Security – Digital IT News https://digitalitnews.com IT news, trends and viewpoints for a digital world Fri, 06 Sep 2024 22:21:09 +0000 en-US hourly 1 https://wordpress.org/?v=5.4.16 Security Concerns Shaping the Way Organizations Approach DevOps https://digitalitnews.com/security-concerns-shaping-the-way-organizations-approach-devops/ Fri, 06 Sep 2024 21:34:22 +0000 https://digitalitnews.com/?p=11954 Security is a major concern for software development and IT operations. Staying on top of how security shapes the DevOps landscape is crucial to business decisions.  Discover what experts have to say about the security concerns that DevOps is currently facing. Cloud Tech Adoption As enterprises increasingly adopt cloud technologies, with Gartner predicting that over [...]

The post Security Concerns Shaping the Way Organizations Approach DevOps appeared first on Digital IT News.

]]>
Security is a major concern for software development and IT operations. Staying on top of how security shapes the DevOps landscape is crucial to business decisions. 

Discover what experts have to say about the security concerns that DevOps is currently facing.

Cloud Tech Adoption

As enterprises increasingly adopt cloud technologies, with Gartner predicting that over 50% will be using the cloud by 2028, security can no longer be an afterthought. Instead, it must be seamlessly embedded into the Software Development Life Cycle (SDLC), commonly referred to as DevSecOps. This integration is so crucial that the Open Worldwide Application Security Project (OWASP) Foundation has developed maturity models to guide organizations at various stages of DevSecOps implementation.

As DevSecOps gains traction, organizations will adopt a shift-left approach, introducing security measures early in the development process. This includes integrating tools like Static Application Security Testing (SAST), open-source vulnerability scanners, and credential scanners into the build pipeline, as well as conducting threat modeling before development begins. Once deployed to production, automated tests to validate security features, along with scanning container images for vulnerabilities, will become integral to developing secure products. – Siri Varma Vegiraju, Tech Lead at Microsoft.

The Open-Source Elephant in The Room

For a long time, developers and security teams’ came to the agreement that ‘shifting left’ was the best way to prevent software supply chain compromises. Shifting left meant security evaluations were conducted earlier in the development process — often before any code is actually written.

The problem is that developers are not writing as much of their own code anymore. Software now consists of up to 90% of open-source and third-party components. As a result, many developers cannot answer the question, ‘What’s in your software?’ This leaves security teams unknowingly dealing with potential faulty software that doesn’t come to light until a breach occurs.

The open-source elephant in the room has led to security concerns that are shaping the way organizations approach DevOps. Today, more organizations are incorporating a paradigm shift in approaching security in the development process to combat today’s software supply chain attacks, called, ‘Shifting left of shift left.’ While shift left primarily focuses on early testing and quality assurance, shifting left of shift left extends this concept further by incorporating enhanced collaboration, automation and continuous improvement throughout the entire software development lifecycle. Specific steps to do so include:

  •  Understanding Risks Beyond Vulnerabilities – Ensuring that developers and security professionals understand the risks that lay hidden within the software is the first step and recognizing that vulnerabilities are only one dimension of risks. Inherent risks deep in the software supply chain can have serious consequences. Having the tools to identify inherent risks is critical.
  • Select Foundational Tools – Shifting left of shift left begins with choosing the right foundational tools to assess open-source software components. Approximately 95% of open-source vulnerabilities are found in open-source code packages that are not selected by software developers and are indirectly pulled into projects.
  • Prioritize Security in Development Tools – I encourage developers to opt for secure programming languages, frameworks, and libraries to ensure that security is integrated from the ground up.
    Implement Real-Time Solutions – To shift left of shift left, developers need more than just a testing mechanism; they need a real-time security solution consistently assessing code.
  • Developer Training – Developers need to understand pain points, signs of issues, and implications of their decisions on the overall security posture can help alleviate tensions with security team members’ and create secure code from the start.
  • Continuous Security Assessments – Security doesn’t end when the software goes live. Following development, organizations should have tools in place to conduct ongoing evaluations of code to help in the timely identification and remediation of vulnerabilities. – Nick Mistry, SVP, CISO at Lineaje.

Security is now at the forefront of DevOps, leading to the rise of DevSecOps, where security is integrated throughout the development lifecycle rather than being treated as an afterthought. Organizations are embedding security practices into their CI/CD pipelines, automating vulnerability scanning, and ensuring compliance checks are part of every stage of development.

This shift is changing the way DevOps teams operate. Developers are being trained in secure coding practices, and security teams are collaborating more closely with DevOps engineers to create secure, automated environments. The focus is now on proactive security—identifying and addressing potential threats early, before they become critical issues. As a result, DevOps has become more security-focused, with an emphasis on continuous monitoring, automated testing, and real-time threat detection.

Ultimately, security is no longer a separate function; it’s a fundamental component of DevOps, driving new processes, tools, and team structures. – Maksym Lushpenko, Founder & CEO at Brokee

Increased Security Breaches & Automated Security Testing

In an increasingly interconnected and digital world, it is no surprise that there has been a steady rise in the number and cost of security breaches over the last few years. As such, addressing security concerns is a top priority for any company, with the issue leading to a paradigm shift in the way organizations approach DevOps. Forward-looking companies are embracing DevSecOps approaches. These favor more holistic “Security by Design” practices that can enhance cyber resilience while removing conventional silos between DevOps and cybersecurity experts. In effect, DevSecOps integrates security as a shared responsibility throughout the entire DevOps process, starting from the early development stages, rather than relying on conventional security testing at the end of the DevOps lifecycle. – Andrew Pielage, Senior Software Engineer at Payara Services

One of the key enablers of this transition is certainly automation, already a pillar of DevOps. It supports automated security testing in the software development pipeline, flagging anomalies and untested code as a high-priority risk. As a result, developers can benefit from a continuous monitoring and improvement tool to identify and fix vulnerabilities earlier and deliver more secure software faster. – Abdul Rahim, Release Automation Engineer at Payara Services. 

Ultimately, thanks to DevSecOps, companies can shift from purely reactive security strategies, whereby threats and other issues are resolved, to more proactive approaches that can resolve vulnerabilities before they are exploited. This means that applications, companies developing these solutions and end users are more robust and resilient. 

The use of DevSecOps practices at Payara is playing a key role in helping the entire engineering team deliver high-quality code during rapid development cycles. Through a quality-centric, collaborative environment that leverages automation, the company successfully releases monthly software updates for its multiple platform versions to its enterprise customers. – James Hillyard, Infrastructure Engineer for IT Operations and DevOps at Payara Services

Complexity

Organizations must factor in compliance across numerous regulations and internal policies while at the same time anticipating new cyberattack techniques and challenges. Teams should work closely with compliance officers and security teams to ensure their applications meet their expectations before release.

Complexity has created a greater need for automation, but it’s also made building automation more difficult, especially if it’s an afterthought. There are now so many activities tied to DevOps automation. For example, there’s test automation, build automation and security automation. All these categories must be addressed when working to tame complexity. – Prashanth Nanjundappa, VP of Product Management at Progress

Securing Identities Across Different Systems

Securing identities across different systems has become a top priority for organizations, especially as credential stuffing attacks rise and leaked passwords flood the dark web.

As DevOps teams manage increasingly complex environments, it’s become critical to prioritize authentication methods like passkeys and multi-factor authentication (MFA) to prevent unauthorized access. This shift is driving the adoption of advanced security solutions that protect both the development pipeline and ensure resilient identity management against modern threats. –  Rishi Bhargava, co-founder at Descope

More DevOps News

The post Security Concerns Shaping the Way Organizations Approach DevOps appeared first on Digital IT News.

]]>
Liquid Web Partners with Malwarebytes to Enhance Hosting Security https://digitalitnews.com/liquid-web-partners-with-malwarebytes-to-enhance-hosting-security/ Fri, 12 Jul 2024 17:00:30 +0000 https://digitalitnews.com/?p=11427 Liquid Web has announced a strategic partnership with Malwarebytes to employ its ThreatDown Endpoint Detection and Response (EDR) solution. This collaboration aims to proactively identify, analyze, and neutralize both emerging and existing threats for hosting customers. The solution leverages AI, machine learning, and heuristics to detect and interrupt suspicious activities. As part of Malwarebytes’ corporate [...]

The post Liquid Web Partners with Malwarebytes to Enhance Hosting Security appeared first on Digital IT News.

]]>
Liquid Web has announced a strategic partnership with Malwarebytes to employ its ThreatDown Endpoint Detection and Response (EDR) solution. This collaboration aims to proactively identify, analyze, and neutralize both emerging and existing threats for hosting customers. The solution leverages AI, machine learning, and heuristics to detect and interrupt suspicious activities. As part of Malwarebytes’ corporate product portfolio, ThreatDown solutions are designed to effectively combat threats while empowering IT with user-friendly, powerful technologies.

This collaboration strengthens Liquid Web’s commitment to providing its customers with the most comprehensive and advanced security solutions available as a part of their industry-leading hosting plans.

Through this partnership, Liquid Web will leverage the ThreatDown multi-tenant console to integrate Endpoint Detection and Response into its packages, ensuring customers benefit from additional security measures as part of a larger initiative to enhance all existing security packages.

“The ThreatDown multi-tenant console provides us with a single-pane-of-glass to manage and enhance our customers’ security,” says Stephanie Kristek, Liquid Web Product Manager. “It’s another example of how Liquid Web continues to provide innovative solutions for customers that ensure they remain secure, compliant, and highly performant.”

Specifically designed to meet the cybersecurity needs of small to midsize organizations, ThreatDown EDR provides powerful threat detection and remediation services with 24/7/365  monitoring, investigations, and response. ThreatDown EDR finds and stops known and unknown malware, including ransomware, completely removing all of the associated artifacts, changes, and other remnants (that other solutions miss) to prevent reinfection.

This advanced offering delivers a proactive defense against emerging threats, including fileless and zero-day attacks, to reduce potential data breaches, improve website performance, and support compliance with industry standards.

“Our partnership with Liquid Web underscores our commitment to take down complexity in cybersecurity,” says Brian Thomas, SVP of Global Channels, Malwarebytes. “The ThreatDown multi-tenant console provides a unified interface for a holistic view of customer endpoint security. Layered on top is our Security Advisor dashboard, which offers one-click insights into overall security posture and provides actionable recommendations for quick improvements. This powerful combination enables Liquid Web to ensure their customers’ websites and applications are protected from even the most sophisticated attacks, with measurable before-and-after security score improvements.”

Key benefits of the Liquid Web and Malwarebytes partnership include:

  • Proactive Threat Detection: ThreatDown solutions continuously monitor for suspicious activity, identifying threats before they can cause damage.
  • Automated Response: ThreatDown EDR can automatically take action to contain threats, such as isolating infected systems or blocking malicious traffic.
  • Enhanced Compliance: The ThreatDown console capabilities and reporting can help Liquid Web customers meet strict industry compliance standards.

Learn more about LiquidWeb and Web hosting with ThreatDown for every need, here.

Related News:

Malwarebytes Enhances MSPs’ Endpoint Security with ConnectWise Integration

Application Block Included in Malwarebytes ThreatDown Bundle

The post Liquid Web Partners with Malwarebytes to Enhance Hosting Security appeared first on Digital IT News.

]]>
Trend Micro Empower MSSPs to Elevate SOC Capabilities https://digitalitnews.com/trend-micro-empower-mssps-to-elevate-soc-capabilities/ Thu, 24 Aug 2023 21:35:47 +0000 https://digitalitnews.com/?p=8795 Trend Micro Incorporated announced an extension to its partner program and launched a new offering designed to empower MSSPs, service partners and pure-play managed detection and response (MDR) companies to build or grow their MDR and SOC-as-a-service offerings. The new program will further enable the global ecosystem of MSSP partners that customers rely on amidst a [...]

The post Trend Micro Empower MSSPs to Elevate SOC Capabilities appeared first on Digital IT News.

]]>
Trend Micro Incorporated announced an extension to its partner program and launched a new offering designed to empower MSSPs, service partners and pure-play managed detection and response (MDR) companies to build or grow their MDR and SOC-as-a-service offerings. The new program will further enable the global ecosystem of MSSP partners that customers rely on amidst a cybersecurity skills shortage.

“Breaches are on the rise, but many global organizations can’t afford the investment of time, resources and staff that a full SOC requires,” said Louise McEvoy, vice president of US channels at Trend. “And those that can often find their analysts frustrated by tool sprawl and overwhelmed by alerts. This opens a lucrative and important opportunity for MSSPs to deliver more value to customers, as long as they can find the right platform to deliver SOCaaS.”

Trend Vision One™ for Service Providers provides turnkey threat detection and response with extended SOAR capabilities built for managed security service partners, offering multi-tenant SOC capabilities and hundreds of third-party integrations across the IT environment and with other security vendors.

  • Out-of-the-box value, via incident response playbooks which reduce the need to build custom solutions
  • Comprehensive, end-to-end SOC technology, from XDR to protection
  • Improved customer outcomes, with MTTR (mean time to respond, repair, resolve, recover) measured not in weeks but hours
  • Extensive integrations – hundreds of integrations that offer visibility, analysis and automation across Trend and a wide range of third-party products
  • Greater SOC inspection and analytics thanks to log inspection and analytics which capture event data from a wide range of sources across the organization, from Trend and third-party solutions
  • MSSP-ready capabilities – a multi-tenant offering delivered via a single pane of glass

The new Trend Vision One for Service Providers will help managed service partners adopt and scale their SOC/SOCaaS capabilities based on readiness and maturity, to meet the complex requirements of large organizations.

“Trend’s channel-first model means the company is well positioned to address the fast-growing MSSP market,” said Jay McBain, Chief Analyst at Canalys. “Applying their resources beyond technology and into channel-driven services and programs like this latest example will enable them to maintain this standing and better serve customers.”

Partners who sign up to Trend Vision One™ for Service Providers will also receive industry-leading benefits including:

  • White-glove onboarding and enablement, leveraging Trend’s industry know-how working with hundreds of SOCs to help partners accelerate adoption and delivery of SOCaaS and MDR
  • Highly competitive pricing to allow new and existing MSSPs to penetrate the market quicker
  • Choice of partnership, which means partners can choose the partnership right for their business:
    • Fully managed MDR or SOCaaS
    • API integration to offer co-managed services for “bring your own technology” clients, where MSSPs help configure and manage Trend SOAR solution deployed on customers’ premises

“As a trusted voice in cybersecurity, Trend has made significant and valuable upgrades to enable a more effective MDR service,” said Randy Watkins, chief technology officer (CTO) for Critical Start. “The Vision One platform addresses the growing demand for risk visibility without increasing the burden on security teams and empowers us to provide superior value to our customers and increase their cyber resilience.”

For more information visit the website here.

Related News:

Cradlepoint Launched the S700 IoT Router for Zero Trust Security

Top Security Challenges for Small Organizations is Lack of Budget

The post Trend Micro Empower MSSPs to Elevate SOC Capabilities appeared first on Digital IT News.

]]>
MixMode’s Paradigm Partner Program Offers Advanced AI Cybersecurity https://digitalitnews.com/mixmodes-paradigm-partner-program-offers-advanced-ai-cybersecurity/ Thu, 24 Aug 2023 20:48:41 +0000 https://digitalitnews.com/?p=8770 MixMode Inc. announced the MixMode Paradigm Partner Program, giving the world’s top Value Added Resellers (VARs), Managed Service Providers (MSP), Global Systems Integrators (GSIs) and Distributors, access to an advanced cybersecurity platform for real-time threat detection and response. The new program enables MixMode and its partners to meet accelerated demand for solutions that bolster cybersecurity [...]

The post MixMode’s Paradigm Partner Program Offers Advanced AI Cybersecurity appeared first on Digital IT News.

]]>
MixMode Inc. announced the MixMode Paradigm Partner Program, giving the world’s top Value Added Resellers (VARs), Managed Service Providers (MSP), Global Systems Integrators (GSIs) and Distributors, access to an advanced cybersecurity platform for real-time threat detection and response. The new program enables MixMode and its partners to meet accelerated demand for solutions that bolster cybersecurity defenses across complex data environments: cloud, on-prem, or hybrid.

“We have launched this channel-first strategy at MixMode to meet the rising demand from enterprise organizations whose technologies are failing them in the fight against cyber threats. MixMode’s patented AI generates an evolving alert framework capable of precise real-time detections, uniquely positioning MixMode and its partners to detect and combat the sophisticated cyber attacks of the 21st century including zero-day attacks and ransomware,” said Mark Rotolo, Chief Revenue Officer. “We are excited to empower our partners to deliver more secure solutions leveraging the MixMode Platform.”

The Paradigm program is structured in three tiers for our reseller partner community to reward deeper engagement and investments in MixMode. As well, MixMode offers a managed service partners’ program powered by the platform’s multi-tenant capabilities, which makes our MSPs more efficient from one console and provides a seamless billing solution so they can help customers fight AI-generated and novel attacks with generative AI.

The key benefits of the newly-launched MixMode Paradigm Partner Program Includes:

  • Access to the MixMode patented generative AI Platform
  • Co-marketing investments for market growth
  • Partner enablement to accelerate our joint support in the field with partners
  • Access to our newly-launched partner portal with the ability to leverage co-branded vertical technical assets

The MixMode Paradigm Partner Program is designed to open new channels for global customers to harness the breakthrough threat detection and response capabilities MixMode’s patented AI Platform offers for both cloud and on-prem environments. MixMode partners are already seeing service opportunities at around 25% of the total sale, which is driving better margins and overall support for their end-users.

“MixMode gives our clients the ability to detect zero-day attacks and other non-signature-based techniques in the world’s largest datasets before they become a problem,” said Justin Domachowski, CEO and Founder of Defy Security. “This is game-changing protection against increasingly sophisticated adversaries.”

“I’m proud to launch the Paradigm Partner Program and provide our partners with the tools and support they need to take advantage of MixMode’s one-of-a-kind application of generative AI for Cybersecurity threat detection, to benefit and protect our partners’ customers,” said Todd DeBell, VP of Global Channels. “2023 has been a year of investment and growth in MixMode’s channel-first strategy and I am pleased to lead this veteran team of channel professionals. This program enables our partners to quickly leverage the MixMode Platform to deliver advanced threat detection and response at scale to customers across every industry.”

For more information visit the website here.

Related News:

Picus Shows 40% of Companies Fail the Security and Attack Simulation

Knightscope Security Robot Receives Signed Contract

The post MixMode’s Paradigm Partner Program Offers Advanced AI Cybersecurity appeared first on Digital IT News.

]]>
Gigamon Deep Observability Pipeline Is Ready To Be Explored https://digitalitnews.com/vmwares-gigamon-deep-observability-pipline-is-ready-to-be-explored/ Fri, 11 Aug 2023 17:17:56 +0000 https://digitalitnews.com/?p=8636 Gigamon showcases the new security solutions for hybrid cloud infrastructure, highlighting how organizations can eliminate security blind spots. Gigamon announces the new GigaVUE Cloud Suite™, a VMware-certified deep observability pipeline, that acquires, optimizes, and distributes traffic and network-derived intelligence from any virtual machine or container across leading cloud platforms to monitoring and security tools at [...]

The post Gigamon Deep Observability Pipeline Is Ready To Be Explored appeared first on Digital IT News.

]]>

Gigamon showcases the new security solutions for hybrid cloud infrastructure, highlighting how organizations can eliminate security blind spots.

Gigamon announces the new GigaVUE Cloud Suite™, a VMware-certified deep observability pipeline, that acquires, optimizes, and distributes traffic and network-derived intelligence from any virtual machine or container across leading cloud platforms to monitoring and security tools at the VMware Explore event in Las Vegas.

“Working with VMware, we’ve certified our Gigamon Deep Observability Pipeline so mutual customers can gain visibility into all hybrid cloud traffic, regardless whether virtual, container, or multi-cloud, and better leverage their current tooling to secure their hybrid cloud infrastructure.” said Bassam Khan, vice president of product and technical marketing at Gigamon.

As the complexity of hybrid cloud infrastructure continues to grow and organizations look to get the most out of their cloud investments, the deep observability market is forecasted to grow at a 52 percent CAGR and reach $1.9B by 2027. This growth is supported by the recent Gigamon 2023 Hybrid Cloud Security Survey, in which nearly all respondents agree that today cloud security is dependent on gaining visibility across all data-in-motion (96%) and believe that deep observability is an important element of their cloud security (97%).

You can learn more from the experts about the Gigamon Deep Observability Pipeline as it works within the VMware environment to harness actionable network-level intelligence to amplify the power of security and observability tools by visiting the Gigamon website here to schedule a demo.

“As network blind spots continue to grow with increasing lateral and container communications, deep observability has emerged as the foundation for today’s effective security posture,” said Bassam Khan, vice president of product and technical marketing at Gigamon.

Related News:

Netwrix MSP Sector Report Finds Data and Network Security Top Priorities

Trend Vision One Announced for Optimized Security for Endpoints

The post Gigamon Deep Observability Pipeline Is Ready To Be Explored appeared first on Digital IT News.

]]>
IDEMIA ID2Travel Delivers a Biometric Travel Experience https://digitalitnews.com/idemia-id2travel-delivers-a-biometric-travel-experience/ Mon, 06 Dec 2021 23:51:56 +0000 https://digitalitnews.com/?p=5298 IDEMIA I&S North America, the leading identity security and authentication solutions provider, announced the first-of-its-kind travel platform, ID2Travel is launching in North America. ID2Travel is the only interoperable traveler identity platform covering the entire passenger facilitation ecosystem, already proven by IDEMIA and partners around the globe. Based on identity management and biometric identification, ID2Travel is [...]

The post IDEMIA ID2Travel Delivers a Biometric Travel Experience appeared first on Digital IT News.

]]>
IDEMIA I&S North America, the leading identity security and authentication solutions provider, announced the first-of-its-kind travel platform, ID2Travel is launching in North America. ID2Travel is the only interoperable traveler identity platform covering the entire passenger facilitation ecosystem, already proven by IDEMIA and partners around the globe.

Based on identity management and biometric identification, ID2Travel is a passenger facilitation solution that improves the traveler experience to deliver efficient, secure and frictionless travel. The platform is interoperable and can be deployed as part of the airport, airline, port or any travel-based infrastructure, or through IDEMIA’s patented and National Institute of Standards and Technology (NIST)-rated biometric capture solutions. The passenger experience from check-in and across every touchpoint in the travel experience uses identity proofing that leverages mobile enrollment with secured digital credentials on the traveler’s mobile device, biometric devices, and technology back-end services.

“ID2Travel is transforming the entire travel experience,” said Lisa Sullivan, Senior Vice President, Travel and Transport, IDEMIA I&S North America. “Prior to COVID, Americans took approximately 2.3 billion trips, over a one-year period, and this makes the need for the passenger experience to be even more frictionless and seamless as we return to pre-pandemic travel patterns. With that experience and privacy in mind, the timing couldn’t be more ideal to launch our ID2Travel offering in North America to improve passenger flow and maintain a touchless experience, while balancing interoperability throughout the broader travel ecosystem.”

Passengers can enroll using a mobile device from home by scanning a state ID or passport, and then taking a selfie to do a 1:1 match. Once submitted for enrollment, travelers will be able to use biometrics to securely and simply move through the airport to their gate and beyond in their travel experience.

The IDEMIA solution also allows passengers to opt out and remove their enrollment at any time and all data is immediately removed from the system, empowering the traveler to take full control of their personal identity information (PII).  IDEMIA is the only company that has successfully delivered a complete biometric enrollment to gate frictionless passenger facilitation solution.

Related News:

Find an Instant Friend for an Activity in Real-Time with WE-KONEKT

AI Should Be Used to Help Youth Tackle Smartphone Addiction

The post IDEMIA ID2Travel Delivers a Biometric Travel Experience appeared first on Digital IT News.

]]>
Organizations Are Prioritizing Cybersecurity Initiatives But Are Dragged Down By Lack Of Fundamentals, New ReliaQuest Study Reveals https://digitalitnews.com/organizations-are-prioritizing-cybersecurity-initiatives-but-are-dragged-down-by-lack-of-fundamentals-new-reliaquest-study-reveals/ Thu, 16 Sep 2021 23:30:27 +0000 https://digitalitnews.com/?p=4819 Open XDR-as-a-Service leader ReliaQuest, in partnership with Ponemon Research, announced publication of a survey report detailing the needs and priorities of cybersecurity leaders in the United States and United Kingdom. The report, “Making Security Possible and Achieving a Risk-oriented Security Posture,” shows that organizations are prioritizing strategic security programs but missing the foundational capabilities they [...]

The post Organizations Are Prioritizing Cybersecurity Initiatives But Are Dragged Down By Lack Of Fundamentals, New ReliaQuest Study Reveals appeared first on Digital IT News.

]]>
Open XDR-as-a-Service leader ReliaQuest, in partnership with Ponemon Research, announced publication of a survey report detailing the needs and priorities of cybersecurity leaders in the United States and United Kingdom. The report, “Making Security Possible and Achieving a Risk-oriented Security Posture,” shows that organizations are prioritizing strategic security programs but missing the foundational capabilities they need to make meaningful changes to their security posture. Among the roadblocks to achieving a risk-oriented posture are ineffective security metrics, operational inefficiencies, and the lack of full visibility across their dynamic IT environment.

“This research offers insights into the priorities of security leaders, the day-to-day struggles they face and their ambition to support the business through change,” said Ashok Sankar, Vice President of Product and Solutions Marketing at ReliaQuest. “While it’s positive to see more leaders engaging in strategic approaches to securing their organization, as they look to implement programs like Zero Trust – which can be a multi-year journey – it’s important to keep their energy focused on the fundamentals of cybersecurity. Visibility, metrics and process aren’t sexy, but they are the building blocks of a resilient security program.”

Sankar added: “As organizations seek to digitally transform their business and adapt to hybrid work, it’s critical that security teams are not only aligned on goals, but also have the proper resources to drive resilient security operations, setting the enterprise up for long-term success.”

Key insights include:

Security leaders are committed to a stronger risk-based security posture

  • 57% of respondents are prioritizing securely migrating applications to the cloud.
  • Almost half (49%) of security leaders are enabling DevSecOps best practices.
  • 48% of organizations surveyed are prioritizing implementing Zero Trust principles as part of their security strategy.

Security teams are not aligned on their security program or metrics

  • The primary obstacle to implementing an IT security risk management program is a lack of standardized metrics to measure progress (64%), followed by the lack of a risk management strategy and decision-making structure (58%).
  • 58% of respondents say that the lack of a well-defined security and risk management program is what makes their organization most vulnerable to attacks, but only 31% consider developing a risk-reduction program a top security priority.
  • Only a third (37%) of those surveyed believe that their teams are tracking the right security metrics and that it is easy to communicate them to business executives and board members.
  • Only about half (49%) rate developing business goal–oriented metrics as one of the top priorities for the next year.

Security teams are inhibited by process and operational inefficiencies

  • 31% of respondents report their security staff spends at least 3 hours a day manually administering and managing (optimization, writing rules, integrating) tools.
  • The majority (57%) of organizations have one staff member managing more than four tools in their organizations. Only 17% have one staff member assigned to manage a single tool.
  • 52% agree that their team is spending too much time on data collection activities instead of threat detection and analysis.

Poor enterprise-wide visibility is the main culprit behind risk exposure

  • Only 13% say they have more than 75% visibility across all security tools, including on-premises and the cloud. 69% believe they have less than 50% visibility across all security tools, including on-premises and the cloud.
  • Only about one-third (36%) say they are measuring visibility across the environment, including on-premises and the cloud.

The full report is available to download here.

Ponemon Research and ReliaQuest will host a webinar to review the findings in greater detail. To register for the online webinar, please visit online experiences.

Methodology
More than 1,000 security leaders were surveyed in the United States (632) and United Kingdom (391) who are familiar with the organizations’ security operations and strategy. Participants in this research are knowledgeable about their organizations’ efforts in attaining a risk-oriented security posture. Most respondents are involved in implementing solutions (61 percent) followed by evaluating solutions (48 percent). The report presents the consolidated U.S. and U.K. research findings.

Image licensed by pexels.com

Related News:

ReliaQuest Awarded Patent Recognizing Data Comparison Capabilities

Survey Finds 76% of Enterprises Have Already Adopted a Multi-Cloud Strategy According to HashiCorp’s Inaugural State of Cloud Strategy

 

The post Organizations Are Prioritizing Cybersecurity Initiatives But Are Dragged Down By Lack Of Fundamentals, New ReliaQuest Study Reveals appeared first on Digital IT News.

]]>
Norton Family Plan Adds New Features to Boost Safety as Parents Send Their Children Back to School https://digitalitnews.com/norton-family-plan-adds-new-features-to-boost-safety-as-parents-send-their-children-back-to-school/ Wed, 11 Aug 2021 21:12:55 +0000 https://digitalitnews.com/?p=4613 NortonLifeLock, a global leader in consumer Cyber Safety, introduced new features to Norton Family that provide an easy, safe and secure way for parents to remotely supervise their children with location-based boundaries and alerts. “As children of all ages return to school in-person, many parents will want to be aware of their kids’ whereabouts as [...]

The post Norton Family Plan Adds New Features to Boost Safety as Parents Send Their Children Back to School appeared first on Digital IT News.

]]>
NortonLifeLock, a global leader in consumer Cyber Safety, introduced new features to Norton Family that provide an easy, safe and secure way for parents to remotely supervise their children with location-based boundaries and alerts.

“As children of all ages return to school in-person, many parents will want to be aware of their kids’ whereabouts as they spend more time outside the home,” said Gagan Singh, chief product officer at NortonLifeLock. “We’ve added new personalized features to our Norton Family product to help make it easier and more secure for parents to be connected with their children who are on the go.”

Norton has added new features to Norton Family, including:

  • Favorite Locations: Helps parents establish approved geographic locations as favorite locations. Once set, parents will receive notifications when their child’s device arrives or departs those set locations.
  • Alert Me: Automatically allows parents to easily stay informed about their child’s location. Parents can set specific dates and times to receive automatic check-in alerts from the location of their child’s device.

With parental controls to address Cyber Safety risks and establish healthy online habits, Norton Family provides a truly holistic solution for parents to help ensure their children are protected and staying safe online. As the school year begins across the country, these parental controls and safety measures are even more important as children spend an increasing amount of time online across multiple devices for education purposes. To help children of all ages stay safe this school year, Norton has provided the following tips for parents to manage cyber risks:

Talk About Cyber Safety Early: A recent study conducted online by The Harris Poll found that Americans think conversations about online safety should start young, with more than 4 in 5 Americans (84%) feeling it’s absolutely essential or very important for parents to teach their children about Cyber Safety. As young children enter school and start to establish their independence, it’s important to provide a basic understanding of online safety by addressing topics like:

  • The dangers of the internet, including suspicious activity, phishing scams and what to do if something seems unusual. Make it clear that laptops and devices should never be left unattended and that lock screens should be used to add further protection.
  • Cyberbullying and the dangers of online predators. Parents can set rules that their young children can only chat or game online with people whom they’ve already met in real life.
  • The importance of creating strong passwords that are not recycled for multiple accounts or are easy to guess.

Digitally-savvy Tweens and Teens Still Need Guidance: Tweens and teens may be more digitally advanced than ever before, but that doesn’t mean they have the best judgment when it comes to staying safe online. Parents of children in this age group can further protect their kids by educating them on the following:

  • The importance of protecting their identity. It’s important to remind children not to reveal too much information about themselves online. For example, a teen may not think twice about sharing a picture of their license after passing their driver’s test, but that could provide a treasure trove of sensitive and valuable information for identity thieves and cybercriminals.
  • The importance of keeping privacy settings on to ensure personal information isn’t intercepted by a hacker.
  • Mitigating risks when connecting to public Wi-Fi. As teens may go to coffee shops or public libraries to complete school assignments individually or in a group setting, make it clear that cybercriminals consider public Wi-Fi an easy access point to get hold of sensitive data and encourage them to take steps to protect their online privacy and security by using a VPN.

Norton Family is available at Norton.com as well as through retail partners including Amazon, Best Buy, NewEgg, and Staples Canada.

To learn more about Norton Family and additional Cyber Safety tips for parents, visit https://us.norton.com/norton-family.

Image licensed by pexels.com

Related News:

New Norton™ 360 App Brings Comprehensive Cyber Safety to Android and iOS Devices

Western Digital Flash Innovations Unlock Powerful New Experiences for Next-Generation 5G Smartphone Users

The post Norton Family Plan Adds New Features to Boost Safety as Parents Send Their Children Back to School appeared first on Digital IT News.

]]>
Traceable AI releases the industry’s first free API security solution https://digitalitnews.com/traceable-ai-releases-the-industrys-first-free-api-security-solution/ Tue, 03 Aug 2021 16:24:22 +0000 https://digitalitnews.com/?p=4584 Traceable AI, announced the introduction of the industry’s first free API security solution. Unique in its offering, Traceable’s free API security solution enables developers and security operations teams to get started improving the API security of their applications without the need for budgetary approval. With this new offering, Traceable AI aims to enable everyone to [...]

The post Traceable AI releases the industry’s first free API security solution appeared first on Digital IT News.

]]>
Traceable AI, announced the introduction of the industry’s first free API security solution. Unique in its offering, Traceable’s free API security solution enables developers and security operations teams to get started improving the API security of their applications without the need for budgetary approval. With this new offering, Traceable AI aims to enable everyone to make progress on solving the API security crisis.

Despite knowing that API security needs to be a critical component of developing their applications, DevOps teams often remain handicapped by inadequate tools and budgets to properly address their needs. This has put the software industry in an API security crisis.

Per the just released Gartner® Hype Cycle™ for APIs and Business Ecosystems, 2021 report, “Every connected mobile, modern web or cloud-hosted application uses and exposes APIs. These APIs are used to access data and to call application functionality. APIs are easy to expose but difficult to defend. This creates a large and growing attack surface, leading to a growing number of publicized API attacks and breaches. Traditional network and web protection tools do not protect against all the security threats facing APIs, including many of those described in the  OWASP API Security Top 10.”

In the report, Gartner further states “Because APIs are typically used for access to data or application functionality, often linked to systems of record, the impact of an API breach can be substantial. Privacy regulations typically require reporting if private data is breached through an insecure API. APIs are easily and intentionally programmable, so a vulnerability can leak large volumes of data. That it can be challenging to separate valid API use from nefarious access raises the risk of blocking valid use.”

Despite frequent high profile breaches such as Peloton and LinkedIn, organizations on average only allocate about 6% of their overall IT spend towards security — leaving them unprepared to manage the explosion of API adoption and the associated security risks.

With the free API security solution offered by Traceable AI, these teams now have the option to use a free enterprise-grade solution to gain visibility, protection, and analytical insights into their APIs.

Powered by its distributed tracing and unsupervised machine learning technologies, Traceable AI addresses these problems by learning the application context and normal behaviors. Unlike Web Application Firewalls (WAFs) that rely on static threat signatures of known attacks, deep API insights and ML enhanced anomaly detection enable the Traceable AI Free tier offering to detect and block known (such as the OWASP Top 10) and unknown threats with no signature tuning yet minimal false positives.

“API security threats are becoming pervasive and increasing in frequency. API security is an emerging field, and application and security teams need to understand how to address this problem unique to their business models. WAFs and API gateways simply aren’t enough to overcome these emerging threats and it’s past time for us to have a real-solution that solves the problem rather than just apply a band-aid. Our free offering introduces API security benefits without the budget pressure that these teams often face. We hope access to it will encourage widespread adoption of API security practices and help teams to truly understand and address API-based security threats,” said Jyoti Bansal, CEO and Co-Founder of Traceable AI.

The self-service deployable free version of Traceable AI includes:

  • Continuous discovery and inventory of all APIs, including shadow and orphaned APIs
  • Real-time, automatic API documentation including parameter details, usage patterns, and API changes flagged
  • Insights into API runtime behavior, including API usage patterns, user details, and where sensitive data is being exposed
  • Continuously updated API risk scores based on likelihood and impact of abuse
  • API & web application protection (OWASP Top 10) powered by ML anomaly detection for low false positives without signature maintenance
  • Real-time API vulnerability detection of API misconfigurations to prevent malicious exploitation by cybercriminals
  • API performance metrics for establishing normal vs abnormal behavior, including number of calls, call frequency, and error and latency distribution
  • Block threats based on threat actor, IP range, anomaly detection + signatures

For larger scale environments and more advanced features, Customers can also upgrade to the Team or Enterprise tiers offered by Traceable AI.

One year since the initial company launch, Traceable AI has been deployed in several customer environments, pioneering the way for the adoption of API Security practices.  One such customer, Houwzer, provides an end-to-end digital real-estate and mortgage brokerage platform to its clients. It was important for Houwzer to ensure a secure platform to prevent bad actors from gaining unauthorized access to its clients’ private and sensitive information and ensure compliance with all regulatory authorities.

“Houwzer faces a high-stakes threat landscape and an extremely complex regulatory environment. Ensuring data security and compliance is absolutely critical to our business continuity and success,” said Greg Phillips, Chief Technology Officer at Houwzer. “With Traceable AI, we went from blocking zero threats to automatically blocking hundreds of threats. We have been able to secure our customer data, prevent breaches, and it has helped our development and security teams work collaboratively on addressing API based threats. Traceable AI also empowers us to seamlessly comply with 21 different licenses. It’s been a game changer.  All this, without hiring a dedicated security team as we scale our business.”

To obtain more features and achieve broader scalability, Traceable AI also offers Team and Enterprise editions. To learn more or to get started with the free solution, visit https://www.traceable.ai/free.

Gartner, ‘Hype Cycle for APIs and Business Ecosystems, 2021’, Mark O’NeillJohn SantoroJuly 27, 2021

Image licensed by unsplash.com

Related News: 

Qualys Collaborates with Red Hat to Enhance Security for Red Hat Enterprise Linux CoreOS and Red Hat OpenShift

Gartner Says Four Trends Are Shaping the Future of Public Cloud

The post Traceable AI releases the industry’s first free API security solution appeared first on Digital IT News.

]]>
Optiv Security Launches Next-Gen Managed XDR to Stop Threats Earlier in Attack Lifecycle https://digitalitnews.com/optiv-security-launches-next-gen-managed-xdr-to-stop-threats-earlier-in-attack-lifecycle/ Tue, 03 Aug 2021 16:02:09 +0000 https://digitalitnews.com/?p=4578 Optiv Security, launched its Managed Extended Detection and Response (MXDR) offering at Black Hat USA 2021. The technology-independent offering enables clients to take rapid and decisive action against today’s most critical cyberattacks and strengthen their security posture. Optiv Managed XDR is a next-generation tech-enabled service that leverages your existing technology investments and deploys Optiv’s deep expertise [...]

The post Optiv Security Launches Next-Gen Managed XDR to Stop Threats Earlier in Attack Lifecycle appeared first on Digital IT News.

]]>
Optiv Security, launched its Managed Extended Detection and Response (MXDR) offering at Black Hat USA 2021. The technology-independent offering enables clients to take rapid and decisive action against today’s most critical cyberattacks and strengthen their security posture.

“Optiv MXDR brings simplicity, transparency and automation to clients’ environments, enhancing existing defenses to counter known and emerging threats with confidence and speed,” said David Martin, chief services officer for Optiv. “What’s more, we can seamlessly leverage the power of Optiv to extend and layer the offering with a full suite of complementary services like remediation, incident response, threat hunting, and beyond.”

Optiv MXDR is the only managed cloud-based, next-gen advanced threat detection and response service that ingests data across various layers of technologies to correlate, normalize, enrich, and enable automated responses to malicious activity in real-time. By automating incident investigation with actionable insights, organizations can detect threats faster and prioritize which threats to mitigate first, significantly reducing the attack surface.

“We know the threat landscape; both what’s at stake and how to circumvent threat actors while significantly reducing time to detect and respond,” said John Ayers, XDR vice president for Optiv. “We meet clients where they are and customize our continuously managed approach to ease the burden of the unknown and allow teams to detect, respond and remediate threats faster while also automating deeper investigation for future improvements.”

Devo has been named a foundational partner in Optiv MXDR, delivering scalable, cloud-native logging and security analytics via the Devo Platform, enabling full visibility across cloud and on-premise environments for Optiv customers.

“Security teams are eager to learn more about XDR as they look to consolidate their security stack for greater efficiency and accuracy in threat detection and response,” said Ted Julian, SVP of Product at Devo. “Two constraints have always stood in their way: lack of real-time access to historical data, and the inability to collect and analyze the massive data volumes associated with modern operational environments. Devo eliminates these concerns and is uniquely qualified to power solutions like Optiv’s MXDR.”

Optiv delivers threat management solutions to more than 60 percent of Fortune 500 companies. View the complete MXDR service brief and find out how organizations can enhance their security posture with Optiv.

Image licensed by: unsplash.com

Related News:

Gartner Says Four Trends Are Shaping the Future of Public Cloud

Veristor and Network Data Systems Partner to Deliver Services for Managed Secure Networking

The post Optiv Security Launches Next-Gen Managed XDR to Stop Threats Earlier in Attack Lifecycle appeared first on Digital IT News.

]]>