a content update affected millions of Windows hosts across multiple industries worldwide.  

Let’s talk about the cause of the CrowdStrike issue, what unscathed companies did right, and what professionals have to say about preventing this from happening again.

What Caused the Software Issue: Lax Software Testing Processes or More?

Many believe adequate software testing would have prevented this catastrophe. However, others have concluded that multiple layers of bugs caused the issue, which is more difficult to catch in a fully automated testing system. 

Even testing for one minute would have discovered these issues …In my mind, that one minute of testing would have been acceptable. – Kyler Middleton, senior principal software engineer at Veradigm

Testing continues to be a significant point of friction [in application development]…Software quality governance requires automation with agile, continuous quality initiatives in the face of constrained QA staff and increasing software complexity…Software testing, both for security and quality, appears to be among the most promising uses for generative AI in other IDC surveys…I am hopeful that the next few years will see improvements in these statistics…However, AI can’t fix the lack of or failure to follow policy and procedures. – IDC analyst Katie Norton

The CrowdStrike flaw was caused by multiple layers of bugs. That includes a content validator software testing tool that should have detected the flaw in the Rapid Release Content configuration template — an indirect method that, in theory, poses less of a risk of causing a system crash than updates to system files themselves …This is a challenge in fully automated systems because they, too, rely on software to progress releases from development through delivery … If there’s a bug in the software somewhere in that CI/CD pipeline … it can lead to a situation like this. So to discover the testing bug in an automated way, you’d have to test the tests. But that’s software, too, so you’d have to test the test that tests the tests and so on. – Gabe Knuth, analyst at TechTarget’s Enterprise Strategy Group.

How Some Companies Went Unscathed

Not every company that got the blue screen of death had to shut down. Some had procedures in place that helped them recover relatively quickly.  

We’ve really focused on business continuity, redundancies, safety nets, and understanding of the difference between cybersecurity as a task and cybersecurity as a cultural commitment of your organization…It’s a validation of our investments while so many of our peers were languishing…The redundancies are numerous…They’re not necessarily terribly sophisticated, but we have literally gone through and said, ‘What are the critical systems of our organization? What is the interplay between them? And if it comes crashing down, what is the plan?’…The reality for cybersecurity and business continuity is the work [must be]done well ahead of the disaster. It has to be part of the fabric of your company, like compliances, like customer service…It’s hard to celebrate cybersecurity—except for the days when you’re the only ones not sweating it. – Andrew Molosky, president and CEO of Tampa-based Chapters Health System

Professionals Input on Preventing A Repeat 

Everyone wants to avoid a repeat. Below is some advice from professionals on preventing this from happening again. 

Phased Check-ins on Endpoint Health

I’m incredibly surprised, even though they call it ‘Rapid Response,’ that [CrowdStrike] doesn’t have some phased approach that allows them to check in on the health of the endpoints that have been deployed … Even with some logical order of customer criticality, they could have circuit breakers to stop a deployment early that they see causes health issues. For example, don’t [update]airlines until your confidence level is higher from seeing the health of endpoints from other customers. –  Andy Domeier, senior director of technology at SPS Commerce

Move Away from Auto-deploying Kernel Module Updates

It is absolutely irresponsible to auto-deploy a kernel module update globally without a health-mediated process or, at least, a recovery path at a lower level of the control plane … Something that remains functional even if the OS deployed on top crashes. – David Strauss, co-founder and CTO at Pantheon

Eliminate Unmanageable Endpoint Complexity

The Windows endpoint environment has reached the point of unmanageable complexity. A steady stream of updates and layering of security features has created a web of complexity that is difficult to manage or fix and therefore promotes risk. Moving Windows to the cloud and replacing the endpoint with a secure by design operating system, such as IGEL OS, can simplify management through centralization and aid in recovery should an outage or breach occur saving millions of dollars in lost productivity. We have grown somewhat numb to the steady stream of data breaches. This latest incident of the shepherd turning on the metaphorical sheep it was protecting highlights that we must consider approaching this problem differently. The move to Windows 11 and the opportunity for cloud transformation, along with the proliferation of SaaS, are proven technologies that can enable a much more secure endpoint strategy. – Jason Mafera, Field CTO at IGEL

Platform, People and Process in Software Testing

It’s not sufficient to just have a great software platform. It’s not sufficient to have highly enabled developers. It’s also not sufficient to just have predefined workflows and governance. All three of those have to come together – Dan Rogers, CEO at LaunchDarkly

Balance Security With Tight Deadlines 

What you don’t want to have happen now is that you’re so worried about making software changes that you have a very long and protracted testing cycle and you end up stifling software innovation  – Dan Rogers, CEO at LaunchDarkly

Security News

The post How to Prevent a CrowdStrike IT Outage Repeat appeared first on Digital IT News.

]]>
Cybersecurity Nonprofits Team Up to Form “Nonprofit Cyber” Coalition https://digitalitnews.com/cybersecurity-nonprofits-team-up-to-form-nonprofit-cyber-coalition/ Thu, 24 Feb 2022 22:00:44 +0000 https://digitalitnews.com/?p=5816 The world’s leading implementation-focused nonprofit cybersecurity organizations have launched Nonprofit Cyber. The group is a first-of-its-kind coalition of global nonprofit organizations to enhance joint action to improve cybersecurity. All coalition members are nonprofits that serve the public interest by developing, sharing, deploying, and increasing the awareness of cybersecurity best practices, tools, standards, and services. “I [...]

The post Cybersecurity Nonprofits Team Up to Form “Nonprofit Cyber” Coalition appeared first on Digital IT News.

]]>
The world’s leading implementation-focused nonprofit cybersecurity organizations have launched Nonprofit Cyber. The group is a first-of-its-kind coalition of global nonprofit organizations to enhance joint action to improve cybersecurity. All coalition members are nonprofits that serve the public interest by developing, sharing, deploying, and increasing the awareness of cybersecurity best practices, tools, standards, and services.

“I applaud that this consummate consortium of nonprofits has formed to actively protect us against security threats to our digital infrastructure and uphold our open internet, combining their knowledge, skills, and tools for the greatest effect,” said Govind Shivkumar, director of responsible technology at Omidyar Network.

Nonprofit Cyber will initially focus on two priorities: building awareness of the work of cybersecurity nonprofits globally and aligning their work to achieve the greatest effect. Envisioned as a “collaboration-of-equals,” each member organization has committed to work in coordination to better serve Internet users globally. Coalition members must be a 501(c)(3) or 501(c)(6) nonprofit if organized under U.S. law or hold an equivalent status if organized under the laws of another country. More information is available at the coalition’s website NonprofitCyber.org and on Twitter at @NonprofitCyber.

The twenty-two founding members of Nonprofit Cyber are the Anti-Phishing Working Group, the Center for Internet Security, the Center for Threat-Informed Defense, the Cloud Security Alliance, Consumer Reports, CREST International, the Cyber Defence Alliance, the CyberPeace Institute, the Cyber Readiness Institute, the Cyber Threat Alliance, the Cybercrime Support Network, the CyberGreen Institute, the FIDO Alliance, the Forum of Incident Response and Security Teams, the Global Cyber Alliance, the National Cyber Forensics and Training Alliance, the National Cybersecurity Alliance, the Open Web Application Security Project, SAFECode, the Shadowserver Foundation, Sightline Security, and #ShareTheMicInCyber. Tony Sager of CIS and Philip Reitinger of GCA will serve as co-chairs as the organization begins operations.

Nonprofit Cyber welcomes applications for new members that work to implement best practices and solutions at scale. Nonprofit Cyber is focused on these organizations, rather than lobbying or policy development and advocacy organizations, or industry associations.

Information on joining Nonprofit Cyber can be found at its website.

About the Nonprofit Cyber Founding Members

The Anti-Phishing Working Group (APWG) is the international coalition unifying the global response to cybercrime across industry, government and law-enforcement sectors and NGO communities. Learn more at https://apwg.org.

The Center for Internet Security (CIS) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation. Learn more at https://cisecurity.org.

The Center for Threat-Informed Defense (CTID) is a non-profit, privately funded research and development organization whose mission is to advance the state of the art and the state of the practice in threat-informed defense globally. Learn more at https://ctid.mitre-engenuity.org/.

The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. Learn more at https://cloudsecurityalliance.org.

Consumer Reports (CR) is an independent, nonprofit member organization that works side by side with consumers for truth, transparency, and fairness in the marketplace. Learn more at https://www.consumerreports.org.

CREST International is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. Learn more at https://crest-approved.org.

The Cyber Defence Alliance (CDA) is a not for profit members organization based in London working on behalf of financial institutions to proactively share threat intelligence and expertise to prevent and disrupt cyber attacks, liaise with Law enforcement agencies to target cybercriminal networks and apprehend the most prolific offenders. The CDA works on a cross sector basis and with like minded organizations on an international basis to address the global threat from cybercrime. The CDA also provides a 24/7 incident response capability to support the member organizations and the UK Financial Services Cybercrime Collaboration Centre (FSCCC) during major cyber incidents.

The Cyber Readiness Institute (CRI) mission is to empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient. Learn more at https://cyberreadinessinstitute.org.

The Cyber Threat Alliance (CTA) is working to improve the cybersecurity of our global digital ecosystem by enabling near real-time, high-quality cyber threat information sharing among companies and organizations in the cybersecurity field. Learn more at https://www.cyberthreatalliance.org.

The Cybercrime Support Network’s (CSN) mission is to serve individuals and small businesses impacted by cybercrime. Learn more at https://cybercrimesupport.org. ‘

The CyberGreen Institute (CyberGreen) is dedicated to mobilizing a global community of experts, business leaders, and policymakers to revolutionize cybersecurity through the development of a science of Internet Public Health. Learn more at https://www.cybergreen.net.

The CyberPeace Institute is a nongovernmental organization whose mission is to reduce the harms from cyberattacks on people’s lives worldwide, provide assistance to vulnerable communities and call for responsible cyber behaviour, accountability and cyberpeace. At the heart of the CyberPeace Institute’s efforts is the recognition that cyberspace is about people. Learn more at https://cyberpeaceinstitute.org

The FIDO Alliance is an open industry association with a focused mission: authentication standards to help reduce the world’s over-reliance on passwords. The FIDO Alliance promotes the development of, use of, and compliance with standards for authentication and device attestation. Learn more at https://fidoalliance.org/.

The Forum of Incident Response and Security Teams (FIRST) aspires to bring together incident response and security teams from every country across the world to ensure a safe internet for all. Learn more at https://www.first.org.

The Global Cyber Alliance (GCA) builds practical, measurable solutions and tools that are easy to use, and works with partners to accelerate adoption around the world. Learn more at www.globalcyberalliance.org.

The National Cyber Forensics and Training Alliance (NCFTA) was established in 2002 as a nonprofit partnership between private industry, government, and academia. The NCFTA provides a neutral environment for operational collaboration in the ongoing effort to identify, mitigate, and disrupt cyber crime. Learn more at https://www.ncfta.net.

The National Cybersecurity Alliance (NCA) advocates for the safe use of all technology and educates everyone on how best to protect ourselves, our families, and our organizations from cybercrime. Learn more at www.staysafeonline.org.

The Open Web Application Security Project® (OWASP) is a nonprofit foundation that works to improve the security of software. Through community-led open-source software projects, hundreds of local chapters worldwide, tens of thousands of members, and leading educational and training conferences, the OWASP Foundation is the source for developers and technologists to secure the web. Learn more at https://owasp.org.

SAFECode is a global industry forum where business leaders and technical experts come together to exchange insights and ideas on creating, improving, and promoting scalable and effective software security programs. Learn more at https://safecode.org.

The Shadowserver Foundation’s (Shadowserver) mission is to make the Internet more secure by bringing to light vulnerabilities, malicious activity and emerging threats. Learn more at https://shadowserver.org.

#ShareTheMicInCyber (#STMIC) is an online movement to address issues stemming from systemic racism in cybersecurity. The social media campaign highlights the experiences of Black practitioners in this field, catalyzes a critical conversation on race in the industry, and shines a light on Black practitioners’ accomplishments to showcase them as experts in their fields all while creating professional opportunities and bringing the cyber community together. Learn more at www.sharethemicincyber.com.

Sightline Security is a nonprofit security organization whose mission is to equip, empower, and support global nonprofits to navigate and embed cybersecurity into their organizations with confidence—founded to address the lack of cybersecurity adoption in the nonprofit sector by offering a holistic, business, and community-centric approach designed to embrace cybersecurity best practices. At Sightline, there is a world where nonprofits have the confidence, knowledge, and business acumen to stay protected in a digital world. Learn more at https://sightlinesecurity.org.

The post Cybersecurity Nonprofits Team Up to Form “Nonprofit Cyber” Coalition appeared first on Digital IT News.

]]>
Launched by CREST Accreditation: New Globally Available Practical Penetration Testing Certification https://digitalitnews.com/new-globally-available-practical-penetration-testing-certification-launched-by-crest/ Tue, 07 Sep 2021 17:31:35 +0000 https://digitalitnews.com/?p=4770 CREST, a not-for-profit accreditation and certification body representing the technical information security industry, has launched the first of four new practical penetration testing certifications that are designed to be delivered via selected Pearson Vue centers around the world. The new CREST Registered Security Analyst (CRSA) certification will provide CREST members, CREST qualified individuals and the [...]

The post Launched by CREST Accreditation: New Globally Available Practical Penetration Testing Certification appeared first on Digital IT News.

]]>
CREST, a not-for-profit accreditation and certification body representing the technical information security industry, has launched the first of four new practical penetration testing certifications that are designed to be delivered via selected Pearson Vue centers around the world. The new CREST Registered Security Analyst (CRSA) certification will provide CREST members, CREST qualified individuals and the wider industry with flexible, global access to this practical penetration testing examination.

CRSA is a new Registered level practical penetration testing certification.  It has a slightly broader scope than the CREST Registered Penetration Tester (CRT) and includes desktop breakout assessments and a larger web application component. CRSA will run in parallel with CRT.

The UK’s National Cyber Security Centre (NCSC) has confirmed that the CRSA certification will be recognized alongside the CRT for technical entry for CHECK Team Member.  This applies to all CRSA certifications awarded, wherever in the world candidates take the examination.

The existing CREST Practitioner Security Analyst (CPSA) certification, which is already a prerequisite for the CRT, is also a prerequisite for the new CRSA examination.  Please note that a CPSA qualification attained via equivalency cannot be used as the pre-requisite for booking the CRSA examination.

The CRSA is available to book from today through Pearson Vue CREST :: Pearson VUE.

The CRSA is the first in a suite of new practical certifications being developed by CREST.  The others, which have not yet been recognized by NCSC, are:

  • CREST Certified Security Consultant (Red Team) – CCSC RED
  • CREST Certified Security Consultant (Networks) – CCSC NET
  • CREST Certified Security Consultant (Web) – CCSC WEB

“The examinations for all four new practical penetration testing certifications have been designed to be delivered entirely through Pearson Vue centers,” said Ian Glover, President of CREST International. “This opens up the opportunity to individuals working in the cyber security industry to get the access to certify with CREST wherever they are in the world.”

Pearson Vue centers offer a distraction-free, secure testing environment with continuous candidate surveillance. There are number of mandatory security measures at all test centers to ensure the integrity of the examinations and the safety of the candidates.

For full details on the CRSA please visit: https://www.crest-approved.org/professional-qualifications/crest-exams/index.html

Image licensed by pexels.com

Related News:

Want to Learn about Digital Marketing? Talk to a Cybercriminal.

CREST Launches Remote Audit Facility for SOC Accreditation

For future updates on Penetration Testing Certifications and announcements, follow Digital IT News on Twitter, LinkedIn, or Facebook, or visit our Contact Page for subscription options.

The post Launched by CREST Accreditation: New Globally Available Practical Penetration Testing Certification appeared first on Digital IT News.

]]>
Microsoft’s Power Apps New Vector of Data Exposure https://digitalitnews.com/microsofts-powerapps-new-vector-of-data-exposure/ Wed, 25 Aug 2021 20:55:51 +0000 https://digitalitnews.com/?p=4733 Microsoft’s Power Apps portals platform was unintentionally left unprotected online, prompting attention to an issue of a “new vector of data exposure” of more than 38 million records from 47 different entities. Microsoft Power Apps is a browser-based platform that allows non-developers to build low-code personalized business apps by simply dragging and dropping objects to [...]

The post Microsoft’s Power Apps New Vector of Data Exposure appeared first on Digital IT News.

]]>
Microsoft’s Power Apps portals platform was unintentionally left unprotected online, prompting attention to an issue of a “new vector of data exposure” of more than 38 million records from 47 different entities.

Microsoft Power Apps is a browser-based platform that allows non-developers to build low-code personalized business apps by simply dragging and dropping objects to a Web browser. PowerApps targets business users and works across mobile and the web with options to retrieve and store information.

An analyst for UpGuard first discovered that the OData API for a Power Apps portal had anonymous accessible list data including personally identifiable information. UpGuard’s view that this isn’t precisely a software vulnerability, it is a platform issue that necessitates product code updates, and thus should be handled in the same way as vulnerabilities.

“The real scale of the issue is hard to assess. On one hand, it is obvious that headlines are overstating it: the majority of the exposed 38 million records did not include the most sensitive details like SSN or health information. Security researchers from UpGuard give some examples of data the exposed records included in their blog post. For the majority of records this was limited to names and email addresses. That said, more sensitive information was still exposed for at least hundreds of thousands of individuals. On the other hand, there is no way to be certain these records had not been harvested before UpGuard reported the issue to Microsoft and the application owners,” according to Ilia Sotnikov, VP of User Experience & Security Strategist at Netwrix.

Kenn White, director of the Open Crypto Audit Project, said it was a wakeup call for the industry as a whole. ‘Secure default settings matter,’ he told Wired. ‘When a pattern emerges in web-facing systems built using a particular technology that continue to be misconfigured, something is very wrong. ‘If developers from diverse industries and technical backgrounds continue to make the same missteps on a platform, the spotlight should be squarely on the builder of that platform.’

Ilia Sotnikov also said, “This news should hopefully lead to both vendors and companies to think more about the balance between time to market and security of their solutions. Power Aps allow to build and quickly launch no code or low code applications. Since this is hosted by Microsoft, this may create a false sense of security for a customer that just puts together the building blocks. Companies still must take time to learn the security features and the access model of the cloud platforms they use. They also should do at least basic threat modelling and security review for the applications they build and launch.”

“Hats off to the UpGuard team for their efforts not only to report the issue to the vendor (Microsoft), but working closely with affected parties to remediate the impact of potential exposure of sensitive data,” continued Netwrix VP of User Experience & Security Strategy. “Great way to handle security research and coordinate the response and disclosure efforts across multiple parties.”

The prevalence of sensitive data being leaked with more and more information moved online, increasing cyberattacks, and hackers around every corner, it is more important than ever that businesses need to extensively safeguard their IT department. Consistently it’s the “bad” news surrounding data breaches that we become aware of and not the good Samaritan offering a hand.

Image licensed by unsplash.com

Related News:

Saudi Aramco’s Data Breach with a 28 Day Puzzle Twist

Lack of Budget and Cloud Security Skills are Top Obstacles Keeping Organizations from Protecting Data in the Cloud, According to Netwrix Study

The post Microsoft’s Power Apps New Vector of Data Exposure appeared first on Digital IT News.

]]>
CompTIA ISAO Adds Real-time Cybersecurity Threat Analysis and Intelligence Resources from Sophos https://digitalitnews.com/comptia-isao-adds-real-time-cybersecurity-threat-analysis-and-intelligence-resources-from-sophos/ Thu, 05 Aug 2021 20:10:24 +0000 https://digitalitnews.com/?p=4602 Advanced cybersecurity threat analysis and intelligence capabilities are now available from the CompTIA Information Sharing and Analysis Organization (ISAO) through an expanded collaboration with global next-generation cybersecurity leader Sophos and it industry-leading and highly acclaimed threat research lab, SophosLabs. The announcement of the new cyber capabilities was made today by CompTIA, the nonprofit association for the information technology (IT) industry and [...]

The post CompTIA ISAO Adds Real-time Cybersecurity Threat Analysis and Intelligence Resources from Sophos appeared first on Digital IT News.

]]>
Advanced cybersecurity threat analysis and intelligence capabilities are now available from the CompTIA Information Sharing and Analysis Organization (ISAO) through an expanded collaboration with global next-generation cybersecurity leader Sophos and it industry-leading and highly acclaimed threat research lab, SophosLabs.

The announcement of the new cyber capabilities was made today by CompTIA, the nonprofit association for the information technology (IT) industry and workforce.

CompTIA ISAO members can directly submit suspicious URLs and files through the ISAO’s Cyber Forum to SophosLabs Intelix™ for rapid analysis to determine if they are known or zero-day cybersecurity threats. SophosLabs Intelix combines petabytes of threat intelligence derived from decades of SophosLabs threat research with Sophos AI tools and techniques, bringing a powerful new source of threat intelligence to the CompTIA ISAO and its managed services provider (MSP), vendor, distributor, and associate members.

“SophosLabs research illustrates how adversaries are constantly changing their tactics, techniques and procedures (TTPs) to breach targets, move laterally and carry out ransomware and other attacks,” said Simon Reed, senior vice president, SophosLabs. “The only way to effectively fight modern cybercrime is if we do it together. That’s why Sophos is committed to sharing actionable threat intelligence with the CompTIA community. This new integration gives member organizations advanced abilities to quickly investigate suspicious URLs and files to determine their risk and to understand what happens if they are opened or executed. Powered by machine learning, SophosLabs Intelix predictively convicts never-before-seen threats, and is constantly improving based on the collective input of community intelligence.”

“This is a real differentiator for our members, who can access a powerful analysis resource to identify, classify and prevent threats, further protecting themselves and more importantly, their customers,” said MJ Shoer, senior vice president and executive director of the CompTIA ISAO.

The new integration expands Sophos’ support of the CompTIA ISAO. As a Silver Industry Partner, Sophos has been contributing detailed threat analysis from SophosLabs Uncut to the CompTIA ISAO.

“This is a significant addition to the resources available to our members,” Shoer added. “It is the latest example of the support that industry partners such as Sophos have for the CompTIA ISAO, and the commitment we all have to make the industry more secure.”

The CompTIA ISAO is a community of nearly 1,200 member companies that share best practices, cyber threat intelligence, educational content and more to help address ever-evolving cyber threats. Working closely with public and private cybersecurity agencies and organizations, the CompTIA ISAO is helping its members understand the threat landscape, defend against current and future attacks and raise cybersecurity awareness throughout the global tech industry. For complete details on the CompTIA ISAO and the benefits of membership visit https://www.comptiaisao.org/.

Image licensed by: Pixabay.com

Related News:

Chainlink Announces Cross-Chain Interoperability Protocol (CCIP)

80% of Global Organizations Expect to Experience a Breach of Customer Records in the Next Year

The post CompTIA ISAO Adds Real-time Cybersecurity Threat Analysis and Intelligence Resources from Sophos appeared first on Digital IT News.

]]>
Qualys Collaborates with Red Hat to Enhance Security for Red Hat Enterprise Linux CoreOS and Red Hat OpenShift https://digitalitnews.com/qualys-collaborates-with-red-hat-to-enhance-security-for-red-hat-enterprise-linux-coreos-and-red-hat-openshift/ Tue, 03 Aug 2021 16:14:10 +0000 https://digitalitnews.com/?p=4582  Qualys, Inc. announced it has collaborated with Red Hat to drive greater security for both the container and host operating system for Red Hat OpenShift. Teaming with Red Hat, Qualys is offering a unique approach providing a containerized Qualys Cloud Agent that extends security to the operating system. The Cloud Agent for Red Hat Enterprise [...]

The post Qualys Collaborates with Red Hat to Enhance Security for Red Hat Enterprise Linux CoreOS and Red Hat OpenShift appeared first on Digital IT News.

]]>
 Qualys, Inc. announced it has collaborated with Red Hat to drive greater security for both the container and host operating system for Red Hat OpenShift.

Teaming with Red Hat, Qualys is offering a unique approach providing a containerized Qualys Cloud Agent that extends security to the operating system. The Cloud Agent for Red Hat Enterprise Linux CoreOS on OpenShift combined with the Qualys solution for Container Security provides continuous discovery of packages and vulnerabilities for the complete Red Hat OpenShift stack. Built on the Qualys Cloud Platform, Qualys’ solution seamlessly integrates with customers’ vulnerability management workflows, reporting and metrics to help reduce risk.

“Security is one of the biggest areas of concern for nearly every organization, and we believe that a strong partner ecosystem helps to address these concerns by giving our customers a wide range of solution choices,” said Aaron Levey, Head of Security Partner Ecosystem at Red Hat. “Qualys’ Cloud Platform and Cloud Agent helps administrators gain deeper visibility into known vulnerabilities that may be present on their Red Hat Enterprise Linux CoreOS nodes with pointers to associated Red Hat Security Advisories, leaning on the expertise of Red Hat as well as Qualys’ own skills in driving cloud-native security.”

The Qualys Cloud Agent for Red Hat Enterprise Linux CoreOS on Red Hat OpenShift helps customers:

  • See the Full Inventory – Continuous visibility of installed software, open ports, and Red Hat Security Advisories (RHSA) for all Red Hat Enterprise Linux CoreOS nodes with comprehensive reporting.
  • Manage Host Hygiene – Fully integrated on the Qualys Cloud Platform to automatically detect and manage host status related to patches and compliance adherence for known vulnerabilities.
  • Easily Deploy to the Host – Simplified deployment via the Qualys Cloud Agent to secure the host operating system. This approach eliminates the need to modify the host, open ports, or manage credentials.
  • Get Complete Coverage – Full coverage of Red Hat OpenShift and Qualys Container security delivers comprehensive visibility from the host operating system through to images and containers running on OpenShift.

“As security teams look to support modern applications built on cutting edge technology like Red Hat OpenShift, they need to secure both the running container images and the underlying OpenShift cluster,” said Sumedh Thakar, president and CEO of Qualys. “By collaborating with Red Hat, we have built a unique approach to secure Red Hat Enterprise Linux CoreOS that provides complete control over containerized workloads enhancing Qualys’ ability to help customers discover, track and continuously secure containers.”

Image licensed by Adobe Stock

Related News:

IGEL and NVIDIA Collaborate to Power High-Performance End User Computing

68% of Sysadmins Say Their Organizations Faced Increased Risk of Cybersecurity Attacks Due to the Shift to Remote Work

The post Qualys Collaborates with Red Hat to Enhance Security for Red Hat Enterprise Linux CoreOS and Red Hat OpenShift appeared first on Digital IT News.

]]>
Optiv Security Launches Next-Gen Managed XDR to Stop Threats Earlier in Attack Lifecycle https://digitalitnews.com/optiv-security-launches-next-gen-managed-xdr-to-stop-threats-earlier-in-attack-lifecycle/ Tue, 03 Aug 2021 16:02:09 +0000 https://digitalitnews.com/?p=4578 Optiv Security, launched its Managed Extended Detection and Response (MXDR) offering at Black Hat USA 2021. The technology-independent offering enables clients to take rapid and decisive action against today’s most critical cyberattacks and strengthen their security posture. Optiv Managed XDR is a next-generation tech-enabled service that leverages your existing technology investments and deploys Optiv’s deep expertise [...]

The post Optiv Security Launches Next-Gen Managed XDR to Stop Threats Earlier in Attack Lifecycle appeared first on Digital IT News.

]]>
Optiv Security, launched its Managed Extended Detection and Response (MXDR) offering at Black Hat USA 2021. The technology-independent offering enables clients to take rapid and decisive action against today’s most critical cyberattacks and strengthen their security posture.

“Optiv MXDR brings simplicity, transparency and automation to clients’ environments, enhancing existing defenses to counter known and emerging threats with confidence and speed,” said David Martin, chief services officer for Optiv. “What’s more, we can seamlessly leverage the power of Optiv to extend and layer the offering with a full suite of complementary services like remediation, incident response, threat hunting, and beyond.”

Optiv MXDR is the only managed cloud-based, next-gen advanced threat detection and response service that ingests data across various layers of technologies to correlate, normalize, enrich, and enable automated responses to malicious activity in real-time. By automating incident investigation with actionable insights, organizations can detect threats faster and prioritize which threats to mitigate first, significantly reducing the attack surface.

“We know the threat landscape; both what’s at stake and how to circumvent threat actors while significantly reducing time to detect and respond,” said John Ayers, XDR vice president for Optiv. “We meet clients where they are and customize our continuously managed approach to ease the burden of the unknown and allow teams to detect, respond and remediate threats faster while also automating deeper investigation for future improvements.”

Devo has been named a foundational partner in Optiv MXDR, delivering scalable, cloud-native logging and security analytics via the Devo Platform, enabling full visibility across cloud and on-premise environments for Optiv customers.

“Security teams are eager to learn more about XDR as they look to consolidate their security stack for greater efficiency and accuracy in threat detection and response,” said Ted Julian, SVP of Product at Devo. “Two constraints have always stood in their way: lack of real-time access to historical data, and the inability to collect and analyze the massive data volumes associated with modern operational environments. Devo eliminates these concerns and is uniquely qualified to power solutions like Optiv’s MXDR.”

Optiv delivers threat management solutions to more than 60 percent of Fortune 500 companies. View the complete MXDR service brief and find out how organizations can enhance their security posture with Optiv.

Image licensed by: unsplash.com

Related News:

Gartner Says Four Trends Are Shaping the Future of Public Cloud

Veristor and Network Data Systems Partner to Deliver Services for Managed Secure Networking

The post Optiv Security Launches Next-Gen Managed XDR to Stop Threats Earlier in Attack Lifecycle appeared first on Digital IT News.

]]>
PC Matic Selected by NIST’s National Cybersecurity Center of Excellence to Demonstrate Zero Trust Architectures https://digitalitnews.com/pc-matic-selected-by-nists-national-cybersecurity-center-of-excellence-to-demonstrate-zero-trust-architectures/ Thu, 22 Jul 2021 19:48:01 +0000 https://digitalitnews.com/?p=4545 PC Matic, announced it has been selected by the National Institute of Standards and Technology’s (NIST) National Cybersecurity Center of Excellence (NCCoE) to participate in their Implementing a Zero Trust Architecture Project. A collaboration amongst many industry leaders in cybersecurity, PC Matic will join seventeen other companies to develop practical approaches to designing and implementing zero-trust architectures. The approaches designed by these organizations [...]

The post PC Matic Selected by NIST’s National Cybersecurity Center of Excellence to Demonstrate Zero Trust Architectures appeared first on Digital IT News.

]]>

PC Matic, announced it has been selected by the National Institute of Standards and Technology’s (NIST) National Cybersecurity Center of Excellence (NCCoE) to participate in their Implementing a Zero Trust Architecture Project.

A collaboration amongst many industry leaders in cybersecurity, PC Matic will join seventeen other companies to develop practical approaches to designing and implementing zero-trust architectures. The approaches designed by these organizations will result in a cybersecurity practice guide published by the NCCoE for government and enterprise organizations who seek to implement a zero-trust architecture.

“Since inception, PC Matic has utilized a zero-trust approach to stop malicious cyber threats such as ransomware,” said PC Matic CEO Rob Cheng. “Understanding just how effective this framework has been for our own customers, we are very grateful to the NCCoE for the opportunity to contribute to this project. We look forward to working together with the NCCoE and our other project partners to showcase the capabilities of and implementation strategies for zero trust architectures.”

Through its engagement in the project, PC Matic will assist the NCCoE in achieving the program’s objectives:

  • Demonstrate an example implementation(s) of a Zero Trust Architecture (ZTA), using commercially available technology components designed and deployed according to the zero trust concepts and tenets described in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-207, Zero Trust Architecture.
  • Demonstrate various types of user access to enterprise resources (e.g., data sources, computing services, and IoT devices) spread across boundaries, from on premises to multiple cloud environments, all confined by policy based security constraints orchestrated by leveraging zero trust principles and approaches.
  • Publish a NIST Cybersecurity Practice Guide, a publicly available description of the practical steps needed to implement a cybersecurity reference design that addresses this challenge.

 

“Implementing a zero-trust architecture has become a federal cybersecurity mandate and a business imperative,” said Natalia Martin, Acting Director of the NCCoE. “We are excited to work with industry demonstrating various approaches to implementing a zero-trust architecture using a diverse mix of vendor products and capabilities, and share ‘how to’ guidance and lessons learned from the experience.”

In response to an open call in the Federal Register, PC Matic submitted its capabilities as it relates to the Implementing a Zero Trust Architecture Project. Following such submission, PC Matic was invited to sign a Cooperative Research and Development Agreement with the National Institute of Standards and Technology (NIST), allowing them to participate in this project.

More information on the project may be found here.

Image licensed by: Pixabay.com

Related News:

Incedo Consolidates its Cybersecurity Defense with Check Point Software Technologies

Cloudian Ransomware Survey Finds 65% of Victims Penetrated by Phishing Had Conducted Anti-Phishing Training

 

The post PC Matic Selected by NIST’s National Cybersecurity Center of Excellence to Demonstrate Zero Trust Architectures appeared first on Digital IT News.

]]>
Stealthbits, Now Part of Netwrix, Named to Carahsoft ITES-SW2 Contract to Support U.S. Army Enterprise Infrastructure Goals https://digitalitnews.com/stealthbits-now-part-of-netwrix-named-to-carahsoft-ites-sw2-contract-to-support-u-s-army-enterprise-infrastructure-goals/ Mon, 21 Jun 2021 18:13:55 +0000 https://digitalitnews.com/?p=4280 Stealthbits, now part of Netwrix, announced that it has been named a manufacturer on the Information Technology Enterprise Solutions – Software 2 (ITES-SW2) contract for U.S. Army Computer Hardware Enterprise Software and Solutions (CHESS). This contract is held by Carahsoft Technology Corp., The Trusted Government IT Solutions Provider®, and is effective through August 30, 2025. ITES-SW2 [...]

The post Stealthbits, Now Part of Netwrix, Named to Carahsoft ITES-SW2 Contract to Support U.S. Army Enterprise Infrastructure Goals appeared first on Digital IT News.

]]>
Stealthbits, now part of Netwrix, announced that it has been named a manufacturer on the Information Technology Enterprise Solutions – Software 2 (ITES-SW2) contract for U.S. Army Computer Hardware Enterprise Software and Solutions (CHESS). This contract is held by Carahsoft Technology Corp., The Trusted Government IT Solutions Provider®, and is effective through August 30, 2025.

ITES-SW2 is a firm-fixed price, indefinite delivery/indefinite quantity contract vehicle for commercial off-the-shelf software products and related services and hardware. The contract has no fees, and ordering is open to all Army, DoD and federal agencies and authorized systems integrators on a worldwide basis. Under this contract, Carahsoft provides cybersecurity and data access governance software from Stealthbits to support the IT infrastructure goals of federal agencies.

Federal agencies often find it difficult to properly govern access to structured and unstructured sensitive data due to multiple layers of oversight, compliance requirements and lack of data governance. Stealthbits solutions help agencies overcome these challenges by enabling them to control data access, enforce security policy and detect threats to their most critical assets.

“We are excited to become a part of the Carahsoft ITES-SW2 contract, as it will be easier for our federal clients to purchase our products for cybersecurity and data access governance using this trusted purchase vehicle. By expanding our partnership with Carahsoft, we will increase Stealthbits’ ability to help the Army, the DoD and federal agencies mitigate their cybersecurity risks,” said Steven Hollins, Chief Revenue Officer at Netwrix (including Stealthbits).

Stealthbits software is available through Carahsoft’s ITES-SW2 contract W52P1J-20-D-0042. For procurement information, contact Carahsoft’s ITES-SW2 contract team at (703) 871-8681 orITES-SW2@carahsoft.com or visit Carahsoft’s dedicated ITES-SW2 contract resource center.

To learn more about Stealthbits’ offerings under ITES-SW2, contact the Stealthbits Team at Carahsoft at (866) 421-4683 or Stealthbits@carahsoft.com.

Image licensed by: Pixabay.com

Related News:

Malwarebytes Launches VPN for Mobile, Expanding Privacy & Cyberprotection Across Devices

Survey Finds User Experience is IT’s Top Remote Work Challenge

The post Stealthbits, Now Part of Netwrix, Named to Carahsoft ITES-SW2 Contract to Support U.S. Army Enterprise Infrastructure Goals appeared first on Digital IT News.

]]>