Category Archives: Internet Security
Internet Security Market 2021 Will Reflect Significant Growth in Future with Size, Share, Growth, and Key Companies Analysis- HPE, IBM, Intel,…
DataIntelo published a detailed report on Global Internet Security Market for the clients that wants to explore new market avenues, get in-depth insights on the market products, maximize their revenue, and review the strategies implemented by prominent players in the market.
Key Players of the Internet Security Market
HPEIBMIntelSymantecAlienVaultBlackStratusCheck Point Software TechnologiesCiscoCyrenFortinetF-SecureGemaltoKaspersky LabMicrosoftPalo Alto NetworksRSASophosTrend MicroTrustwave HoldingsWurldtech Security Technologies
Get Sample of the Internet Security Report https://dataintelo.com/request-sample/?reportId=90352
Major Highlights of the Internet Security Market Report
The research team at DataIntelo has proximately monitored the market since 2017. During the time, the team has covered the factors that are expected to boost the market performance and impede the growth of the market during the forecast period, 2020-2027. Additionally, it has enlisted the challenges faced by key market players, new entrants, and emerging players in the market.
What is Covered in the Chapter of Impact of COVID-19 Pandemic?
The coronavirus pandemic has disrupted the market dynamics, as it had imposed the restriction on the opening of offices and manufacturing facilities. This, in turn, has persuaded employees to work from home and halted the production of goods across the globe. Moreover, it had increased the gap between demand and supply owing to the restricted trade affairs around the world. However, it has created lucrative opportunities for the key players in certain regions.
The COVID-19 chapter of Internet Security Market includes:
What is Covered in The Segmentation Part of The Internet Security Report?
Malicious softwareDenial-of-service attacksPhishingApplication vulnerabilities
GovernmentBanking, financial services, and insurance (BFSI)ManufacturingInformation communication and technology (ICT)RetailHealthcare
Note: Can add country of your choice in the report at no extra cost.
The segmentation part of the report covers:
This segmentation provides the esteemed reader with the comprehensive regional analysis, which includes if the region/country has a potential worth of investment. This analysis is prepared by considering the socio-economic development and government regulations & policies of the country.
Buy the Complete Report https://dataintelo.com/checkout/?reportId=90352
Note: Additional company names can be added in the list.
The report covers the major players of the market and provides information about their product portfolio and strategies deploying regarding the market. This market report includes technological advancements of products by the key players. It lays out the information on collaborations, partnerships, mergers, and agreements carried out by industry players over the years in the market. Furthermore, it covers the factors that have created opportunities and challenges for them.
7 Reasons to Buy Report from DataIntelo
Below is the TOC of the report:
Assumptions and Acronyms Used
Internet Security Market Overview
Global Internet Security Market Analysis and Forecast by Type
Global Internet Security Market Analysis and Forecast by Application
Global Internet Security Market Analysis and Forecast by Sales Channel
Global Internet Security Market Analysis and Forecast by Region
North America Internet Security Market Analysis and Forecast
Latin America Internet Security Market Analysis and Forecast
Europe Internet Security Market Analysis and Forecast
Asia Pacific Internet Security Market Analysis and Forecast
Asia Pacific Internet Security Market Size and Volume Forecast by Application
Middle East & Africa Internet Security Market Analysis and Forecast
If you have any inquiry of the report, connect with our analyst @ https://dataintelo.com/enquiry-before-buying/?reportId=90352
DataIntelo has extensive experience in the creation of tailored market research reports in several industry verticals. We cover in-depth market analysis which includes producing creative business strategies for the new entrants and the emerging players of the market. We take care that our every report goes through intensive primary, secondary research, interviews, and consumer surveys. Our company provides market threat analysis, market opportunity analysis, and deep insights into the current and market scenario.
To provide the utmost quality of the report, we invest in analysts that hold stellar experience in the business domain and have excellent analytical and communication skills. Our dedicated team goes through quarterly training which helps them to acknowledge the latest industry practices and to serve the clients with the foremost consumer experience.
Name: Alex Mathews
Address: 500 East E Street, Ontario,
CA 91764, United States.
Phone No: USA: +1 909 414 1393
Utah is the 2nd State to Create a Safe Harbor for Companies Facing Data Breach Litigation – Lexology
In mid-March, Utah Governor Spencer Cox signed into law the Cybersecurity Affirmative Defense Act (HB80) (the Act), an amendment to Utahs data breach notification law, creating several affirmative defenses for persons (defined below) facing a cause of action arising out of a breach of system security, and establishing the requirements for asserting such a defense.
In short, the Act seeks to incentivize individuals, associations, corporations, and other entities (persons) to maintain reasonable safeguards to protect personal information by providing an affirmative defense in litigation flowing from a data breach. More specifically, a person that creates, maintains, and reasonably complies with a written cybersecurity program that is in place at the time of the breach will be able to take advantage of an affirmative defense to certain claims under the Act:
The written cybersecurity programs must satisfy several requirements to warrant the Acts protection. In part, such programs must provide administrative, technical, and physical safeguards to protect personal information. These safeguards include:
Reasonably conforming to a recognized cybersecurity framework generally means (i) being designed to protect the type of information involved in the breach of system security, and (ii) either (I) constituting a reasonable security program as described in the Act; (II) reasonably conforming to an enumerated security framework, such as the NIST special publication 800-171 or the Center for Internet Security Critical Security Controls for Effective Cyber Defense; or (III) reasonably complying with the federal or state regulations applicable to the personal information obtained in the breach of system security (e.g., complying with HIPAA when protected health information is breached).
A person may not claim an affirmative defense, however, if:
Utah is the second state to establish an affirmative defense to claims arising from a data breach. Back in 2018, Ohio enacted the Ohio Data Protection Act (SB 220), similarly providing a safe harbor for businesses implementing and maintaining reasonable cybersecurity controls.
This affirmative defense model established by both Utah and Ohio is a win for both companies and consumers, as it incentivizes heightened protection of personal data, while providing a safe harbor from certain claims for companies facing data breach litigation. It would not be surprising to see other states take a similar approach. Most recently, the Connecticut General Assembly reviewed HB 6607, An Act Incentivizing the Adoption of Cybersecurity Standards for Businesses, which provides for a similar safe harbor as in Utah and Ohio. Creating, maintaining, and complying with a robust data protection program is a critical risk management and legal compliance step, and one that might provide protection from litigation following a data breach.
Hackers are targeting unpatched vulnerabilities in SAP applications, according to areport issued bySAP and cyber threat research company Onapsis.
The report detailed more than 300 successful exploitations of critical vulnerabilities previously patched by SAP through 1,500 attack attempts between June 2020 and March 2021.
It also highlighted that the time window for defenders to act was significantly smaller than previously thought, with examples of SAP vulnerabilities being weaponised in less than 72 hours after the release of patches and new unprotected SAP applications provisioned in cloud (IaaS) environments being discovered and compromised in less than three hours.
The report noted that 18 of the worlds 20 major vaccine producers run their production on SAP, 19 of 28 Nato countries run SAP, and 77% of the worlds transaction revenue touches an SAP system.
A spokesperson for Onapsis said this was the first time SAP had issued an official pressrelease about cyber threats affecting its customers. Onapsis is a security and compliance monitoring software company as well as a security research firm.
The release said both companies had worked in close partnership withtheUS Department of Homeland Security (DHS), the Cybersecurity and Infrastructure Security Agency (CISA) and Germanys Federal Cybersecurity Authority (BSI), advising organisations to take immediate action to apply long-available SAP patches and secure configurations, and perform compromise assessments on critical environments.
The two declared themselves unaware of known customer breaches directly related to this research. The report also did not describe any new vulnerabilities in SAP cloud software as a service or SAPs own corporate IT infrastructure. Both companies, however, noted that many organisations still had not applied relevant mitigations that have long been provided by SAP.
Were releasing the research Onapsis has shared with SAP as part of our commitment to helping our customers ensure their mission-critical applications are protected Tim McKnight, SAP
Were releasing the research Onapsis has shared with SAP as part of our commitment to helping our customers ensure their mission-critical applications are protected, saidTim McKnight, chief security officer at SAP. This includes applying available patches, thoroughly reviewing the security configuration of theirSAPenvironmentsand proactively assessing them for signs of compromise.
Onapsis CEO and co-founderMariano Nunez said the critical findings noted in its report described attacks on vulnerabilities for which patches and secure configuration guidelines had been available for months or even years.
Unfortunately, too many organisations still operate with a major governance gap in terms of the cyber security and compliance of their mission-critical applications, allowing external and internal threat actors to access, exfiltrate and gain full control of their most sensitive and regulated information and processes, he said. Companies that have not prioritised rapid mitigation for these known risks should consider their systems compromised and take immediate and appropriate action.
In the reports foreword, Nunez said: The evidence captured in this report clearly shows that threat actors have the motivation, means and expertise to identify and exploit unprotected mission-critical SAP applications, and are actively doing so. They are directly targeting these applications, including, but not limited to, enterprise resource planning (ERP), supply chain management (SCM), human capital management (HCM), product lifecycle management (PLM), customer relationship management (CRM) and others.
Business applications have been known for some time to be the soft underbelly of many corporate organisations, beyond perimeter security. Nunez, in the foreword, also said: Cloud and internet-exposed mission-critical applications that help foster new processes and business opportunities also increase the attack surface that cyber actors are now targeting.
The release stated that none of the vulnerabilities were present in cloud solutions maintained by SAP.
The DHS CISA has also issued an alert about the potential targeting of critical SAP applications.
Go here to see the original:
Unpatched SAP applications are target-rich ground for hackers - ComputerWeekly.com
Verizon Mobile Security Index: COVID-19 unearths new cyber threats for businesses – Verizon Communications
What you need to know:
Nearly half (49 percent) of businesses surveyed said that changes to remote working practices made during lockdown adversely affected their cybersecurity.
40 percent think mobile devices are their companys biggest IT security threat.
However 45 percent of businesses sacrificed the security of mobile devices to get the job done.
Results based on an independent survey of 856 professionals responsible for the buying, managing and the security of mobile and Internet of Things (IoT) devices for their companies.
BASKING RIDGE, N.J. - The COVID-19 pandemic forced businesses to quickly support remote working practices, often without proper security measures in place. The Verizon Business Mobile Security Index (MSI) 2021 reveals that many businesses may have left themselves vulnerable and open to cybercriminals in the rush to ensure their workforce could operate remotely. Forty-nine percent of businesses surveyed in the latest edition of Verizon's MSI stressed that changes made to remote working practices during lockdown adversely affected their companys cybersecurity.
Interestingly, even though 40 percent of businesses surveyed recognized that mobile devices are their companys biggest IT security threat, 45 percent of them knowingly sacrificed the security of mobile devices to get the job done (e.g., meet a deadline or productivity targets) and nearly a quarter (24 percent) sacrificed the security of mobile devices to facilitate their response to restrictions put in place due to the pandemic.
The pandemic caused a global shift in the way organizations operate, many of which ramped up their digital transformation agendas and working models to meet the fast-changing needs of both employees and customers, said Sampath Sowmyanarayan, Chief Revenue Officer, Verizon Business. While businesses focused their efforts elsewhere, cybercriminals saw a wealth of new opportunities to strike. With the rise of the remote workforce and the spike in mobile device usage, the threat landscape changed, which for organizations, means there is a greater need to hone in on mobile security to protect themselves and those they serve.
The effect of the pandemic on the workforce is going to have a lasting impact. According to the report, a large majority (70 percent) of those that had seen remote working grow following the introduction of pandemic restrictions expected it to fall again afterward. However, 78 percent said that it would still remain higher than before lockdown. Overall, our respondents said that they expected the number of remote workers to settle at around half (49 percent).
Small and Medium-Sized Businesses are also under threat
Over half of those surveyed (52 percent) said that small and medium-sized businesses are more of a target than larger enterprises but even though this is the case, 59 percent of small and medium-sized businesses had sacrificed security with 22 percent suffering a mobile compromise. Seventy-eight percent stated that they should take mobile-device security more seriously.
Of those surveyed, 72 percent of organizations are worried about device abuse or misuse. Part of the problem is that many companies struggle to develop an effective Acceptable Use Policy (AUP) 57 percent didnt have one at all.
The MSI details people and behaviors, apps, devices and things and networks and cloud as the four sectors of the mobile threat landscape. Additionally, it provides expert insights into how to help safeguard against pending cybercrime attacks, such as establishing a zero trust network access (ZTNA) model and a secure access service edge (SASE) architecture, which is designed for a mobile-first and cloud-first world.
The Verizon Mobile Security Index 2021 findings are based on an independent survey of 856 businesses across Australia, the U.S. and the U.K. It surveyed professionals that are responsible for the buying, managing, and security of mobile and Internet of Things (IoT) devices for their companies.
It provides unique insights into the current mobile threat landscape and what organizations are, or in many cases arent, doing to protect their data and key systems. In addition to analysis from Verizons experts, the report includes insights and real-world data from leading security and management companies Asavie, Blackberry Cylance, Check Point, IBM, Ivanti, Lookout, NetMotion, Netskope, Proofpoint, Qualcomm, Thales, VMware, and Wandera.
Read the full Verizon Mobile Security Index 2021, as well as the Public Safety, Public Sector and small and medium-sized businesses snapshots, and learn more about what Verizon is doing to help address cybersecurity threats.
There is a dire shortage of talent in the information security industry.
Today, industry roles command big salaries, but also bigger workloads.
When you read articles about the best jobs or highest paying jobs to consider, information security is always in the top 10 of the list.
How does this industry sustain current security professionals and prepare the next generation?
Here, I look at what current professionals can do, and offer sound advice for preparing the next generation of security pros.
Malicious cyber activities are becoming very common.
Some have gone so far as to say that this form of crime knows no bounds.
It is global and unlimited, like the internet itself.
The deficit of a well-developed, skilled workforce makes government and businesses recruitment efforts very difficult.
Developing sophisticated technical capacities has become a priority for US and global industries and governments.
The role of educators
No-one plays a more important role in preparing the next generation security professionals than educators and trainers.
We need to make sure existing education gives students a holistic view of cyber security with focus on relevance and proficiency.
The complicated state of cyber threats requires a learning methodology engendering critical thinking and deeper understanding to defend against increasingly complex cyberattacks.
A number of shortcomings exist in the conventional classroom training model in creating efficient and reliable cyber security professionals, according to the Software Engineering Institute.
Going forward, we will be facing increasingly interdisciplinary and multi-faceted challenges.
These will necessitate knowledge in different fields and areas, including law and law enforcement, criminology, engineering, computer science, to name a few.
This is hardly a surprise, as the main elements of cyber security technical perfection, process, and people must be supplemented by the capability to manage shortcomings.
Deterrence Doctrine and SPC (Situational Crime Prevention) theories
Information system researchers analysing security compliance and behaviour use the deterrence doctrine, according to which the likelihood of violations is inversely proportional to the perceived risk and punishment.
A review found that this theory has been the most-cited one in Centre for Internet Security (CIS) security literature over the past three decades.
According to this literature, one must increase awareness of an organisations efforts to limit ICT abuse and of the likelihood and/or extent of sanctions in order to reduce ICT violations.
The Situational Crime Prevention (SCP) Theory is widely used to study cybercrime and reduce criminal activities perpetrated or otherwise related to employees.
Most crimes are opportunistic and occur when a motivated offender detects a suitable and unguarded (or incapably guarded) target.
Proponents of the SCP theory find violators to be rational decisionmakers who carry out an analysis of costs and benefits before committing a crime.
Accordingly, the SCP theory outlines five broad categories of efforts to counteract cybercrime that security professionals should make. They are presented in the table below:
Table 1. Categories of efforts to counteract cybercrime, according to SCP
The US government established a cyber skill task force to address the crisis in human capital in the field of cyber security, improve retention and recruitment of cyber security professionals, and identify the best ways to create and support a national cyber security workforce.
This initiative gave rise to the NICE Framework: a proposal to group, organise, and describe cyber security tasks.
The framework is comprised of seven categories covering 31 specialty areas, as well as details regarding work roles, skills, abilities, knowledge, and tasks.
It has become a good starting point for developing a central cyber security curriculum and a useful categorisation of topics and related skills.
Cyber security exercises
The NICE Framework and the Situational Crime Prevention Theory have been combined to design and deliver cutting-edge tools and strategies.
One notable example of how these are used is the Cyber Security Exercises (CSE), an offense/defense environment, in which students are grouped and get a virtual machine to host HTTP(S), FTP, SSH, and other services.
These services can then be accessed by other groups.
The CSE aim to reflect real-life environments for students to apply their skills.
The approach of CSE architecture has proved useful for translating theory into practice.
More specifically, CSE are elaborate learning experiences aimed at developing competence and expert knowledge through simulation.
They are associated with a number of pedagogical issues, including design of exercises and training outcomes and evaluation.
Training effectiveness can be improved based on analysis, observation, and integrating educational knowledge and focus at each stage of the life cycle of CSE, including planning, feedback, and implementation.
Its necessary to measure change systematically in order to improve CSE, ranging from organisational change to changing customer experiences.
Scenarios to help prepare cyber security professionals
According to the Center for Internet Security, technical professionals, admins, and users share the responsibility for security.
The CIS has prepared a series of tabletop exercises to help cyber security professionals and teams secure their systems by means of tactical strategies.
These exercises are intended to assist organisations in comprehending various risk scenarios and preparing for potential cyberthreats.
The exercises Im about to present do not take very long to complete.They are a convenient tool to develop a cyber security mindset.They consist of six scenarios which list relevant processes, threat actors, and impacted assets:
Scenario 1: Malware infection
While using the companys digital camera for work, a staff member takes a picture that he then moves to his personal computer.
He does so by inserting the SD card, which while connected to his PC becomes infected with malware.
Unsuspecting of this fact, he re-inserts the card into his work computer and the malware spreads throughout the organisations system.
The question is how the company will now deal with this issue.
To answer this question, one needs to consider a few additional ones.
The first of these is who youd need to notify within the companys structure.
Its important to identify the vector of the infection and to establish a process for doing so.
In addition, what should managements reaction be?
Are there any other devices that could present a similar risk?
Does the company have policies and training to prevent this and do these apply to all storage devices?
At the core of this scenario is user awareness and detection ability.
Scenario 2: Quick fix
Your underpaid and overworked network administrator is finally going on vacation.
Just as shes packing the last item in her suitcase, her boss asks her to deploy a critical security patch.
She comes up with a quick fix so she can make her flight.
Soon after that, your service desk technician tells you people have been complaining that they cant log in.
It appears the admin did not run any tests for the critical patch she installed.
Does the technician have the skills and knowledge to handle the issue?
If not, whom should it be escalated to?
Does the company have a formal policy to change control in place?
Is staff sufficiently trained to escalate such issues?
Does the company have any disciplinary measures to take if an employee doesnt adhere to policies?
In the event of unexpected adverse impact, does the company have an option to rescind patches?
This is one of the threats that impact an organisations internal network.
Patch management is the process tested.
Scenario 3: An unexpected hacktivist threat
In the wake of an incident involving accusations of use of excessive force by authorities, a hacktivist threatens to attack your company.
You have no idea what kind of attack they are planning.
What measures can you take to best protect your organisation?
What is your reaction?
Again, you need to look at the potential threat vectors.
Perhaps certain vectors have been common in the last few weeks or months.
What methods can be used to prioritise threats?
You must alert your help desk as well as other departments within the organisation to the threat.
A bulletin board is a nifty solution.
You need to check your patch management status if you havent already, and augment IDS and IPS monitoring.
Think about getting outside help if you dont have the resources to manage all this by yourself.
Ask yourself what companies or organisations can help you analyse any malware identified.
Its evident that your response plan should account for such situations.
Your preparation is the process tested.
Your security professionals may be the first line of defense, but as you can see, they cant be the only one.
Your whole organisation needs to be involved, active, adequate, and compliant when security is at stake.
Scenario 4: Financial break-in
Following a financial audit, it emerges that a few people who have never actually worked for the company are receiving paychecks.
You conduct a review, which shows someone added them to the payroll a few weeks earlier, simultaneously, using a computer in the finance department.
How do you react?
The strategy starts with investigating how these people were added to payroll.
Lets say there was a break-in at the finance department prior to the addition.
A few computers were stolen.
However, there was no sensitive data on them, so the incident did not get serious attention.
See the original post here:
Preparing cyber professionals for the real world - ACS
Upgrade your digital security and enjoy a cleaner internet experience with this plug-and-play filter | TheHill – The Hill
The Hill may be compensated and/or receive an affiliate commission if you buy through our links.
The world is more interconnected than ever before, but this wave of technological innovation also creates evolving challenges to personal privacy. Digital security is at risk on a daily basis, even when you don't realize it, and it's crucial to stay a step ahead of those with malicious intent.
Fortunately, the Winston Privacy Filter is a simple solution that puts you in a position of empowerment when it comes to digital privacy. Discounted by 10% to a one-time payment of only $179 (reg. $199), this product is primed to supply restored peace of mind for you and your family.
Enjoy faster browsing, fewer ads, and safer internet access on all of your devices by accessing this plug-and-play option. Not only does Winston filter out trackers and aggressive advertising tactics, but it scrambles internet traffic to avoid disclosure of your location and identity in case outsiders attempt to pry into your personal information.
Swiftly eliminate big tech's spying efforts and fight against hackers to prevent damaging identity theft. Set restrictions as you see fit, including blockers for malware and adult content.
Whether you plan to use Winston on your work computer, smart TV, or children's interactive tablets, this product provides ideal protection in an increasingly risky online reality. Plus, you'll be covered on mobile devices with apps that service iOS and Android.
This subscription-free package comes with privacy filter hardware (made with aluminum and plastic; measuring in at less than five inches), a power adapter, two CAT6 Ethernet Cables, rubber bumpers, and instructions to help you sustain optimized performance.
With a 4.7 out of 5-star rating from Trustpilot, Winston is equipped with a RAM of 800MHz and 1GB DDR4 memory, backed up by security settings that are impervious to spectre and meltdown hacks.
Prioritize your digital privacy by investing in long-term protection from the Winston Privacy Filter for only $179.
Prices subject to change.
Automating cloud security is a process still in its infancy for many organizations, says Unit 42.
Image: iStock/Undefined Undefined
The coronavirus pandemic forced many organizations to put their cloud migration projects into overdrive. Such a fast and unexpected transition to the cloud inevitably opened the door to more security threats. A report released Tuesday by Palo Alto Networks threat intelligence team Unit 42 examines how the cloud migration has affected security and what organizations can do to better protect themselves.
SEE:Managing the multicloud(ZDNet/TechRepublic special feature) |Download the free PDF version(TechRepublic)
Based on internal data, Unit 42's latest "Cloud Threat Report" found that organizations increased their cloud workloads by more than 20% between December 2019 and June 2020. Along the way, cloud security incidents rose by 188% just in the second quarter of 2020.
Industries that are vital in the effort to combat the pandemic have been hit especially hard. Over last year's second quarter, cloud security incidents for the retail, manufacturing and government sectors rose by 402%, 230% and 205%, respectively.
The rise in security incidents has been triggered in part by the inability of many organizations to automate cloud security. Previous research from Unit 42 found that 65% of publicly disclosed security incidents in the cloud were due to customer misconfigurations, a problem that could have been addressed through automated security controls. As one example, infrastructure as code (IaC) offers DevOps and security teams a way to enforce security standards, but this resource remains largely untapped.
To help organizations improve their cloud security, Unit 42 offers the following recommendations:
Gain awareness and deep cloud visibility. The first step in making cloud security and compliance easier is to understand how your developers and business teams are using the cloud today. This means getting and maintaining situational awareness of what's happening in your cloud environments down to the API and workload layers.
Set security guardrails. Ask yourself what misconfigurations should never exist in your environment. One example would be a database that receives direct traffic from the internet. When misconfigurations like this are found, your security guardrails should correct them automatically. If your organization does not already do so, consider using IaC templates to enforce security guardrails. There are potential security risks to using such templates, so be sure to scan them for common misconfigurations.
Adopt and enforce standards. It's extremely difficult to automate what you haven't standardized. Many teams talk about automation without having a security standard in place. Don't start from scratch. The Center for Internet Securityhas benchmarks for all major cloud platforms. Look to automate and codify these standards by leveraging IaC.
Train and hire security engineers who code. Unlike most traditional data centers, public cloud environments are driven by APIs. Successful risk management in the cloud requires that security teams be able to leverage these APIs to manage workload security at scale. APIs are difficult to use without having engineers on your security team who know how to code and automate security processes as part of the CI/CD pipeline.
Embed security in DevOps. Strive to map out the who, what, when and where of how your organization pushes code into the cloud. Once this is done, your goal should be to locate the least disruptive insertion points for security processes and tools into your CI/CD pipeline. In this regard, getting early buy-in from DevOps teams is critical. From there, work to minimize human interaction over time by automating as many operations as possible.
This is your go-to resource for XaaS, AWS, Microsoft Azure, Google Cloud Platform, cloud engineering jobs, and cloud security news and tips. Delivered Mondays
Airlock eliminates the support burden of allowlisting by implementing simple workflows that minimize user disruption. If a required application is blocked, IT teams, including non-security personnel, can grant permissions to users using a variety of One-Time Password (OTP) options.
FREMONT, CA :Airlock Digital, an Australian cybersecurity leader, is continuing to improve its industry-leading allowlisting solution further to block malware, ransomware, and zero-day attacks and help IT and cybersecurity teams comply with cybersecurity requirements and reduce allowlisting operational effort.
There are many security products that can allow or block files. That isnt the challenge, says David Cottingham, Co-Founder, Airlock Digital. The challenge is how you instrument the allowlisting process to operationalise pro-active security controls.
Allowlisting, also known as application whitelisting or application monitoring, is documented in a range of government cybersecurity standards and regulations worldwide, including the ACSC Essential Eight Strategies to Mitigate Cyber Security Incidents, U.S. NIST 800-171, CMMC, Center for Internet Security Basic Six, Canadian Top 10 IT Security Actions, and New Zealand Critical Controls are among the top ten mitigations. There are several cybersecurity solutions available today that can prevent files from being executed on endpoint systems. Almost none have the granular centralized control, workflow support, or organizational flexibility needed to support allowlisting in complex, enterprise computing environments at a reasonable cost.
Codeless self-service aims to reduce friction and enables users to handle exceptions as quickly as possible, reducing overall business impact and work disruption, says Cottingham. Ultimately, organizations can choose how they want exception management to be used, in line with the organizations appetite for risk.
Airlock eliminates the support burden of allowlisting by implementing simple workflows that minimize user disruption. If a required application is blocked, IT teams, including non-security personnel, can grant permissions to users using a variety of One-Time Password (OTP) options. A new codeless self-service functionality is included in the latest Airlock version 4.7 update, in addition to one-time use and mobile OTP. This helps to retain user usability without compromising security. Privilege users can self-administer temporary access to applications and scripts that are limited to the general user base using codeless self-service.
By having more granular criteria for blocklisting rules, you can now easily operationalise your security policies, says Daniel Schell, Co-Founder, and Chief Technology Officer, Airlock Digital. Based on Active Directory group membership, security administrators can easily block applications such as TeamViewer across the environment in a couple of clicks, while still allowing access for users that may need it.
Airlock Digital has adopted a user-centric approach to allowlisting with the latest product enhancements. Airlock gives businesses more flexibility and streamlines workflows by allowing them to manage access for individual users or groups in addition to devices. This makes Airlocks allowlisting more scalable and allows for integration with Privileged Access Management (PAM) solutions. Additionally, more granular blocklisting standards have been introduced, enabling blocklist rules to be applied to particular enterprise security classes and operating system versions, ensuring that only properly privileged users can execute files across a range of device types.
The importance of Airlock as a strategic cybersecurity tool for achieving proactive endpoint defense continues to develop. Another immediate advantage is that it reduces the number of security incidents that Security Operations Centre (SOC) teams must contend with. This is accomplished simply by stopping malicious execution and limiting the ability to execute risky code.
Airlock also offers users full insight into all files running on their endpoints, including their history and related network operation, and can share this information with SIEM platforms. Airlock cloud customers can now use a REST API to retrieve SIEM logs from the cloud, eliminating the need for a custom solution or exposing ports to the internet.
New WEF Principles for Cybersecurity Board Governance Address Expansion, Organizational Scope of Cyber Risk – CPO Magazine
Cyber risk climbs the organizational priority ladder every year, but it accelerated in a unique way with the pandemic conditions of 2020. The World Economic Forums newly-released principles for board governance of cybersecurity offer a base of best practices for dealing with this new reality, with a new element being a strong emphasis on organization-wide implementation of cybersecurity culture.
The report identifies six core principles that the WEF believes are items of the most immediate importance, with an eye toward expanding them into a research agenda at some point in the near future. The ultimate goal is a cohesive approach to cyber risk governance that can be applied globally. For the moment, the project supports each of these core principles with a basic framework aimed at facilitating immediate implementation.
The WEF research team, composed of members of the Internet Security Alliance (ISA) and drawing from surveys conducted among the National Association of Corporate Directors (NACD), cautions that business leaders need to immediately begin viewing cyber risk as a potentially existential concern. Both consumers and government regulators are now judging companies by how tight of a security ship they run and how well they protect sensitive personal information that is entrusted to them.
The WEFs ideal vision is a cohesive, global, cross-border approach to cyber risk governance. That doesnt exist as of yet, but the report is intended as a first step. The most important core element, convincing board directors that cybersecurity should be a priority for improvement in the immediate future, appears to already be a majority opinion with 60.5% of NACD respondents classifying it as important or very important. Additionally, 70% view cyber threats as a strategic, enterprise risk.
Respondents to the World Economic Forum Global Risk Report 2021 listed cybersecurity failure as the fourth most pressing business risk in the near term (0 to 2 years), behind only infectious diseases, livelihood crises and extreme weather events. Rapidly developing and changing cybersecurity threats were also #4 on the list of expected trends that will have the greatest impact on companies in the coming year.
The six board governance principles begin with the suggestion that cybersecurity be viewed as a strategic business enabler rather than merely an IT issue. WEF frames cyber risk, which has now increased to the point that it is virtually omnipresent, as a continual opportunity to both preserve and create value. Key board governance considerations here include regular inclusion of cyber risk considerations in board meetings, ensuring that a board committee has oversight of cyber issues and asking executives to identify opportunities to use cybersecurity as a market differentiator or business driver.
The second board governance principle is developing a clear understanding of economic drivers and impact of cyber risk. Board governance suggestions here include regularly engaging in scenario planning that models trade-offs between digital transformation and cyber risk, and establishing a consistent risk quantification framework for calculating likelihood and economic impact of various cybersecurity scenarios.
The third board governance principle is to align cyber risk management with business needs. This can be done by requiring the C suite to report to the board on the cybersecurity implications of their activities and to develop tested plans for anticipated events, and by requiring management to provide the board with road maps of the companys determinations of risk materiality through the lens of regulatory obligations.
The fourth board governance principle is to ensure that organizational design supports cybersecurity. Suggestions in this area include setting expectations that cybersecurity receives adequate funding and staffing, cultivating a cybersecurity culture that extends beyond the IT department and appointing an accountable officer responsible for coordinating organization-wide cyber risk strategy.
The fifth principle is to integrate cybersecurity expertise into board governance. This could mean regular training for board directors, soliciting regular reports from third-party advisors / assessors, or periodic audits among other possibilities.
The final suggested board governance principle is to encourage systemic resilience and collaboration. The report suggests the creation of peer networks for sharing best practices that extend beyond individual organizations, putting similar collaboration plans in place and sending management to participate in industry groups and knowledge-sharing platforms.
While there is much more subtlety to the case than this, you can boil the report down to a fundamental argument: boards need to pay more attention to cybersecurity and pay more forward in the way of resources and staffing to keep pace with what is an exponentially increasing risk. However, the one entirely new element here (in the sense of not being suggested in prior WEF publications) is the emphasis on inter-organization collaboration and a general refocus on cyber risk as a systemic and pernicious threat that manifests in very similar ways for all sorts of different businesses. Cyber risk must not only move up the ladder from technicians to an active role among boards of directors, but management must engage on the topic with the management of other organizations to improve outcomes.
Report identifies 6 core principles that the WEF believes are items of the most immediate importance for addressing #cyberrisk. #cybersecurity #respectdataClick to Tweet
The WEF anticipates expanding on these initial principles with further publications in the near future, but has not yet announced a specific time frame.
India, 2nd April 2021: Back at the start of his career 10 years ago, working in the fast-growing internet services companies, Mr. Eftekhar knew deep in his mind that dependence on the internet will only rise exponentially and the millions of connected homes and businesses will be needing a practical and robust tool to get the best of internet, minus the threats and dangers it brings along.
With a deep understanding of IP networking, coupled with his sparkling talent in application networking, Eftekhar U Chy started building the 1st-ever do-it-yourself or DIY internet control and security solution Audra (www.audra.io). The rising tech-titan and his AI/ML-powered cloud solution bring new hope for SMEs in their fearless growth. With an on-prem appliance, tagged with machine learning backed robust AI-cloud application, which is also conveniently controlled by a mobile app, Audra is definitely the answer to many homes and small businesses across Asia and beyond. When it comes to internet security, Audra aims to be the right fit for them.
Eftekhar now spearheads the Singapore-based technology entity Dotlines as its CTO. The group continues to bag spectacular growth across continents, with the innovations Eftekhar and his vigorous technology organization bring for the group. The group does business in more than 12 verticals, all powered by his state-of-the-art technology platforms.
Audra is a key vertical in our group, and it offers a complete suite of solutions across the internet pyramid. It gives efficient protection for ISPs, iron-clad security for enterprises, productivity and safeguarding for small-medium businesses, parental control and threat-prevention for homes, and finally easily-done protection for personal devices, said Eftekhar.
He informed that 80% of hackers choose Asian SMEs as an easy target because they are well-unprotected. Not only that, 60% of employees spend one-third of their time doing personal stuff, and thus SMEs lose a lot on the productivity side.
He added, Asia is thriving on the substantial SME base, and we see they are increasingly getting digitalized. Countries like Indonesia, India are no different. But most of them think they are not vulnerable, find market solutions complex and 90% of them have no IT personnel to manage office network. We at Dotlines, always do purpose-driven innovation, and Audra is an outcome of that philosophy. We built Audra in a way, so that, it is extremely simple to set up (no IT background needed), convenient to set rules for productivity and security of office network (pre-set rules, control from an easy user app in the phone) and affordable for SME owners to own this with no hassle.
India, with its massive base of 60+ million MSMEs, need a solid answer to the concerns they have, when it comes to business digitalization. We strongly believe Audra is the best of the answers. Therefore, with our proven tracks in Indonesia, Malaysia, we are confident, SMEs in India will also adopt the simple, convenient and affordable products and security benefits Audra offers, concluded Eftekhar.
Audras marvel is set around its superbly practical end-user-based design-thinking and highly efficient solution architecture. Its sophisticated machine learning algorithm powers up its Cloud AI, which delivers unprecedented practicality and robustness, when it comes to internet control to bring employee productivity in and push known/unknown cyber threats out.
To know more, visit Audra.