Category Archives: Internet Security

Airlock Digital Further Improves its Allowlisting Solution – Enterprise Security Mag

Airlock eliminates the support burden of allowlisting by implementing simple workflows that minimize user disruption. If a required application is blocked, IT teams, including non-security personnel, can grant permissions to users using a variety of One-Time Password (OTP) options.

FREMONT, CA :Airlock Digital, an Australian cybersecurity leader, is continuing to improve its industry-leading allowlisting solution further to block malware, ransomware, and zero-day attacks and help IT and cybersecurity teams comply with cybersecurity requirements and reduce allowlisting operational effort.

There are many security products that can allow or block files. That isnt the challenge, says David Cottingham, Co-Founder, Airlock Digital. The challenge is how you instrument the allowlisting process to operationalise pro-active security controls.

Allowlisting, also known as application whitelisting or application monitoring, is documented in a range of government cybersecurity standards and regulations worldwide, including the ACSC Essential Eight Strategies to Mitigate Cyber Security Incidents, U.S. NIST 800-171, CMMC, Center for Internet Security Basic Six, Canadian Top 10 IT Security Actions, and New Zealand Critical Controls are among the top ten mitigations. There are several cybersecurity solutions available today that can prevent files from being executed on endpoint systems. Almost none have the granular centralized control, workflow support, or organizational flexibility needed to support allowlisting in complex, enterprise computing environments at a reasonable cost.

Codeless self-service aims to reduce friction and enables users to handle exceptions as quickly as possible, reducing overall business impact and work disruption, says Cottingham. Ultimately, organizations can choose how they want exception management to be used, in line with the organizations appetite for risk.

Airlock eliminates the support burden of allowlisting by implementing simple workflows that minimize user disruption. If a required application is blocked, IT teams, including non-security personnel, can grant permissions to users using a variety of One-Time Password (OTP) options. A new codeless self-service functionality is included in the latest Airlock version 4.7 update, in addition to one-time use and mobile OTP. This helps to retain user usability without compromising security. Privilege users can self-administer temporary access to applications and scripts that are limited to the general user base using codeless self-service.

By having more granular criteria for blocklisting rules, you can now easily operationalise your security policies, says Daniel Schell, Co-Founder, and Chief Technology Officer, Airlock Digital. Based on Active Directory group membership, security administrators can easily block applications such as TeamViewer across the environment in a couple of clicks, while still allowing access for users that may need it.

Airlock Digital has adopted a user-centric approach to allowlisting with the latest product enhancements. Airlock gives businesses more flexibility and streamlines workflows by allowing them to manage access for individual users or groups in addition to devices. This makes Airlocks allowlisting more scalable and allows for integration with Privileged Access Management (PAM) solutions. Additionally, more granular blocklisting standards have been introduced, enabling blocklist rules to be applied to particular enterprise security classes and operating system versions, ensuring that only properly privileged users can execute files across a range of device types.

The importance of Airlock as a strategic cybersecurity tool for achieving proactive endpoint defense continues to develop. Another immediate advantage is that it reduces the number of security incidents that Security Operations Centre (SOC) teams must contend with. This is accomplished simply by stopping malicious execution and limiting the ability to execute risky code.

Airlock also offers users full insight into all files running on their endpoints, including their history and related network operation, and can share this information with SIEM platforms. Airlock cloud customers can now use a REST API to retrieve SIEM logs from the cloud, eliminating the need for a custom solution or exposing ports to the internet.

See more here:
Airlock Digital Further Improves its Allowlisting Solution - Enterprise Security Mag

New WEF Principles for Cybersecurity Board Governance Address Expansion, Organizational Scope of Cyber Risk – CPO Magazine

Cyber risk climbs the organizational priority ladder every year, but it accelerated in a unique way with the pandemic conditions of 2020. The World Economic Forums newly-released principles for board governance of cybersecurity offer a base of best practices for dealing with this new reality, with a new element being a strong emphasis on organization-wide implementation of cybersecurity culture.

The report identifies six core principles that the WEF believes are items of the most immediate importance, with an eye toward expanding them into a research agenda at some point in the near future. The ultimate goal is a cohesive approach to cyber risk governance that can be applied globally. For the moment, the project supports each of these core principles with a basic framework aimed at facilitating immediate implementation.

The WEF research team, composed of members of the Internet Security Alliance (ISA) and drawing from surveys conducted among the National Association of Corporate Directors (NACD), cautions that business leaders need to immediately begin viewing cyber risk as a potentially existential concern. Both consumers and government regulators are now judging companies by how tight of a security ship they run and how well they protect sensitive personal information that is entrusted to them.

The WEFs ideal vision is a cohesive, global, cross-border approach to cyber risk governance. That doesnt exist as of yet, but the report is intended as a first step. The most important core element, convincing board directors that cybersecurity should be a priority for improvement in the immediate future, appears to already be a majority opinion with 60.5% of NACD respondents classifying it as important or very important. Additionally, 70% view cyber threats as a strategic, enterprise risk.

Respondents to the World Economic Forum Global Risk Report 2021 listed cybersecurity failure as the fourth most pressing business risk in the near term (0 to 2 years), behind only infectious diseases, livelihood crises and extreme weather events. Rapidly developing and changing cybersecurity threats were also #4 on the list of expected trends that will have the greatest impact on companies in the coming year.

The six board governance principles begin with the suggestion that cybersecurity be viewed as a strategic business enabler rather than merely an IT issue. WEF frames cyber risk, which has now increased to the point that it is virtually omnipresent, as a continual opportunity to both preserve and create value. Key board governance considerations here include regular inclusion of cyber risk considerations in board meetings, ensuring that a board committee has oversight of cyber issues and asking executives to identify opportunities to use cybersecurity as a market differentiator or business driver.

The second board governance principle is developing a clear understanding of economic drivers and impact of cyber risk. Board governance suggestions here include regularly engaging in scenario planning that models trade-offs between digital transformation and cyber risk, and establishing a consistent risk quantification framework for calculating likelihood and economic impact of various cybersecurity scenarios.

The third board governance principle is to align cyber risk management with business needs. This can be done by requiring the C suite to report to the board on the cybersecurity implications of their activities and to develop tested plans for anticipated events, and by requiring management to provide the board with road maps of the companys determinations of risk materiality through the lens of regulatory obligations.

The fourth board governance principle is to ensure that organizational design supports cybersecurity. Suggestions in this area include setting expectations that cybersecurity receives adequate funding and staffing, cultivating a cybersecurity culture that extends beyond the IT department and appointing an accountable officer responsible for coordinating organization-wide cyber risk strategy.

The fifth principle is to integrate cybersecurity expertise into board governance. This could mean regular training for board directors, soliciting regular reports from third-party advisors / assessors, or periodic audits among other possibilities.

The final suggested board governance principle is to encourage systemic resilience and collaboration. The report suggests the creation of peer networks for sharing best practices that extend beyond individual organizations, putting similar collaboration plans in place and sending management to participate in industry groups and knowledge-sharing platforms.

While there is much more subtlety to the case than this, you can boil the report down to a fundamental argument: boards need to pay more attention to cybersecurity and pay more forward in the way of resources and staffing to keep pace with what is an exponentially increasing risk. However, the one entirely new element here (in the sense of not being suggested in prior WEF publications) is the emphasis on inter-organization collaboration and a general refocus on cyber risk as a systemic and pernicious threat that manifests in very similar ways for all sorts of different businesses. Cyber risk must not only move up the ladder from technicians to an active role among boards of directors, but management must engage on the topic with the management of other organizations to improve outcomes.

Report identifies 6 core principles that the WEF believes are items of the most immediate importance for addressing #cyberrisk. #cybersecurity #respectdataClick to Tweet

The WEF anticipates expanding on these initial principles with further publications in the near future, but has not yet announced a specific time frame.

Read the original:
New WEF Principles for Cybersecurity Board Governance Address Expansion, Organizational Scope of Cyber Risk - CPO Magazine

Dotlines CTO Eftekhar builds the first-ever DIY productivity & security solution – Hindustan Times

India, 2nd April 2021: Back at the start of his career 10 years ago, working in the fast-growing internet services companies, Mr. Eftekhar knew deep in his mind that dependence on the internet will only rise exponentially and the millions of connected homes and businesses will be needing a practical and robust tool to get the best of internet, minus the threats and dangers it brings along.

With a deep understanding of IP networking, coupled with his sparkling talent in application networking, Eftekhar U Chy started building the 1st-ever do-it-yourself or DIY internet control and security solution Audra (www.audra.io). The rising tech-titan and his AI/ML-powered cloud solution bring new hope for SMEs in their fearless growth. With an on-prem appliance, tagged with machine learning backed robust AI-cloud application, which is also conveniently controlled by a mobile app, Audra is definitely the answer to many homes and small businesses across Asia and beyond. When it comes to internet security, Audra aims to be the right fit for them.

Eftekhar now spearheads the Singapore-based technology entity Dotlines as its CTO. The group continues to bag spectacular growth across continents, with the innovations Eftekhar and his vigorous technology organization bring for the group. The group does business in more than 12 verticals, all powered by his state-of-the-art technology platforms.

Audra is a key vertical in our group, and it offers a complete suite of solutions across the internet pyramid. It gives efficient protection for ISPs, iron-clad security for enterprises, productivity and safeguarding for small-medium businesses, parental control and threat-prevention for homes, and finally easily-done protection for personal devices, said Eftekhar.

He informed that 80% of hackers choose Asian SMEs as an easy target because they are well-unprotected. Not only that, 60% of employees spend one-third of their time doing personal stuff, and thus SMEs lose a lot on the productivity side.

He added, Asia is thriving on the substantial SME base, and we see they are increasingly getting digitalized. Countries like Indonesia, India are no different. But most of them think they are not vulnerable, find market solutions complex and 90% of them have no IT personnel to manage office network. We at Dotlines, always do purpose-driven innovation, and Audra is an outcome of that philosophy. We built Audra in a way, so that, it is extremely simple to set up (no IT background needed), convenient to set rules for productivity and security of office network (pre-set rules, control from an easy user app in the phone) and affordable for SME owners to own this with no hassle.

India, with its massive base of 60+ million MSMEs, need a solid answer to the concerns they have, when it comes to business digitalization. We strongly believe Audra is the best of the answers. Therefore, with our proven tracks in Indonesia, Malaysia, we are confident, SMEs in India will also adopt the simple, convenient and affordable products and security benefits Audra offers, concluded Eftekhar.

Audras marvel is set around its superbly practical end-user-based design-thinking and highly efficient solution architecture. Its sophisticated machine learning algorithm powers up its Cloud AI, which delivers unprecedented practicality and robustness, when it comes to internet control to bring employee productivity in and push known/unknown cyber threats out.

To know more, visit Audra.

Read the original:
Dotlines CTO Eftekhar builds the first-ever DIY productivity & security solution - Hindustan Times

Security-as-a-Service Market is poised to surge at a CAGR of over 18% through 2031 – Yahoo Finance

NEW YORK, April 5, 2021 /PRNewswire/ -- Across regions and verticals, due to increased security threats, adoption of security solutions is rising, leading to expansion of the security-as-a-service (SaaS) market. Due to a sudden increase in cyber-crimes and data hacking activities, enterprises have started focusing on better security solutions for securing information deployed on the cloud as well as on-premise, and to strengthen the security structure of their company. Moreover, large organizations are taking initiatives to implement Saas solutions for their business applications deployed on the cloud, and helping other small enterprises understand the usage of security as a service capabilities and internet security threats.

Persistence Market Research Logo

As per Persistence Market Research revised analysis, the global SaaS market is poised to surge at a CAGR of over 18% through 2031.

Key Takeaways from Market Study

North America was the dominant market in 2020 in terms of value for SaaS. Over the coming years, Europe is expected to be one of the key markets for sustainable revenue generation from security as a service, as increasing adoption of cloud-based solutions and services is boosting market growth in the region.

The BFSI (Banking, Financial Services, and Insurance) segment is expected to offer the highest incremental opportunity during the forecast period, as many private banks are using SaaS models for email encryption, data loss prevention, and network protection.

To reduce implementation costs, large enterprises are using cloud-based solutions and adopting SaaS solutions.

The education and manufacturing industry is expected to increasingly adopt security as a service solutions to securely access confidential data on a real-time basis.

The SaaS market in the U.S. is expected to expand at a CAGR of around 16% over the next ten years, while that in the U.K. at 17.5%.

The markets in China and India are slated to surge at around 20% CAGRs respectively, over the next ten years.

Request for Sample PDF of Report: https://www.persistencemarketresearch.com/samples/12583

Story continues

"Enterprises are implementing IOT-based solutions progressively. IOT solution providers are integrating SaaS in order to reduce cyber-attacks on connected devices, identify the threat, and fix susceptibilities before launching them in the market, says a Persistence Market Research analyst.

COVID-19 Pandemic Impact Analysis

Increase in remote working has led to the need for greater focus on cyber-security, because of higher exposure to cyber risks. This is evident from the fact that around 47% of individuals fall for phishing scams while working at home. Cyber-attackers are seeing COVID-19 as an opportunity to step up their criminal activities and exploit vulnerable employees working from home. Hence, to reduce the impact of cyber-attacks, companies are focusing and enhancing their development and application of security measures.

Ask an Expert for more query: https://www.persistencemarketresearch.com/ask-an-expert/12583

Many companies are increasing their spending budgets on security solutions as a fight against increasing number of cyber-attacks and threats amidst this pandemic outbreak. Also, cybersecurity technology and service providers are shifting priorities to support current needs: business continuity, remote work, and planning for transition to the next normal.

Get Full Access of Report: https://www.persistencemarketresearch.com/checkout/12583

Find More Valuable Insights

Persistence Market Research puts forward an unbiased analysis of the global security as a service market, providing historical demand data (2016-2020) and forecast statistics for the period 2021-2031. To understand the opportunities in SaaS, the market is segmented on the basis of component (solutions and services), application (network security, endpoint security, application security, cloud security, and others), and vertical (banking financial service and insurance, healthcare, retail, it & telecom, energy & utilities, government, and others), across seven major regions of the world.

Browse Research Release at: https://www.persistencemarketresearch.com/market-reports.asp

Browse End-to-end Market: IT and Telecommunication

Related Reports:

About Persistence Market Research

Overview:

Persistence Market Research (PMR) is a third-platform research firm. Our research model is a unique collaboration of data analytics and market research methodology to help businesses achieve optimal performance.

To support companies in overcoming complex business challenges, we follow a multi-disciplinary approach. At PMR, we unite various data streams from multi-dimensional sources. By deploying real-time data collection, big data, and customer experience analytics, we deliver business intelligence for organizations of all sizes.

Contact

Rajendra Singh Persistence Market Research U.S. Sales Office:305 Broadway, 7th FloorNew York City, NY 10007+1-646-568-7751United StatesUSA - Canada Toll-Free: 800-961-0353Email: sales@persistencemarketresearch.com Visit Our Website: https://www.persistencemarketresearch.com

Cision

View original content:http://www.prnewswire.com/news-releases/security-as-a-service-market-is-poised-to-surge-at-a-cagr-of-over-18-through-2031-301261938.html

SOURCE Persistence Market Research Pvt. Ltd.

See more here:
Security-as-a-Service Market is poised to surge at a CAGR of over 18% through 2031 - Yahoo Finance

WatchGuard uncovers top cyber threat trends of Q4 2020 – SecurityBrief New Zealand

Fireless malware attacks and cryptominers are coming back in force, while ransomware attacks are on the decline.

This is according to WatchGuard Technologies new Internet Security Report for Q4 2020.

Among its most notable findings, the report reveals that fileless malware and cryptominer attack rates grew by nearly 900% and 25% respectively, while unique ransomware payloads plummeted by 48% in 2020 compared to 2019.

Additionally, the WatchGuard Threat Lab found that Q4 2020 brought a 41% increase in encrypted malware detections over the previous quarter and network attacks hit their highest levels since 2018.

WatchGuard's report looked more closely at various trends and attack types, including fileless malware, cryptominers, ransomware, encrypted and evasive malware, botnet malware, supply chain attacks, trojan dupes and network attacks.

Fileless malware

Fileless malware rates in 2020 increased by 888% over 2019.

According to WatchGuard, these threats can be particularly dangerous due to their ability to evade detection by traditional endpoint protection clients and because they can succeed without victims doing anything beyond clicking a malicious link or unknowingly visiting a compromised website.

Toolkits such as PowerSploit and CobaltStrike allow threat actors to easily inject malicious code into other running processes and remain operational even if the victims defences identify and remove the original script.

Deploying endpoint detection and response solutions alongside preventative anti-malware can help identify these threats.

Cryptominers

After virtually all cryptocurrency prices crashed in early 2018, cryptominer infections became far less prevalent and reached a low of 633 unique variant detections in 2019.

According to the researchers, attackers continued adding cryptominer modules to existing botnet infections and extract passive income from victims while abusing their networks for other cyber crime.

As a result, and with prices trending upward again in Q4 2020, the volume of cryptominer malware detections climbed more than 25% over 2019 levels to reach 850 unique variants last year.

Ransomware

For the second year in a row, the number of unique ransomware payloads trended downward in 2020, falling to 2,152 unique payloads from 4,131 in 2019 and the all-time-high of 5,489 in 2018.

These figures represent individual variants of ransomware that may have infected hundreds or thousands of endpoints worldwide.

The majority of these detections resulted from signatures originally implemented in 2017 to detect WannaCry and its related variants, showing that ransomworm tactics are still thriving over three years after WannaCry burst onto the scene.

The steady decline in ransomware volume indicates the attackers continued shift away from the unfocused, widespread campaigns of the past toward highly targeted attacks against healthcare organisations, manufacturing firms and other victims for which downtime is unacceptable, WatchGuard states.

Encrypted, evasive malware

Despite being the fourth consecutive quarter of decreasing malware volumes overall, nearly half (47%) of all attacks WatchGuard detected at the network perimeter in Q4 were encrypted.

Additionally, malware delivered via HTTPS connections increased by 41%, while encrypted zero day malware (variants that circumvent antivirus signatures) grew by 22% over Q3.

Botnet malware targeting IoT devices and routers

In Q4, the Linux.Generic virus (also known as The Moon) made its debut on WatchGuards list of top 10 malware detections.

This malware is part of a network of servers that directly targets IoT devices and consumer-grade network devices like routers to exploit any open vulnerabilities.

WatchGuard's investigation uncovered Linux-specific malware designed for ARM processors and another payload designed for MIPS processors within the attackers infrastructure, indicating a clear focus on evasive attacks against IoT devices.

Supply chain attacks

The sophisticated, allegedly state-sponsored SolarWinds supply chain breach will have wide implications throughout the security industry for years to come, WatchGuard states.

Its effects spread far beyond SolarWinds to almost 100 companies, including some major Fortune 500s, big security companies, and even the U.S. government.

WatchGuard's detailed incident breakdown showcases the importance of defending against supply chain attacks in todays interconnected digital ecosystem.

New trojan dupes

Trojan.Script.1026663 made its way onto WatchGuard's top five most-widespread malware detections list in Q4.

The attack begins with an email asking victims to review an order list attachment. The document triggers a series of payloads and malicious code that ultimately lead the victim machine to load the final attack: the Agent Tesla remote access trojan (RAT) and keylogger.

Network attacks

Total network attack detections grew by 5% in Q4, reaching their highest level in over two years, the report shows.

Additionally, total unique network attack signatures showed steady growth as well with a 4% increase over Q3.

This shows that even as the world continues to operate remotely, the corporate network perimeter is still very much in play as threat actors continue to target on-premises assets.

WatchGuard chief technology officer Corey Nachreiner says, The rise in sophisticated, evasive threat tactics last quarter and throughout 2020 showcases how vital it is to implement layered, end-to-end security protections.

"The attacks are coming on all fronts, as cyber criminals increasingly leverage fileless malware, cryptominers, encrypted attacks and more, and target users both at remote locations as well as corporate assets behind the traditional network perimeter.

"Effective security today means prioritising endpoint detection and response, network defences and foundational precautions such as security awareness training and strict patch management.

See the original post here:
WatchGuard uncovers top cyber threat trends of Q4 2020 - SecurityBrief New Zealand

PKI: Securing a variety of use cases in today’s digital organizations – SecurityInfoWatch

With its ability to deliver robust security together with flexibility and broad scalability PKI has established itself as the foundation of trust for todays most demanding environments.

Courtesy of BigStock.com

A security leaders job has never been easy, but todays CIOs and CSOs are up against unprecedented challenges and accelerated change. As digital transformation continues to reshape every organization, its up to security executives to ensure that their most critical assets and communications stay protected.

Network architectures and applications have evolved, and cloud services play an increasingly critical role for enterprises seeking to drive innovation, business agility and cost savings. According to a recent survey by TechRepublic Premium, 81 percent of respondents currently use or plan to use services from multiple cloud providers within the next 12 months.With its ability to deliver robust security together with flexibility and broad scalability PKI has established itself as the foundation of trust for todays most demanding environments.Courtesy of BigStock.com

The global pandemic has also transformed workspaces, as increasing numbers of professionals work from home or in remote locations. According to an April 2020 Gallup survey, 62% of U.S. workers were working from home due to the healthcare crisis.

The rapid emergence of the IoT is also having a major impact on industries of every size and type, from enterprise organizations to public sector and higher education. A recent study by Gartner predicted that there will be 25 billion connected devices by 2021.

Even as new advances shake up old rules and change expectations, security leaders must still focus on ensuring connected devices are secure and users and their organizations are safe. A modern public key infrastructure (PKI) platform needs to deliver the capabilities, flexibility and manageability required to achieve security across a wide variety of use cases.

Organizations moving to the cloud require strong authentication for their systems and the people that use them. They need to safeguard data from breaches by encrypting transport and maintain operational integrityand scale their security as the organization evolves and changes.

For todays increasingly diverse, multi-cloud environments, PKI solutions are an ideal method to secure digital trust. Standards-based, widely adopted and flexible, they can provide strong security across a wide variety of environments, including enterprise systems, cloud storage, clients like email and document signing applications, virtualization, DevOps and more. PKI also enables organizations to strengthen authentication for dynamic cloud environments utilizing digital certificates and can scale easily to accommodate additional users, devices and demands.

With the right management platform, organizations can apply a unified approach to authentication, encryption, secure email, digital signing and other PKI capabilities. A modern approach to PKI will provide the flexibility for deployment in the cloud, as well as on-premises and in-country, to meet specific requirements or application needs. A robust PKI management platform can also enable organizations to deploy extremely high volumes of certificates quickly, making the solution ideal for large, fast-growing enterprises. Organizations need PKI management platforms built with cloud-native and container-based technologies.

Remote users create unique challenges for organizations that must support a variety of different devices and users at myriad locations. For complex organizations, IT teams will be tasked with managing digital certificates remotely. A scalable, centralized and modern PKI platform will enable them to track the certificate lifecycle automatically, regardless of their location. It can also offer automation that lets security and IT teams provision certificates in advance, to onboard new users, without sacrificing business agility.

A modern PKI platform will also support compatibility with Mobile Device Management (MDM) platforms. These MDM solutions enable enterprises to remotely provision devise, manage applications, track inventory and enforce corporate security policies on mobile devices. If a remote client device is lost or stolen, they can enable IT, teams, to disable the device in the field or erase its contents altogether.

IoT environments operate on trust and they must rely on systems and data that are fundamentally secure. Maximizing information confidentiality and ensuring its integrity is key. Access to information should be available only for those authorized to use it. To maintain data integrity when it is being transmitted between IoT devices and sensors, it must be encrypted every step of the way. PKI can help ensure that the integrity is maintained, and that information is not modified when it is shared or stored.

Safeguarding IoT data also requires controlling availability and PKI can help organizations ensure that applications, systems and devices are accessible by users in the most appropriate roles. Likewise, PKI can be used to deploy unique digital certificates to each device to ensure mutual authentication as well as network authentication.

When it is deployed and managed together with the right platform and best practices, PKI is a solid foundation that lets organizations to set up and ensure trust and security across the IoT. PKI innovators are applying it across a variety of use cases and systems, including:

With its ability to deliver robust security together with flexibility and broad scalability PKI has established itself as the foundation of trust for todays most demanding environments. It enjoys broad adoption, standards-based support, and is continuously being improved and enhanced by industry innovators. For security leaders that choose the right technology partner to support their deployment, the potential of modern PKI, built from the ground up, is limitless. Look to the most trusted vendors to provide your organization with the modern platform you and your team deserve.

About the author: Dean Coclin is the Senior Director of Business Development at DigiCert.Dean Coclin has more than 30 years of business development and product management experience in cybersecurity, software and telecommunications. As Senior Director of Business Development at DigiCert, he is responsible for driving the companys strategic alliances with IoT partners in the consumer security market, and with other technology partners. Coclin is also the previous chair of the CA/Browser forum.

Previously Coclin spent 7 years at Symantec in a similar role and was one of the founders of ChosenSecurity, an Internet security firm that was sold to PGP Corporation in February 2010. PGP was subsequently acquired by Symantec in June 2010. Prior to this, Coclin served as director of business development at GeoTrust which was sold to Verisign in 2006. Prior to joining GeoTrust, Coclin was vice president of product management at Betrusted, an e-security firm where he directed product management, product marketing and product technology. He has held positions at Baltimore Technologies, CyberTrust Solutions, and GTE Government Systems Corporation.

Continued here:
PKI: Securing a variety of use cases in today's digital organizations - SecurityInfoWatch

What’s next for encryption if the RSA algorithm is broken? – CSO Online

What if a big crack appeared overnight in the internet's security layer? What if the fracture reached deep into the mathematical foundations of the cryptographic algorithms? That appeared to happen in early March when a paper dropped with a tantalizing conclusion in the abstract: This destroys the RSA cryptosystem.

If the claim proves correct, a good part of the data thats encrypted at rest or in motion might not be safe. The first problem was that no one knew if the author was right. The second, even larger problem was no one was sure what the world should do if the claims were true.

At this writing, mathematicians are still deliberating the first question, but others are addressing the second question and starting to sketch out plans for what to do if a catastrophic weakness appears out of nowhere. Theyre pushing for a stronger foundation built out of multiple algorithms implemented with protocols that make switching simpler.

Some cryptographers are looking for RSA replacements because the algorithm is just one encryption algorithm that may be vulnerable to new machines that exploit quantum effects in electronics. The world must be more agile, they argue, because there are many potential cracks that could appear.

Read the rest here:
What's next for encryption if the RSA algorithm is broken? - CSO Online

Global Internet of Things (IoT) Security Market 2020 Industry Insights and Major Players are Cisco Systems, Kaspersky Lab, Intel Corporation, Symantec…

Global Internet of Things (IoT) Security Market Growth (Status and Outlook) 2020-2025 includes an elaborative summary of the market that provides in-depth knowledge of various different segments of the market. The report is a comprehensive study on global market analysis and insights such as market share, supply and demand statistics, growth factors, and market dynamics. The report focuses on the emerging trends in the global and regional spaces on all the significant components, such as market capacity, cost, price, demand and supply, production, profit, and competitive landscape. The research evaluates the global Internet of Things (IoT) Security market size, growth scenario, potential opportunities, operation landscape, trend analysis, and competitive analysis of the market.

NOTE: Our analysts monitoring the situation across the globe explains that the market will generate remunerative prospects for producers post COVID-19 crisis. The report aims to provide an additional illustration of the latest scenario, economic slowdown, and COVID-19 impact on the overall industry.

DOWNLOAD FREE SAMPLE REPORT: https://www.marketandresearch.biz/sample-request/163029

Market Significant Factors:

The report analyzes past trends and future prospects in this report which makes it highly comprehensible for the analysis of the market. The current report helps open new doors for the global market. The competitive analysis section covers the information that includes the company profile, annual turnover, the types of products and services they provide, income generation, which provide direction to businesses to take important steps. The report aims to deliver varying competition dynamics and keeps ahead of competitors. The key aim of the research report is to help readers in briefly understanding product implementations in the global Internet of Things (IoT) Security market during the forecast timeframe of 2021 to 2026.

Some of the vital players that are at present dominating the global platform include: Cisco Systems, Kaspersky Lab, Intel Corporation, Symantec Corporation, Trend Micro, IBM Corporation, ARM Holdings, Digicert, Gemalto NV, Infineon Technologies, INSIDE Secure SA, CheckPoint Software Technologies, Verizon Enterprise Solutions, Advantech, Trustwave, Sophos Plc,

The report intends to provide a detailed analysis of significant industrial aspects including drivers, restraints, challenges, and availability of different opportunities in the global Internet of Things (IoT) Security market. Then, it offers in-depth information on various essential players operating in the market together along with their vital data in order to maintain its market position in the international industry. The report enlists the basic details of the industry based on the fundamental overview of market chain structure and describes industry surroundings, the development of the market through upstream & downstream, and manufacturing cost structure.

Product types of the market are: Network Security, Endpoint Security, Application Security, Cloud Security, Other

Vital applications included in the report are: Building and Home Automation, Supply Chain Management, Patient Information Management, Energy and Utilities Management, Customer Information Security, Other

Topological regions covered in the market are: Americas (United States, Canada, Mexico, Brazil), APAC (China, Japan, Korea, Southeast Asia, India, Australia), Europe (Germany, France, UK, Italy, Russia), Middle East & Africa (Egypt, South Africa, Israel, Turkey, GCC Countries)

ACCESS FULL REPORT: https://www.marketandresearch.biz/report/163029/global-internet-of-things-iot-security-market-growth-status-and-outlook-2020-2025

Significant Highlights of The Report:

Moreover, with this report, the clients will get knowledge about the trade and industry, profit and loss statistics, growth benefits, product demand and supply, and future market scope. Along with the current and forecast trends, the historical details are outlined for grasping a better outlook of the entire global Internet of Things (IoT) Security market on a global scale.

Customization of the Report:

This report can be customized to meet the clients requirements. Please connect with our sales team (sales@marketandresearch.biz), who will ensure that you get a report that suits your needs. You can also get in touch with our executives on +1-201-465-4211 to share your research requirements.

Contact UsMark StoneHead of Business DevelopmentPhone: +1-201-465-4211Email: sales@marketandresearch.bizWeb: http://www.marketandresearch.biz

See the rest here:
Global Internet of Things (IoT) Security Market 2020 Industry Insights and Major Players are Cisco Systems, Kaspersky Lab, Intel Corporation, Symantec...

North Korea continues targeting security researchers. Holiday Bear gained access to DHS emails. Charming Kitten is phishing for medical professionals….

By the CyberWire staff

Google's Threat Analysis Group (TAG) has published an update on a North Korean cyberespionage campaign targeting security researchers. TAG warned in January that a threat actor was messaging researchers on various social media platforms asking to collaborate on vulnerability research. They also set up a watering hole site that posed as a phony research blog, using an Internet Explorer zero-day.

Now, Google says the actor is using a new website and social media profiles posing as a fake company called "SecuriElite." TAG writes, "The attackers latest batch of social media profiles continue the trend of posing as fellow security researchers interested in exploitation and offensive security. On LinkedIn, we identified two accounts impersonating recruiters for antivirus and security companies. We have reported all identified social media profiles to the platforms to allow them to take appropriate action." Google also believes the attackers are using more zero-days.

The Associated Press reports that the suspected Russian hackers behind the SolarWinds attack gained access to the emails of former acting Department of Homeland Security Secretary Chad Wolf and other DHS officials. So far it doesn't appear that classified communications were compromised, but POLITICO says the number of emails stolen was in the thousands. A State Department spokesperson told POLITICO, "the Department takes seriously its responsibility to safeguard its information and continuously takes steps to ensure information is protected. For security reasons, we are not in a position to discuss the nature or scope of any alleged cybersecurity incidents at this time."

5 Top ICS Cybersecurity Recommendations in the Year in Review

Find out about themajor ICS cyber threats, vulnerabilities and lessons learned from our field work in the just released Year in Review report. Youll discover 5 recommendations to secure your industrial environment and the 4 new threat activity groups were tracking.Read the executive summary.

Proofpoint reports that an Iran-linked threat actor, TA453 (also known as Charming Kitten or Phosphorous), is running a phishing campaign against "senior medical professionals who specialize in genetic, neurology, and oncology research in the United States and Israel." The operation, dubbed "BadBlood," used spearphishing emails with URLs that led to spoofed Microsoft 365 and OneDrive login pages.

The researchers state, "At this time, Proofpoint cannot conclusively determine the motivation of actors conducting these campaigns. As collaboration for medical research is often conducted informally over email, this campaign may demonstrate that a subset of TA453 operators have an intelligence requirement to collect specific medical information related to genetic, oncology, or neurology research. Alternatively, this campaign may demonstrate an interest in the patient information of the targeted medical personnel or an aim to use the recipients' accounts in further phishing campaigns."

Proofpoint also notes that the operation demonstrates a (possibly temporary) shift in targeting for Charming Kitten: "While TA453 has consistently demonstrated a desire to collect and exfiltrate the email mailbox contents belonging to typical intelligence targets of the Iranian government like the Iranian diaspora, policy analysts, and educators, this TA453 campaign demonstrated a desire to target medical researchers and providers. Further detection and analysis of TA453 campaigns will likely determine whether this targeting is an outlier or if targeting has evolved to support the medical sector becoming a consistent intelligence requirement and target for TA453."

TechCrunchreportsthat Indian mobile payments startup MobiKwik has apparently sustained a data breach that exposed the data of 99 million customers. Criminals on a dark web forum claim they've obtained 8.2 terabytes of MobiKwik user data, including hashed passwords, partial credit card numbers, and identification documents like government-issued Aadhaar card or PAN ID numbers belonging to 3.5 million users. The criminals are selling access to the database for $70,000.

MobiKwik, however, denies that the data are theirs or that a breach ever occurred. The firmtoldMoneyControl, "Some media-crazed so-called security researchers have repeatedly attempted to present concocted files wasting precious time of our organization as well as members of the media. We thoroughly investigated and did not find any security lapses." The Free Software Movement of India (FSMI) has filed a complaint with the Indian Computer Emergency Response Team urging them to investigate the alleged breach, the Hindu Businesslinereports. FSMI stated, "The data is available on the dark web. Mobikwik being a digital wallet, the breach would expose its customers to cyber security attacks."

Reuters reports that theReserve Bank of India (RBI) has ordered MobiKwik to investigate the allegations immediately. Reuters cites a source as saying that the RBI was "not happy" with MobiKwik's initial response to the claims.

For more, see the CyberWire ProPrivacy Briefing.

Kasperskydescribesa cyberespionage campaign that ran from March 2019 to the end of December 2020. The campaign targeted Japan and entities related to Japan, particularly the country's manufacturing industry. The researchers "assess with high confidence" that China's APT10 is behind the operation. The threat actor gained access by exploiting vulnerabilities in Pulse Connect Secure VPNs or by using previously stolen credentials.

Kaspersky says the actor used a unique loader dubbed "Ecipekac" to deliver fileless malware. The researchers explain, "This campaign introduced a very sophisticated multi-layer malware named Ecipekac and its payloads, which include different unique fileless malware such as P8RAT and SodaMaster. In our opinion, the most significant aspect of the Ecipekac malware is that, apart from the large number of layers, the encrypted shellcodes were being inserted into digitally signed DLLs without affecting the validity of the digital signature. When this technique is used, some security solutions cannot detect these implants. Judging from the main features of the P8RAT and SodaMaster backdoors, we believe that these modules are downloaders responsible for downloading further malware that, unfortunately, we have not been able to obtain so far in our investigation."

For more, see the CyberWire ProResearch Briefing.

You're already a reader of the CyberWire. Why not join our team?!

Want to be a part of a dynamic, fun-loving, hard working team? the CyberWire is the place for you! The CyberWire has an opening for a dynamic, goal-oriented sales person to join our sponsorship team.If that sounds like you, or someone you know, we would love to talk to you. Visit our Careers page to learn more or email us at careers@thecyberwire.com.

Several members of Germany's Bundestag have had their personal email accounts breached, CyberScoopsays. The BfV and BSI security services have briefed the federal legislative body and contacted affected members. German officials have provided few details, but Tageschaureportsthat the compromise was the work of Ghostwriter (a threat actor associated with Russian interests) and that spearphishing was the attack vector. It also suggests that Russia's GRU was responsible.

Der Spiegel iscallingit a Russian operation, and also specifically attributing it to the GRU, the Russian military intelligence agency. Seven members of the Bundestag were affected, as were thirty-one members of Land parliaments, that is, parliaments belonging to the Federal Republics constituent states, roughly the equivalent of US state legislatures. "Several dozen" other political figures were also affected. Most of the targets were members of the two largest German political parties, the center-right CDU/CSU and the center-left SPD.

Security firm FireEye's 2020accountof Ghostwriter described it as a disinformation peddler. "The operations have primarily targeted audiences in Lithuania, Latvia, and Poland with narratives critical of the North Atlantic Treaty Organizations (NATO) presence in Eastern Europe, the companys report said, occasionally leveraging other themes such as anti-U.S. and COVID-19-related narratives as part of this broader anti-NATO agenda." FireEye didnt go so far as to identify the group as a unit of the Russian government, but objectively, as people say, Ghostwriter acted in the Russian interest.

For more, see the CyberWire ProDisinformation Briefing.

Are you interested in space and communications?

If so, take a look at theCosmic AESSignals&Space. Aerospace meets outer space. This monthly briefing on cyber security as it relates to the space and SIGINT sectors covers technology, policy, market news and more. Our new issue comes out Thursday, April 1, 2021.

San Mateo, California-based financial crime prevention provider Feedzai has raised $200 million in a Series C round led byKKR, with participation from existing investorsSapphire VenturesandCiti Ventures. The funding round brings the company's valuation to more than $1 billion. The company stated, "[W]ere ecstatic at the 'future-proof' capabilities this new investment will bring our team, products, and cloud platform. This is how well birth advancements to our recently revealed, award-winning ethical AI innovation, Fairband, along with other customer-centric technologies that strive to ensure frictionless financial services."

Critical infrastructure cybersecurity company OPSWAT, based in Tampa, Florida, has received $125 Million in funding from Brighton Park Capital. The company says it "will use the new capital to accelerate its rapid growth, with a focus on additional global expansion of sales, marketing, customer success and business operations. The Company will also continue robust investment in R&D innovation and pursue strategic acquisitions."

Cloud backup and recovery company HYCU (with headquarters in Boston) has raised $87.5 million in a Series A round led by Bain Capital Ventures, with participation from Acrew Capital. The company says the funding "reinforces HYCU's leading market position and continued momentum, and will enable the company to hire more than 100 new employees in the Boston area to achieve rapid scale."

Palo Alto-based data integration platform provider Striim has secured $50 million in a Series C round led by Goldman Sachs Growth Equity, with participation from Summit Partners, Atlantic Bridge Ventures, Dell Ventures, and Bosch Ventures, Crunchbase News reports. Striim says the funding "will support the accelerating growth in Striim's global customer base and its data integration offerings delivered on-premises, in the cloud and as a managed service."

Israeli endpoint security provider Morphisec has raised $31 million in a funding round led by JVP, with participation from Orange and Deutsche Telekom Capital Partners. The company stated, "The investment will support an aggressive hiring push aimed at drastically increasing headcount across the U.S. and Israel. As Morphisec ramps up recruiting talent for every level of its organization, it is announcing today the appointment of Steve Bennett to its board of directors, effective immediately. Bennett formerly served as CEO of major software and security companies, including Symantec and Intuit."

San Francisco-based privacy management platform provider Ketch has emerged from stealth after raising $23 million in a Series A round led by CRV, super{set}, Ridge Ventures, Acrew Capital, and Silicon Valley Bank, TechCrunch reports.

For more, see the CyberWire ProBusiness Briefing.

CyberWire Pro Interview Selects

CyberWire Pro subscribers have access to our Interview Selects podcast, a curation of our most engaging and informative interviews, featuring cyber security professionals, journalists, authors and industry insiders. Subscribe to CyberWire Pro to unlock access to this and much more exclusive content. Learn more and subscribe.

OpenSSL has received patches for two high-severity vulnerabilities, Naked Security reports. CVE-2021-3449 can lead to a crash or denial of service, while CVE-2021-3450can make a client accept a phony TLS certificate. The latter is the more serious of the two flaws; the vulnerability's description states, "Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a 'purpose' has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application."

The Record reports that a 22-year-old Kansas man, Wyatt Travnichek, has been charged by the US Justice Department with "one count of tampering with a public water system and one count of reckless damage to a protected computer during unauthorized access." The Justice Department stated, "The indictment alleges that on or about March 27, 2019, in the District of Kansas, Travnichek knowingly accessed the Ellsworth County Rural Water Districts protected computer system without authorization. During this unauthorized access, it is alleged Travnichek performed activities that shut down the processes at the facility which affect the facilities cleaning and disinfecting procedures with the intention of harming the Ellsworth Rural Water District No. 1, also known as Post Rock Rural Water District." CyberScoop says the incident did not affect customers' drinking water. It's worth noting that this incident is separate from a similar attack that recently affected a water facility in Oldsmar, Florida.

An Israeli citizen, Tal Prihar, has pleaded guilty in the US for his role in operating DeepDotWeb, a website that served as a portal to various criminal marketplaces. Nicholas L. McQuaid, Acting Assistant Attorney General of the Justice Department's Criminal Division, stated, "Tal Prihar served as a broker for illegal Darknet marketplaces helping such marketplaces find customers for fentanyl, firearms, and other dangerous contraband and profited from the illegal business that ensued. This prosecution, seizure of the broker website, and forfeiture send a clear message that we are not only prosecuting the administrators of Darknet marketplaces offering illegal goods and services, but we will also bring to justice those that aim to facilitate and profit from them." Prihar has pleaded guilty to conspiracy to commit money laundering, and will be sentenced on August 2nd.

Florida-based healthcare provider SalusCare has sued Amazon Web Services, alleging that AWS buckets are being used by a hacker to host stolen patient and employee data, HealthITSecurity reports. SalusCare states that the stolen data include Social Security numbers, financial information (including credit card numbers), as well as "extremely personal and sensitive records of patients psychiatric and addiction counseling and treatment." Amazon has suspended the accounts that own the AWS buckets, but SalusCare is seeking for the suspension to be permanent and for the data to be erased.

The lawsuit states, "SalusCare has established that the threatened harm substantially outweighs any potential harm to Amazon or [the hacker] because SalusCare is likely to suffer irreparable harm, while the [individual] would suffer, at worst, a temporary loss of access to the information while it makes its case....Amazon would suffer no conceivable harm in a temporary freeze of the buckets. A temporary restraining order would simply allow the parties to maintain the status quo, thereby ensuring [the hacker] will not have an opportunity to access or use the subject information while it hypothetically pursued its legal rights."

Reuters reports thatthe Biden Administration could issue an Executive Order (EO) this week that would enhance Government agencies' multi-factor authentication and encryption standards and impose new requirements on Government software vendors. The proposed EO would compel vendors to alert Government clients of data breaches, supply a "bill of materials" to those running "critical" functions, and collaborate with Government agencies on incident response.

US Secretary of Homeland Security Alejandro Mayorkas has announced a series of sixty-day security sprints, the Recordreports. The announcement was made in conjunction with the Secretary's enunciation of a cybersecurity strategy that places a high priority on protecting critical infrastructure and defending against ransomware.

And SecurityWeekreportsthat President Biden has followed President Trump's lead in extending President Obama's 2015 Executive Order allowing property sanctions in response to cyberattacks.In announcing the decision, the Administration noted that foreign-sponsored attacks continue to pose an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States.

EU Commissioner for Justice DidierReynders and US Commerce Secretary GinaRaimondo have issued a jointstatementcommitting to "intensify negotiations on an enhanced EU-U.S. Privacy Shield framework to comply with the July 16, 2020 judgment of the Court of Justice of the European Union in the Schrems II case."

For more, see the CyberWire ProPolicy Briefing.

See the rest here:
North Korea continues targeting security researchers. Holiday Bear gained access to DHS emails. Charming Kitten is phishing for medical professionals....

Tackle security threats before they arise with AT&T ActiveArmor – nation.lk – The Nation Newspaper

Online threats are one of the most dangerous aspects of our increasingly digital world. Whether youre connected to fiber internet or on the go, there are legitimate concerns about data security, scams, and fraud. There are plenty of costly ways to keep yourself and your family safe, but one of the most sensible options is AT&T ActiveArmor.

While you wont ever have shining armor to protect your devices, AT&T ActiveArmor is just about as close as you can get in the digital sphere. Heres everything you should know.

You cant spend all day and night worrying about your wireless security, but AT&T can. With 24/7 proactive network security that automatically detects and helps block fraud calls and alerts you to potential spam risks, what more could you ask for?

You can download the free AT&T Call Protect app to customize your robocall protection and even create your own personal block list. Securing your devices and data is just as important too. With the free AT&T Mobile Security app, you can enable device security and receive data breach alerts and tips.

With AT&Ts best plans, you can get enhanced Caller ID and additional advanced security features of the AT&T Mobile Security app including Personal ID monitoring, Safe Browsing, and expanded Wi-Fi protection at no extra charge.

See also:AT&T buyers guide: Plans, perks, and everything else you need to know

Just like its wireless protection, ActiveArmor doesnt take any time off when its protecting your fiber connection. Youll have 24/7 smart internet protection against data threats to every connected device on your Wi-Fi network. Best of all, it comes included when you sign up for AT&T Fiber at 300Mbps+ speeds

AT&T Internet Security blocks known at-risk sites that could potentially infect your devices with malware. This protection comes built-in to guard your entire Wi-Fi network; all you need to do is opt-in within the Smart Home Manager app. It helps guard against hackers getting unauthorized access, and AT&T Internet Security works proactively to clamp down on potentially suspicious transmissions.

It would be pretty great to lock your Wi-Fi network in a suit of armor, but AT&T Internet Security seems like a solid alternative. If youre worried about hackers, theres a good chance that you can get some peace of mind from the big blue carrier.

Continued here:
Tackle security threats before they arise with AT&T ActiveArmor - nation.lk - The Nation Newspaper