Page 1,968«..1020..1,9671,9681,9691,970..1,9801,990..»

Dataiku Named to Forbes AI 50 List of Top AI Companies Shaping the Future – GlobeNewswire

New York, May 12, 2022 (GLOBE NEWSWIRE) -- Dataiku, the platform for Everyday AI, today announced it has been named to the Forbes AI 50, a list of the top private companies in North America using artificial intelligence to transform industries and shape the future. Dataiku is the only AI platform that empowers anyone from technical staff to business leadership to simply and quickly design, deploy, govern, and manage AI and analytics applications.

To create the list, Forbes, in partnership with Sequoia Capital, evaluated over 400 submissions from the U.S. and Canada. An algorithm identified the top 100 companies with the highest quantitative scores. A panel of expert AI judges then reviewed the finalists to hand-pick the 50 most compelling companies based on their use of AI-enabled technology, business models, and financials.

At Dataiku we help all industries from pharma to financing, truckstops to chicken farms make AI part of an organizations everyday activities. Dataiku is proud to be recognized by Forbes as one of North Americas Top AI companies shaping the future, said Florian Douetteau, co-founder and CEO of Dataiku. Being on the Forbes AI 50 list is an honor and encourages us to work even harder on the Everyday AI journey, enabling our customers to turn intangible data into tangible results from the mundane to the moonshot.

This recognition comes at an exciting time for Dataiku. Within a one-week span, Dataiku was:

Resources

About Dataiku

Dataiku is the platform for Everyday AI that allows companies to leverage one central solution to design, deploy, govern, and manage AI and analytics applications. Since its founding in 2013, the company has been the leader in democratizing data and empowering organization-wide collaboration. Today, more than 450 companies worldwide use Dataiku to integrate and streamline their use of data, analytics, and AI, driving diverse use cases from fraud detection and customer churn prevention, to predictive maintenance and supply chain optimization. Stay connected with us on our blog, Twitter (@dataiku) and on LinkedIn.

About Gartner

Gartner, Market Guide for Multipersona Data Science and Machine Learning Platforms, 2 May 2022, Pieter den Hamer, et. Al. Gartner, Market Guide for DSML Engineering Platforms, 2 May 2022, Afraz Jaffri et. Al.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartners research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Go here to see the original:

Dataiku Named to Forbes AI 50 List of Top AI Companies Shaping the Future - GlobeNewswire

Read More..

Ten Year Trends, Covid’s Impact, Where Dagdigian Was Wrong – Bio-IT World

By Allison Proffitt

May 12, 2022 | At Bio-IT Worlds 20th anniversary event last week, Chris Dagdigian and friends from BioTeam, once again closed out programming with a rapid-fire look at the bio-IT landscape and an IT trends assessmentcalling out what is working, whats not, and how its all evolving.

Repeating a format he introduced last fall, Dagdigian led a panel of speakers, each commenting on their own experience with bio-IT trends. This year all four speakers were experienced BioTeam consultants, but Dagdigian also flagged Twitter friends who can speak freely including James Cuff (@DrCuff, hear his Trends from the Trenches podcast here), Chris Dwan (@fdmnts), @hpcguru, and Corey Quinn (@QuinnyPig).

From his personal vantage pointhaving given an IT trends talk at Bio-IT World since 2009Dagdigian began by outlining the trends that have held firm over the past decade. He still starts every year, Dagdigian said, with the existential dread. Science has always changed more rapidly than IT can keep up, and most certainly faster than your IT budget renews. This remains a problem, Dagdigian said, and there is a real risk when IT builds a wrong solution for the scientist.

Cloud, he repeated, remains a capability play, not a cost savings strategy. Capability and flexibility still justify cloud adoption, they do not, however, justify a multi-cloud approach. A multi-cloud strategy is definitely dumb, Dagdigian said, while a hybrid cloud approach is absolutely fine. Multi-cloud requires developers to devolve applications to the lowest common API denominator. Its a degraded experience, he said, unless you were all in on Kubernetes, which can reasonably port between AWS, Google Cloud, and Microsoft Azure. In his trademark bluntness, Dagdigian said any company with a multi-cloud strategy is a red flag for poor senior leadership.

As in years past, moving and managing data is a pain, Dagdigian said, and he again threatened to call out scientists who build careers and publications lists on data intensive science but refuse to take responsibility for their own data.

Its a shared responsibility model. My job as an IT person is to provide you with safe, durable storage options that are fit for purpose and aligned with what youre trying to do. The combo between science and IT is to provide end users with tools to manage, govern, pull actionable insights, understand what were actually storing. But finally end users have to take some responsibility. Thats the sort of missing piece of the equation. It is wildly inappropriate for IT to make a lot of storage and data management decisions, he said.

Dagdigian deemed many of the problems that weve struggled with in years past solved problems including compute, networking, and storage. He called compute mostly a financial planning exercise and flagged Internet2 and PetaGene as solid networking options that are no longer hard, risky, or exotic.

He pointed to many vendors in the Bio-IT space that can help with storage that all have strong track records and referenceable customers. He advised starting with object storage or scale-out NASonly exploring something else if business or scientific needs require.

So Smug, So Wrong

But one of the great attractions to Dagdigians annual insights is his willingnesseven delightin point out his past errors. He flagged his own storage failed prediction with zeal: The future of scientific data at rest is object storage, he recounted on a slide, and attributed the quote to some jerk.

It sounded good! Object storage can be deployed on premises and in the cloud. Metadata tagging is fantastic for scientific data management and search. And object storage is purpose built for a FAIR future in which humans are not the dominant data consumers.

I am completely, utterly, totally wrong on this, he said. Were still using POSIX Windows or Linux flavored storage.

It turns out, Dagdigian conceded, scientists do still assume that humans are doing most of the folder browsing, and neither commercial code nor open-source code is object-aware. Scientists who just need to transform data in R or Python dont have the bandwidth to learn object storage.

In fact, he flagged a death of tiered storage. Machine learning and AI have messed up long-held storage design patterns in the past three to four years, he said.

The concept of having an archive tier or a nearline tier or a slow tier doesnt make a lot of sense. If youre talking about machine learning or AI, youre really churning through all of your dataold and newall the time. Youre constantly reevaluating, retraining, pulling out different training sets, Dagidian said. I no longer can get away with tiers of different speed and capacity. If I need to satisfy the ML and AI people, you pretty much need one single tier of performant storage.

The vendor landscape on this new storage structure is crowded, he said, but he highlighted VAST Data, Weka, Hammerspace, and DellEMC.

COVID-Era Trends

Next, Dagdigian turned his attention to the trends arising the past year or two, starting with one of his single biggest obnoxious problems: the scarcity of GPUs on the cloud, particularly in Amazons US-East-1 availability code. One Boston-based client is building their first AWS footprint in US-East-2, simply because we cannot get the GPUs that we need, particularly for computational chemistry workloads.

An increasingly attractive alternative, Dagdigian said, is launching clusters in co-location spaces. He highlighted Markley Group as New Englands best-connected co-location facility and gave a quick outline of the solution hes placing there: 1.5 Tb of RAM, 40 CPU cores, four Nvidia Tesla V100 GPUs for about $70,000. As part of a hybrid cloud solution, a co-lo cluster creates a hedge against the cloud GPU scarcity or rising cost. He recommends using such solutions to soak up computational chemistry, simulations, and other persistent workloads.

From his current personal BioTeam workload, Dagdigian is integrating AWS Parallelcluster with Schrodinger computational chemistry tools and SLURMs license-aware job scheduling. It may be a niche use case, he conceded, but an autoscaling HPC grid that understands that you cannot run a job unless a particular license is available is a magic nirvana for us.

Finally, he zipped through a few mini-trends that seem to be at reality inflection points.

Read this article:

Ten Year Trends, Covid's Impact, Where Dagdigian Was Wrong - Bio-IT World

Read More..

Chinese rover detects water existed on Mars more recently than thought – UPI News

Scientists used instruments to analyze rocks and minerals on the surface of Mars, finding evidence there was substantial liquid water on the planet more recently than previously thought. Photo courtesy of the China National Space Administration

May 11 (UPI) -- Nearly one year after landing on Mars, scientists say China's Zhurong rover collected data indicating water may have existed on the planet over a longer period of time than previously thought.

A study published Wednesday in the journal Science Advances said Zhurong detected evidence that the Utopia Planitia basin had "substantial" liquid water during its most recent epoch of geologic history -- the Amazonian. Scientists previously believed this time period, about 700 million years ago, to be cold and dry and liquid water activities to be "extremely limited."

Before assessing the new data, scientists believed that Mars lost much of its water after its Hesperian period, about 3 billion years ago.

The Zhurong rover touched down on Mars' surface May 15 as part of the Tianwen-1 mission. The main point of the mission was to search for signs of life, ice and water.

Scientists from China's National Space Science Center and the Chinese Academy of Sciences analyzed data gathered from a laser-induced breakdown spectrometer, telescopic microimaging camera and short-wave infrared spectrometer to study minerals to determine the amount of liquid water that would have been at the site millions of years ago.

NASAs Curiosity Mars rover used two different cameras to create this panoramic selfie, comprised of 60 images, in front of Mont Mercou, a rock outcrop that stands 20 feet tall on March 26, 2021, the 3,070th Martian day, or sol, of the mission. These were combined with 11 images taken by the Mastcam on the mast, or "head," of the rover on March 16. The hole visible to the left of the rover is where its robotic drill sampled a rock nicknamed "Nontron." The Curiosity team is nicknaming features in this part of Mars using names from the region around the village of Nontron in southwestern France. Photo courtesy of NASA/JPL-Caltech/MSSS

The rest is here:

Chinese rover detects water existed on Mars more recently than thought - UPI News

Read More..

Internet Security Audit Market Size in 2022 : value chain analysis, SWOT analysis, restraints, Growth Opportunities, Driving Factors, Top…

The Internet Security Audit Market 2022 report provides the historical as well as present growth factors of the global market. The report contains financial data achieve from various research sources to provide specific and reliable analysis. The report presents information about the top regions of the world and countries with their regional development status, volume, market size, market value, and price data.

Internet Security AuditMarket 2022 Impact of COVID-19 on the Market: The report contains financial data achieve from various research sources to provide specific and reliable analysis. The report presents information about the top regions of the world and countries with their regional development status, volume, market size, market value, and price data.

Internet Security Audit Market (2022-2028) report identifies Sales of Market by regional analysis by product type and product applications. The competitive data type analysis includes capacity, market trends, profit margin, market growth, imports, exports, revenue and Marketing strategies, policies, industry chain analysis that are changing the wave of the market are also catered in the report. The Report provides potential market opportunities and Major Regions that plays a vital role in market are North America, Europe, China, Japan, Middle East and Africa, India, South America and Others.

Get a sample PDF of the report at:https://www.marketgrowthreports.com/enquiry/request-sample/19977823

Internet Security Audit Market Segmentation by Types, By Applications and By Region:

Internet Security Audit market is analyses and market size information is provided by regions (countries). Segment by Application and type, the Internet Security Audit market is segmented into United States, Europe, China, Japan, Southeast Asia, India and Rest of World. The report includes region-wise market size for the period 2022-2028.It also includes market size and forecast by players, by Type, and by Application segment in terms of sales and revenue for the period 2022-2028.

Internet Security Audit Market Segment by Applications:

Internet Security Audit Market Segment/types by Type:

List of Top Key Players in Internet Security Audit Market Report are:

Request for Covid-19 Impact Sample:https://www.marketgrowthreports.com/enquiry/request-covid19/19977823

Brief Description for Internet Security Audit Market:

As the global economy mends, the 2021 growth of Internet Security Audit will have significant change from previous year. According to our (LP Information) latest study, the global Internet Security Audit market size is USD million in 2022 from USD million in 2021, with a change of % between 2021 and 2022. The global Internet Security Audit market size will reach USD million in 2028, growing at a CAGR of % over the analysis period.The United States Internet Security Audit market is expected at value of USD million in 2021 and grow at approximately % CAGR during review period. China constitutes a % market for the global Internet Security Audit market, reaching USD million by the year 2028. As for the Europe Internet Security Audit landscape, Germany is projected to reach USD million by 2028 trailing a CAGR of % over the forecast period. In APAC, the growth rates of other notable markets (Japan and South Korea) are projected to be at % and % respectively for the next 5-year period.Global main Internet Security Audit players cover Symantec, Intel Security, IBM, and Cisco, etc. In terms of revenue, the global largest two companies occupy a share nearly % in 2021.This report presents a comprehensive overview, market shares, and growth opportunities of Internet Security Audit market by product type, application, key players and key regions and countries.

Enquire before Purchasing this Report: https://www.marketgrowthreports.com/enquiry/pre-order-enquiry/19977823

Competitive Landscape and Internet Security Audit Market Share Analysis:

Internet Security Audit market competitive landscape provides details and data information by players. The report offers comprehensive analysis and accurate statistics on revenue by the key player for the period 2021. It also offers detailed analysis supported by reliable statistics on revenue (global and regional level) by players for the period 2021. Details included are company description, major business, company total revenue and the sales, revenue generated in Internet Security Audit business, the date to enter into the Internet Security Audit market, Internet Security Audit product introduction, recent developments, etc.

Key Questions Answered in The Report:

Major Points from Table of Contents:

Major Points from Table of Contents:

Global Internet Security Audit Market Research Report 2022-2028, by Manufacturers, Regions, Types and Applications

1 Study Coverage

1.1 Internet Security Audit Product Introduction

1.2 Market by Type

1.2.1 Global Internet Security Audit Market Size Growth Rate by Type

1.3 Market by Application

1.3.1 Global Internet Security Audit Market Size Growth Rate by Application

1.4 Study Objectives

1.5 Years Considered

2 Global Internet Security Audit Production

2.1 Global Internet Security Audit Production Capacity (2016-2028)

2.2 Global Internet Security Audit Production by Region: 2016 VS 2022 VS 2028

2.3 Global Internet Security Audit Production by Region

2.3.1 Global Internet Security Audit Historic Production by Region (2016-2022)

2.3.2 Global Internet Security Audit Forecasted Production by Region (2022-2028)

3 Global Internet Security Audit Sales in Volume and Value Estimates and Forecasts

3.1 Global Internet Security Audit Sales Estimates and Forecasts 2016-2028

3.2 Global Internet Security Audit Revenue Estimates and Forecasts 2016-2028

3.3 Global Internet Security Audit Revenue by Region: 2016 VS 2022 VS 2028

3.4 Global Top Internet Security Audit Regions by Sales

3.4.1 Global Top Internet Security Audit Regions by Sales (2016-2022)

3.4.2 Global Top Internet Security Audit Regions by Sales (2022-2028)

3.5 Global Top Internet Security Audit Regions by Revenue

3.5.1 Global Top Internet Security Audit Regions by Revenue (2016-2022)

3.5.2 Global Top Internet Security Audit Regions by Revenue (2022-2028)

3.6 North America

3.7 Europe

3.8 Asia-Pacific

3.9 Latin America

3.10 Middle East and Africa

4 Competition by Manufactures

4.1 Global Internet Security Audit Supply by Manufacturers

4.1.1 Global Top Internet Security Audit Manufacturers by Production Capacity (2022 VS 2022)

4.1.2 Global Top Internet Security Audit Manufacturers by Production (2016-2022)

4.2 Global Internet Security Audit Sales by Manufacturers

4.2.1 Global Top Internet Security Audit Manufacturers by Sales (2016-2022)

4.2.2 Global Top Internet Security Audit Manufacturers Market Share by Sales (2016-2022)

4.2.3 Global Top 10 and Top 5 Companies by Internet Security Audit Sales in 2022

4.3 Global Internet Security Audit Revenue by Manufacturers

4.3.1 Global Top Internet Security Audit Manufacturers by Revenue (2016-2022)

4.3.2 Global Top Internet Security Audit Manufacturers Market Share by Revenue (2016-2022)

4.3.3 Global Top 10 and Top 5 Companies by Internet Security Audit Revenue in 2022

4.4 Global Internet Security Audit Sales Price by Manufacturers

4.5 Analysis of Competitive Landscape

4.5.1 Manufacturers Market Concentration Ratio (CR5 and HHI)

4.5.2 Global Internet Security Audit Market Share by Company Type (Tier 1, Tier 2, and Tier 3)

4.5.3 Global Internet Security Audit Manufacturers Geographical Distribution

4.6 Mergers and Acquisitions, Expansion Plans

5 Market Size by Type

5.1 Global Internet Security Audit Sales by Type

5.1.1 Global Internet Security Audit Historical Sales by Type (2016-2022)

5.1.2 Global Internet Security Audit Forecasted Sales by Type (2022-2028)

5.1.3 Global Internet Security Audit Sales Market Share by Type (2016-2028)

5.2 Global Internet Security Audit Revenue by Type

5.2.1 Global Internet Security Audit Historical Revenue by Type (2016-2022)

5.2.2 Global Internet Security Audit Forecasted Revenue by Type (2022-2028)

5.2.3 Global Internet Security Audit Revenue Market Share by Type (2016-2028)

5.3 Global Internet Security Audit Price by Type

5.3.1 Global Internet Security Audit Price by Type (2016-2022)

5.3.2 Global Internet Security Audit Price Forecast by Type (2022-2028)

6 Market Size by Application

6.1 Global Internet Security Audit Sales by Application

6.1.1 Global Internet Security Audit Historical Sales by Application (2016-2022)

6.1.2 Global Internet Security Audit Forecasted Sales by Application (2022-2028)

6.1.3 Global Internet Security Audit Sales Market Share by Application (2016-2028)

6.2 Global Internet Security Audit Revenue by Application

6.2.1 Global Internet Security Audit Historical Revenue by Application (2016-2022)

6.2.2 Global Internet Security Audit Forecasted Revenue by Application (2022-2028)

6.2.3 Global Internet Security Audit Revenue Market Share by Application (2016-2028)

6.3 Global Internet Security Audit Price by Application

6.3.1 Global Internet Security Audit Price by Application (2016-2022)

6.3.2 Global Internet Security Audit Price Forecast by Application (2022-2028)

7 Internet Security Audit Consumption by Regions

7.1 Global Internet Security Audit Consumption by Regions

7.1.1 Global Internet Security Audit Consumption by Regions

7.1.2 Global Internet Security Audit Consumption Market Share by Regions

7.2 North America

7.2.1 North America Internet Security Audit Consumption by Application

7.2.2 North America Internet Security Audit Consumption by Countries

7.2.3 United States

7.2.4 Canada

7.2.5 Mexico

Read more here:
Internet Security Audit Market Size in 2022 : value chain analysis, SWOT analysis, restraints, Growth Opportunities, Driving Factors, Top...

Read More..

National Cyber Security Centre developing tool to block scam websites instantly – Telegraph and Argus

It said the tool will be made available to all UK internet service providers so they can block websites that are flagged as fraudulent.

The new data-sharing capability will use real-time threat data gathered from across the industry to spot and flag scam websites to internet providers, who can then cut off access to such sites at scale.

It would complement existing takedown services, the NCSC said of the tool,which it revealed on Tuesday had removed more than 2.7 million scams from the internet last year.

Internet service providers will be able to use the new tool (PA)

Speaking at the NCSCs annual CyberUK conference, Sarah Lyons, the bodys deputy director for economy and society, said: Cyber criminals continuously seek to deploy devious methods to trick us into sharing personal or financial details and its vital we stay ahead of them.

This landmark partnership with internet service providers means that scams can be blocked from ever reaching our screens and reinforces the UKs armour in protecting the public from online harms.

READ MORE:New free tool to check your email security introduced by UK cybersecurity body

The announcement comes as leading cybersecurity figures said the UK must take a whole of society approach to the issue of online protection.

NCSC chief executive Lindy Cameron said the UK must mobilise every individual to stand up for the collective safety of our community.

We need to give them the tools, the knowledge, the confidence to make good choices and to make that habitual for everyone, she said.

Original post:
National Cyber Security Centre developing tool to block scam websites instantly - Telegraph and Argus

Read More..

Global tech industry body seeks revision in India’s directive on cyber security breaches – The New Indian Express

By PTI

NEW DELHI: US-based technology industry body ITI, having global tech firms such as Google, Facebook, IBM and Cisco as its members, has sought a revision in the Indian government's directive on reporting of cyber security breach incidents.

ITI said that the provisions under the new mandate may adversely impact organisations and undermine cyber security in the country.

ITI country manager for India Kumar Deep, in a letter to CERT-In chief Sanjay Bahl dated May 5, has asked for a wider stakeholder consultation with the industry before finalising on the directive.

"The directive has the potential to improve India's cyber security posture if appropriately developed and implemented, however, certain provisions in the bill, including counterproductive incident reporting requirements, may negatively impact Indian and global enterprises and undermine cyber security," Deep said.

Indian Computer Emergency Response Team (CERT-In) on April 28, issued a directive asking all government and private agencies, including internet service providers, social media platforms and data centres, to mandatorily report cyber security breach incidents to it within six hours of noticing them.

The new circular issued by the CERT-In mandates all service providers, intermediaries, data centres, corporates and government organisations to mandatorily enable logs of all their ICT (Information and Communication Technology) systems and maintain them securely for a rolling period of 180 days and the same shall be maintained within the Indian jurisdiction.

ITI has raised concerns over the mandatory reporting of breach incidents within six hours of noticing, to enable logs of all ICT systems and maintain them within Indian jurisdiction for 180 days, the overbroad definition of reportable incidents and the requirement that companies connect to the servers of Indian government entities.

Deep, in the letter, said that the organisations must be given 72 hours to report an incident in line with global best practices and not just six hours.

ITI said that the government's mandate to enable logs of all covered entities' information and communications technology systems, maintain logs "securely for a rolling period of 180 days" within India and make them available to the Indian government upon request is not a best practice.

"It would make such repositories of logged information a target for global threat actors, in addition to requiring significant resources (both human and technical) to implement," Deep said.

ITI also raised concern on the requirement that "all service providers, intermediaries, data centres, body corporate and government organisations shall connect to the NTP servers of Indian labs and other entities for synchronisation of all their ICT systems clocks".

The global body said that the provisions could negatively affect companies' security operations as well as the functionality of their systems, networks and applications.

ITI said that the government's current definition of reportable incident to include activities such as probing and scanning is far too broad given probes and scans are everyday occurrences.

"It would not be useful for companies or CERT-In to spend time gathering, transmitting, receiving and storing such a large volume of insignificant information that arguably will not be followed up on," Deep said.

ITI has asked the government to defer timeline for implementation of the new directive and launch a wider consultation with all stakeholders for its effective implementation.

ITI demanded CERT-In to "revise the directive to address the concerning provisions with regard to incident reporting obligations, including related to the reporting timeline, scope of covered incidents and logging data localisation requirements".

The rest is here:
Global tech industry body seeks revision in India's directive on cyber security breaches - The New Indian Express

Read More..

World’s Largest Cybersecurity Benchmarking Study Finds that Top Executives Believe their Organizations are Not Prepared for New Era of Risk – Business…

NEW YORK--(BUSINESS WIRE)--ThoughtLab, a leading global research firm, today announced the findings of its 2022 cybersecurity benchmarking study, Cybersecurity Solutions for a Riskier World. The study analyzed the cybersecurity strategies and results of 1,200 large organizations across 14 different sectors and 16 countries, representing $125.2 billion of annual cybersecurity spending.

The research revealed that the pandemic has brought cybersecurity to a critical inflection point. The number of material breaches respondents suffered rose 20.5% from 2020 to 2021, and cybersecurity budgets as a percentage of firms total revenue jumped 51%, from 0.53% to 0.80%. During that time, cybersecurity became a strategic business imperative, requiring CEOs and their management teams to work together to meet the higher expectations of regulators, shareholders, and the board. In addition, the role of the chief information security officer (CISO) expanded, with many taking on responsibility for data security (49%), customer and insider fraud (44%), supply chain management (34%), enterprise and geopolitical risk management (30%), and digital transformation and business strategy (29%).

Yet 29% of CEOs and CISOs and 40% of chief security officers admit their organizations are unprepared for a rapidly changing threat landscape. The reasons cited include the complexity of supply chains (44%), the fast pace of digital innovation (41%), inadequate cybersecurity budgets and lack of executive support (both 28%), convergence of digital and physical assets (25%), and shortage of talent (24%). The highest percentages of unprepared organizations were in critical infrastructure industries: healthcare (35%), the public sector (34%), telecoms (31%), and aerospace and defense (31%).

Over the next two years, security executives expect an increase in attacks from social engineering and ransomware as nation-states and cybercriminals become more prolific. Executives anticipate that these attacks will target weak spots primarily caused by software misconfigurations (49%), human error (40%), poor maintenance (40%), and unknown assets (30%).

Ground-breaking analysis reveals industry metrics and best-performing cybersecurity strategies

As part of ThoughtLabs evidence-based research, its economists assessed the cybersecurity performance of corporate and government organizations against 26 metrics, including times to detect, respond to, and mitigate a cybersecurity breach, as well as the number of material breaches suffered. The benchmarking study revealed 10 best practices that can reduce the probability of a material breach and the time it takes to find and respond to those that happen:

A coalition of cybersecurity experts from leading companies, associations, and universities

The research program drew on the expertise of a diverse group of cybersecurity leaders and experts from across the private sector, government, and academia. The group includes global consulting sponsor Booz Allen Hamilton; lead sponsors Elastic, KnowBe4, Skybox Security, Securonix, Claroty, Axis Communications, Votiro, and Zenkey; supporting sponsors ServiceNow, CyberCube, and Resolute Strategic Services; and research partners Internet Security Alliance and ISF. The advisory board consists of CISOs and other cybersecurity experts from a cross-section of industries.

The move to digital during the pandemicand now escalating geopolitical tensionsare ushering in a new era of cybersecurity risk that will require stronger leadership and wider teamwork among C-Suite executives and their staffs, said Lou Celi, CEO of ThoughtLab and the programs research director. While there is no silver bullet, our evidence-based research reveals that organizations need to take their cybersecurity programs to a higher level of excellence by ensuring they are proactive, risk-based, human-centric, digitally advanced, and properly resourced.

This landmark study fills a growing need for industry-specific cybersecurity metrics that companies can use to measure their performance against their peers, said Paul Sussman, vice president at Booz Allen Hamilton. The research shows that firms have made considerable progress against cybersecurity frameworks like NIST, but they need to do more to keep their organizations safe.

A virtual panel discussion hosted by ThoughtLab and Resolute Strategic Services featuring Paul Sussman, Vice President, Cybersecurity Strategy Consulting, Booz Allen Hamilton; Duc Lai, CISO, University of Maryland Medical System; and Juan Morales, CISO, Realogy; will be held on Wednesday, May 25, 2022, from 11AM to noon EST to discuss the findings and key takeaways for public and private organizations. Register here.

The full report is available here: https://thoughtlabgroup.com/cyber-solutions-riskier-world/.

About ThoughtLab Group

ThoughtLab Group is an innovative thought leadership firm that generates business insights through rigorous research and economic analysis. We specialize in assessing the economic, financial, and social impact of latest technology on cities, companies, industries, and world markets. Our services include fielding business, consumer, investor, and government surveys; organizing executive interviews, meetings, and advisory groups; conducting economic modeling, AI sentiment monitoring, benchmarking, and performance analysis; and developing white papers, eBooks, infographics, and customer-facing analytical tools.

Additional commentary from sponsors

Steve Durbin, CEO, Information Security Forum: The shift in landscape produced by the pandemic and cross-border conflicts has required organizations to reprioritize strategic objectives and key risks from accelerating digital transformation programs and migration to the cloud. CISOs must drive the conversation with the board, they must help address and answer difficult questions regarding cybersecurity and clarify misconceptions.

Stu Sjouwerman, CEO and President, KnowBe4: The focus today is too much on trying to prevent data from leaving, instead of stopping attackers from ever getting in. I would expect to see more focus on security awareness training to reduce the threat surface of phishinga primary attack vector in nearly every kind of cyberattack. This kind of training helps to establish good cyber hygiene, a sense of vigilance, and has been shown to reduce the risk of users falling for social engineering tactics employed within phishing attacks.

Augusto Barros, Vice President, Cybersecurity Evangelist, Securonix: Organizations need to find the right balance between protective and reactive measures, such as detection and response. Security executives often invest more in protective measures and not enough to handle situations when they fail. These investments should allocate resources appropriately across people, process, and technology. Responding successfully to an attack is often human-driven, but it also requires effective processes and latest technologies, such as SOAR and EDR.

Wayne Dorris, Business Development Manager, Axis Communications: Physical security devices like network cameras, AV systems, and access control devices are a blend of OT and IoT end points. Hardening these devices and managing vulnerabilities to the same requirements of your IT policies is often overlooked. Since most traditional IT security and cybersecurity teams do not have the knowledge or the tool sets to properly configure and manage these devices independently, its important that they work closely with manufacturers that are leading in the space and can provide support.

Mandy Andress, CISO, Elastic: "One big trend driving SIEM replacement is the cloud. As workloads migrate to the cloud, monitoring cloud deployments becomes essential to the business. Newer XDR platforms address broader security operations with several embedded capabilities - including cloud-specific out-of-the-box rules, analytics and machine learning to draw out anomalies, integrated endpoint capabilities for faster and deeper investigations, workflow integrations for response automation, and more. Speed of processing and real-time analytics are key advantages."

Gidi Cohen, CEO and Founder, Skybox Security: "A risk-based approach resulted in fewer breaches year over year. This fact underscores that proactive security posture management enables CISOs to act quickly and decisively to mitigate the risks with the greatest potential impact. Calculating true risk exposure requires understanding your entire attack surface with a network model. Then, comprehensive exposure management must combine threat intelligence, asset importance, path analysis, and attack simulation to pinpoint threats with the highest likelihood to impact your business financially."

Ravi Srinivasan, CEO, Votiro: Most ransomware attacks happen when the bad actors have gotten your data and locked it up. So, the key thing is to follow the data. Its like they say with understanding political corruption: follow the money. If you want to understand ransomware, follow the data. You will find it moving from server to endpoint to the cloud to file sharesand that chain is what you want to protect. If you can protect that data chain before the bad actor is able to compromise it, youve successfully prevented ransomware.

Barbara Kay, Senior Director, Product Marketing for Risk, Security, and ESG, ServiceNow: Risk-based management aligns security priorities with the business and helps security leaders become more strategic in their views. The board, business heads, CFOs, and CROs all think about risks and tradeoffs. Mature organizations work with IT and GRC teams to operationalize risk decisions within technical and process controls. The whole team goes faster, with less risk and friction, and more visibility.

Darren Thomson, Head of Cyber Intelligence Services, CyberCube: As security and resilience become top of mind for corporate boards, the CISO needs to adapt culturally to demonstrate the impact of their efforts on the business. It is important for CISOs to talk to a board of directors in a language that they understand in order to take a strategic, top-down approach to risk management in cyber.

Simon Chassar, Chief Revenue Officer, Claroty: As digital and physical assets continue to convergeparticularly in industrial, healthcare, and other types of critical infrastructure environmentsthe only way to mitigate risk is to make hyperconnectivity more secure. Considering this, CISOs must ensure that their cybersecurity programs encompass all types of interconnected assets across the organization, whether they are IT, OT, or any other kind of internet-connected device in the Extended Internet of Things (XIoT).

Research sponsors and advisors

Wayne Dorris, Business Development Manager- Cybersecurity, Axis Communications; Madeline Robson, Content and Communications Specialist, Axis Communications; Fredrik Larsson, Expert Security Architect, Axis Communications; Per Bjorkdahl, Director, Sustainable Sales Engagements, Axis Communications; Matt Feenan, Team Lead, Products and Solutions Marketing, Axis Communications; Paul Sussman, Vice President, Cybersecurity Strategy Consulting, Booz Allen Hamilton; Mark Taylor, Head of Commercial Strategic Alliances and Partnerships, Booz Allen Hamilton; Christopher Smith, Principal, Commercial Cyber Practice, Booz Allen Hamilton; Ken Yao, Senior Associate, Cyber Fusion Center, Booz Allen Hamilton; Simon Chassar, Chief Risk Officer, Claroty; Grant Geyer, Chief Product Officer and CISO, Claroty; Upa Campbell, Chief Marketing Officer, Claroty; Chelsea Sawicki, Senior Director of Product and Content Marketing, Claroty; Rebecca Bole, Head of Industry Engagement, CyberCube; Megan Radogna, Thought Leadership Content and Research Manager, Elastic; Riva Froymovich, Senior Director, Thought Leadership, Elastic; Joanna Huisman, Senior Vice President, Strategic Insights and Research, KnowBe4; Augusto Barros, Vice President and Cyber Security Evangelist, Securonix; Oliver Rochford, Senior Director, Security Evangelist, Securonix; Isabelle Coste, Senior Director, Demand Generation, Securonix; Sara Kingsley, Director of Product Marketing, Securonix; Raunika Nayyar, Manager, Marketing and Communications, Securonix; Richard Murphy, Editor in Chief, Director, C-Suite Communications, ServiceNow; Barbara Kay, Senior Director, Product Marketing for Risk, Security, and ESG, ServiceNow; Kathy OConnell, Vice President, Corporate Marketing and Communications, Skybox Security; Ashley Nakano, Corporate Communications Director, Skybox Security; Rob Rosiello, Chief Revenue Officer, Skybox Security; Kristin Melville, Vice President of Growth Marketing, Skybox Security; Ravi Srinivasan, CEO, Votiro; Gianna Whitver, Vice President of Marketing, Votiro; Alex Schlager, Chief Executive Officer, ZenKey; Larry Clinton, President/CEO, Internet Security Alliance; Jeff Brown, Former VP and CISO, Raytheon; Gary McAlum, Board Director, National Cybersecurity Center; Ron Mehring, CISO, Texas Health Resources; Peter Keenan, CISO, Lazard; Andrew Jenkinson, Group CEO, Cybersec Innovation Partners; Juan Morales, CISO, Global Information Security,Realogy Holdings; Dr. Ivo Pezzuto, Core Professor of Digital Transformation, Disruptive Innovation,International School of Management; Richard Rushing, CISO, Motorola Mobility, a Lenovo company; Dave Estlick, CISO, Chipotle Mexican Grill; Ilan Abadi, Global CISO, Teva Pharmaceuticals; Deborah Wheeler, SVP, Chief Information Security Officer, Delta Air Lines; Joseph Steinberg, Cybersecurity Expert Witness and Advisor, Cybersecurity and Artificial Intelligence Expert Services; Steve Durbin, CEO, Information Security Forum; June Chambers, Head of PR and Corporate Communications, Information Security Forum; Matthew Saidel, Vice President, Resolute Strategic Services; Curley Henry, Vice President, Deputy CISO, Southern Company; Mandy Andress, CISO, Elastic; Alim Somani, Managing Director, Hatch Digital

See the article here:
World's Largest Cybersecurity Benchmarking Study Finds that Top Executives Believe their Organizations are Not Prepared for New Era of Risk - Business...

Read More..

Building a Cyber Force Is Even Harder Than You Thought – War on the Rocks

In the past decades, over 40 states have publicly established some sort of military cyber command, with at least a dozen more planning to do so. Yet despite this proliferation, there is still little appreciation of the sheer amount of time and resources that an effective cyber command requires.

In my book No Shortcuts: Why States Struggle to Develop a Military Cyber-Force, I break down the challenges of building an effective cyber command into five categories I call the PETIO framework: people, exploits, toolset, infrastructure, and organizational structure. What does this mean for aspiring cyber powers? First, the most important element of developing an offensive cyber capability are the people not just technically savvy ones but also linguists, analysts, front-office support, strategists, legal experts, and operation-specific consultants. Second, much attention has been paid states deployment of zero-day, or unknown, exploits. However, known exploits and tools can also be highly effective if the attacker has a superior knowledge of their target and their capabilities. Third, infrastructure investments such as establishing a cyber range for training and testing are an essential requirement to develop an offensive cyber capability and come at a great cost.

Technical People Arent Enough

A widespread view in business management is that as the cognitive skills of a job increase, people rather than technology become more important. These thought jobs, as Daniel Pink calls them, require greater problem-solving skills and creative thinking, which means that businesses can only be successful if they cultivate a culture that prioritizes the human element. For aspiring cyber powers, this is true for more than just technical experts.

Of course, a military cyber organization needs vulnerability analysts, or bug hunters. These employees search for software vulnerabilities. They also need developers, operators, testers, and system administrators to successfully execute an operation, and make sure capabilities are reliably developed, deployed, maintained, and tested.

But building an offensive cyber capability also requires a more comprehensive workforce. First, frontline assistance is required to support the activities of operators and developers. This can include activities such as registering accounts or buying capabilities from private companies. Second, a military or intelligence organization with the best cyber force in the world is bound to fail without strategic guidance. Operational or tactical success does not equal strategic victory. An operation may be perfectly executed and rely on flawless code, but this does not automatically lead to mission success. For example, U.S. Cyber Command may successfully wipe data off the server of an Iranian oil company without actually securing any change in Iranian foreign policy. An organization can only function if there is a clear understanding of how the available means will achieve the desired ends. An important task of strategists is to coordinate activities with other military units and partner states. They are also involved in selecting target packages, although a separate position is often created for targeteers. The targeteers nominate targets, assess collateral damage, manage deconfliction, and help with the planning of the operational process.

Any military or civilian agency conducting cyber operations as part of a government with a legal framework will also deal with an army of lawyers. These legal experts will be involved in training, advising, and monitoring. Compliance with the law of war, the law of armed conflict, and any other legal mandates requires legal training operators, developers, and systems administrators to prevent violations. Legal experts provide planning support as they advise, review, and monitor operational plans. For example, in the planning of U.S. Cyber Commands 2016 Operation Glowing Symphony, which sought to disrupt and deny ISIL internet usage, these experts helped to specify the notification plan, mission checklist, and authorization process.

Embedding legal experts at the various stages of a cyber operation is hard. Indeed, it likely requires numerous critical conversations with the leadership and operational teams to ensure they sufficiently understand what is being proposed before they can give approval. Also, the way certain operations are executed makes legal vetting harder. For example, in the case of self-propagating malware like Stuxnet, once you commit, it is difficult to go back.

A diverse group of technical analysts is then needed to process information during and after operations. Non-technical analysts are essential, too, particularly for understanding how people in the target network will respond to a cyber operation. This requires analysts with specific knowledge about the country, culture, or target organization. There is also the need for remote personnel. As security researcher and former NSA employee Charlie Miller puts it, Cyberwar is still aided by humans being[s] located around the world and performing covert actions. In the case of the Stuxnet attacks, for example, a Dutch mole, posing as a mechanic, helped the United States and Israel collect intelligence about Iranian nuclear centrifuges that was used to update and install the virus.

Finally, a cyber command needs administrators for human resourcing, liaising with other relevant domestic and international institutions, and speaking to the media. As Jamie Collier observes, [G]one are the days when spy agencies did not officially existand kept their personnel and activities guarded surreptitiously away from the public view. Communication can help to overcome public skepticism. This applies not just to intelligence agencies, but to some degree also to military cyber commands, especially when their mission set is expanding and concerns about escalation, norms deterioration, or allied friction are growing. In addition, being more public facing may help for recruitment purposes in a highly competitive job market.

It Is More Than Just About Zero-Days

The most talked about element of developing an offensive cyber capability are exploits. These fall into three difference categories: zero-day exploits, unpatched N-day exploits, and patched N-day exploits. A zero-day exploit is one that exposes a vulnerability not known to the vendor. An unpatched N-day exploit is one that exposes a vulnerability in software or hardware that is known to the vendor but does not have a patch in place to fix the flaw. A patched N-day exploit is one that exposes a vulnerability in software or hardware that is known to the vendor and has a patch in place to fix the flaw. Oftentimes, attackers must combine multiple vulnerabilities into a chain of attack, known as an exploit chain, to attack a given target.

Much policy attention is devoted to states hoarding of zero-days. Jason Healey, a Senior Research Scholar at Columbia Universitys School for International and Public Affairs, conducted a study in 2016 to understand how many zero-day vulnerabilities the U.S. government retains. Healey states with high confidence that in 2015/2016 the U.S. government retained [n]ot hundreds or thousands per year but probably dozens. This largely corresponds with other reporting. More mature military and intelligence organizations benefit from carefully designed procedures to use their exploits as efficiently as possible.

We should not, however, exaggerate the importance of zero-days. [P]eople think, the nation-states, theyre running on this engine of zero days, you go out with your master skeleton key and unlock the door and youre in. Its not that, Rob Joyce, then-head of NSAs Office of Tailored Access Operations, said during a presentation at the Enigma Conference. He continued, Take these big corporate networks, these large networks, any large network I will tell you that persistence and focus will get you in, will achieve that exploitation without the zero days. Theres so many more vectors that are easier, less risky, and quite often more productive than going down that route.

Indeed, for military cyber organizations in particular, the race for N-days is often as important. In deploy N-day exploits, attacks can take advantage of the time it takes to develop a patch and the time it takes to adopt a patch. The average delay in patching an exploit differs based the size of the vendor, the severity of vulnerability, and source of the disclosure. While it takes an average of just over a month for in-production web applications to patch medium severe vulnerabilities, it takes vendors on average 150 days to patch vulnerabilities in supervisory control and data acquisition systems. Adopting the patch can also take a considerable amount of time especially in environments that lack standardization, such as industrial control systems. Partially due to the long lead-time on industrial control-system patching, we have witnessed several prominent attacks against these devices and protocols. For example, in December 2016 a Kremlin-backed hacker group known as Sandworm used malware dubbed CrashOverride or Industroyer to turn large parts of Ukraine dark. To do this, the attackers bypassed the automated protected systems at a Ukrainian electrical transmission substation by using a known vulnerability in its Siemens SIPROTEC relays.

Testing and Infrastructure Matter

There is a widespread belief that launching cyber attacks is cheap while defending against them is expensive. But as Matthew Monte observed, based on his experience in the U.S. intelligence community, Attackers do not stumble into being right once. They put in the time and effort to build an infrastructure and then work through Thomas Edisons alleged 10,000 ways that wont work. This requires infrastructure, an absolutely crucial element of cyber capability that is not talked about enough. Infrastructure can be broadly defined as the processes, structures, and facilities needed to pull off an offensive cyber operation.

Infrastructure falls into two categories: control infrastructure and preparatory infrastructure. Control infrastructure refers to processes directly used to run an operation. These are generally burned down after a failed operation. This type of infrastructure can include domain names of phishing sites, leaked email addresses, or other abused technologies. It also includes command-and-control infrastructure used in remotely conducted operations that maintain communications with compromised systems within a target network. This infrastructure can be used, for example, to keep track of compromised systems, update malware, or exfiltrate data. Depending on the goal and resources of an operation, the command-and-control infrastructure can be as basic as a single server operating on the external network.

More mature actors, however, tend to use more complex infrastructure and techniques to remain stealthy and resilient against takedowns. For example, Russia-based Fancy Bear spent more than $95,000 on the infrastructure they used to target people involved in the 2016 U.S. presidential election. And this is often about far more than just renting infrastructure: An organization may run a whole set of operations just to compromise legitimate webservers to use them for running future operations.

Preparatory infrastructure concerns a set of processes that are used to put oneself in a state of readiness to conduct cyber operations. Rarely will an attacker throw away this infrastructure after a (failed) operation.

One of the most difficult things to do when crafting good attack tools is testing them before deployment. As Dan Geer, a prominent computer-security expert, points out, Knowing what your tool will find, and how to cope with that, is surely harder than finding an exploitable flaw in and of itself. Much of the preparatory infrastructure for an attack usually consists of databases used in target mapping. An attacker will need to do a lot of work to find their targets. Network mapping exercises can help an organization understand the range of possible targets, sometimes also referred to as target acquisition. Hence, the most mature actors in this space have invested enormous resources in network-mapping tools to identify and visualize devices on certain networks.

There are also other targeted databases. For example, GCHQ maintains a special database that stores details of computers used by engineers and system administrators who work in network operation centers across the world. The reason why engineers and system administrators are particularly interesting targets is because they manage networks and have access to large troves of data.

An illustrative, high-profile case is the hack of Belgacom,a partly state-owned Belgian phone and internet provider with the European Commission, the European Parliament, and the European Council as part of their customer base. The British spy agency GCHQ, possibly assisted by other Five-Eyes members, used malware it had developed to gain access to Belgacoms GRX routers. From there, it could undertake Man in the Middle attacks, which made it possible to secretly intercept communications of targets roaming using smartphones. As reporters discovered, the Belgacom Hack, code-named Operation Socialist, occurred in stages between 2010 and 2011, each time penetrating deeper into Belgacoms systems, eventually compromising the very core of the companys networks.

Preparing for cyber attacks also requires creating a cyber range. This is a platform for the development and use of interactive simulation environments that can be used for training and capability development. In past years, businesses have increasingly invested in cyber ranges, based on cloud technology. These ranges are either developed on public cloud providers such as Amazon Web Services, Microsoft Azure, or Google or private cloud networks deployed on premises. Cloud cyber ranges generally provide flexible hands-on learning environments with convenient click-and-play scenarios for training. For military cyber organizations, however, the conventional non-cloud-based ranges are generally still preferable, given the need for highly customable simulation environments and bespoke operational testing and training.

In trying to keep up with the fast pace of developments in cyber conflict, much expert commentary has focused on whether cyber effect operations can produce strategic advantages or be influenced by norms. Yet, we first need to address a more fundamental question: When are states actually able to conduct operations in the first place? While the proliferation of military cyber commands suggests major change is afoot in cyber warfare, making these organizations work remains much harder and more expensive than it appears.

This essay is based on No Shortcuts: Why States Struggle to Develop a Military Cyber-Force, published with Oxford University Press and Hurst Publishers in May 2022.

Max Smeets is a senior researcher at the Center for Security Studies at ETH Zurich and director of the European Cyber Conflict Research Initiative,

Image: Joseph Eddins, Airman Magazine

See the original post:
Building a Cyber Force Is Even Harder Than You Thought - War on the Rocks

Read More..

Cyber crime rate in the UK higher last year than in other developed nations – The National

Internet users in the UK were the victims of more cyber crimes last year than in any other developed country.

Statistics from Dutch cyber security company Surfshark showed that there were 4,783 victims of cyber crime for every one million users in Britain in 2021, well ahead of the US on 1,494 cyber crimes per person a 13 per cent year-on-year decline.

A distant third was Canada with 174 instances, followed by Australia and Greece.

South Africa, the Netherlands, France, Germany and Mexico rounded off the top 10.

At 50 per cent, the Netherlands experienced the biggest surge in cyber crimes.

Crucially, the number of cyber crimes grew 40 per cent in the UK last year, compared to the global rate of 8 per cent, said Agneska Sablovskaja, a data researcher at Surfshark, which also provides virtual private network services.

Therefore, it is crucial to invest in peoples practical knowledge and education, which is proven to be one of the most important factors in developing the ability to cope with online threats," she said.

Cyber criminals continue to look for lucrative opportunities and tend to be where digital activity is most apparent. They have increased their efforts to keep one step ahead of organisations and individuals as digital adoption in daily life continues to rise.

Overall, online criminal activity cost about $6 trillion globally last year, according to a study by research company Cybersecurity Ventures. If that were to be measured as a country, it would be the world's third-largest economy after the US and China.

By 2025, these crimes are expected to cost the world about $10.5tn, up 250 per cent from 2015's $3tn, the company added.

Surfshark's study identified investing as the sector most targeted by cyber criminals last year. Although not the top vertical in terms of the number of victims about 20,600 the average and total losses were both first at $70,811 and about $1.46 billion, respectively.

Online payment fraud was the top category for the number of victims about 93,500.

Ransomware attacks which surged 105 per cent annually last year, according to cyber security firm SonicWall resulted in losses of almost $50m.

However, phishing which involves fake emails appearing to come from a reputable source with the aim of securing personal information remained criminals' method of choice for a third consecutive year in 2021, Surfshark said.

There were 323,972 phishing attacks last year, meaning "every second individual that fell for an online crime fell for a phishing attack", it said.

"Malware and ransomware attacks are becoming more exclusive to businesses; they claimed around 4,500 victims in 2021. Compared to phishing, that is more than 70 times fewer victims."

The cyber crime trend has consistently risen since 2001, with the online victim count increasing 17 times and financial losses surging 400 times, Surfshark said.

Overall, this translates to more than 6.5 million victims and over $26bn in losses over that 21-year period.

Cyber criminals also exploit worldwide events, most notably in 2009, a year after the global financial crisis, when cyber crime-related financial losses surged 115 per cent to $560m from $260m in 2008.

Most recently, the Covid-19 pandemic that started in 2020 led to the victim count leaping by 69 per cent, the highest growth recorded since 2001.

Updated: May 08, 2022, 4:00 AM

Read more from the original source:
Cyber crime rate in the UK higher last year than in other developed nations - The National

Read More..

Patent Issued for Scanning and remediating configuration settings of a device using a policy-driven approach (USPTO 11310283): VMware Inc. – Insurance…

2022 MAY 11 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- A patent by the inventors Hatch, Thomas S. (Lehi, UT, US), filed on September 7, 2018, was published online on April 19, 2022, according to news reporting originating from Alexandria, Virginia, by NewsRx correspondents.

Patent number 11310283 is assigned to VMware Inc. (Palo Alto, California, United States).

The following quote was obtained by the news editors from the background information supplied by the inventors: Recent years have seen rapid development in software products and electronic devices. For example, software products can affect functionality related to communication of data to and from electronic devices as well as operation of operating systems and/or individual applications installed on the electronic devices. As software and hardware become more complex, it becomes increasingly difficult to effectively secure information contained on electronic devices as well as information transmitted to and from electronic devices (e.g., over the Internet). Indeed, in an attempt to gather information, many individuals use viruses, spyware, malware, and other threatening tools to gather sensitive and/or valuable information.

While many tools exist for avoiding potential threats in cybersecurity of electronic devices, conventional cybersecurity systems often fail to adequately address potential security issues. For example, conventional cybersecurity systems typically utilize dedicated diagnostic tools for identifying whether a personal computer is compliant with a known security standard. Conventional diagnostic tools, however, are limited to providing a report of settings or configurations on a device that are out of compliance with a known set of standards. The report is then generally provided to an information technology (IT) administrator who manually addresses issues identified by the report or, alternatively, utilizes a separate software tool to facilitate remediation of various issues identified by the diagnostic tool.

In addition to failing to enable effective diagnosis and remediation of potential security issues, conventional cybersecurity systems can be inflexible and computationally prohibitive. For example, conventional cybersecurity systems are often limited to scanning a device for compliance with a specific security standard (e.g., Center for Internet Security (CIS) standards, Standard Technical Implementation Guide (STIG) standards, Payment Card Industry (PCI) standards, and Health Insurance Portability and Accountability Act (HIPAA)). As a result, conventional systems may provide an effective tool for identifying potential security threats for a select group of devices or programs uniquely tailored to a particular security standard. However, conventional cybersecurity systems may fail to effectively identify potential security threats for other devices or programs not specifically tailored to the security standard. Furthermore, while a device may simply run different security checks based on multiple security standards, running comprehensive checks based on multiple standards can be expensive and can utilize significant computing resources.

These along with additional problems and issues exist with regard to conventional cybersecurity systems.

In addition to the background information obtained for this patent, NewsRx journalists also obtained the inventors summary information for this patent: Embodiments of the present disclosure provide benefits and/or solve one or more of the foregoing and other problems in the art with systems, methods and computer-readable media that enforce security policies on a client device (or other computing device). In particular, in one or more embodiments, the disclosed systems enforce security policies by performing operations that enable an agent on the client device to both scan and fix security issues. For example, the disclosed systems can enforce a security policy by performing an idempotent operation in which a check and a fix of a security policy are the same operation (e.g., a check operation is the fix operation). In this way, the systems described herein can effectively identify and remediate configuration settings of a client device out of compliance with security standards using a single software agent.

In addition, in one or more embodiments the disclosed systems provide a policy-driven approach to enforcing security policies applicable to a wider range of client devices and applications. Indeed, by providing a policy-driven approach to enforcing security policies, the disclosed systems can enable a client device to comply with multiple security standards while performing a fewer number of operations than conventional systems, thereby improving performance of the client device without sacrificing substantial processing resources. In addition, by enforcing security policies using a policy-driven approach, the disclosed systems provide more effective security across a wider range of client devices and applications for which different security standards may be better suited to address potential security issues.

Additional features and advantages of one or more embodiments of the present disclosure are outlined in the description which follows, and in part will be obvious from the description, or may be learned by the practice of such example embodiments.

The claims supplied by the inventors are:

1. A system comprising: at least one processor; and a computer-readable medium storing instructions thereon that, when executed by the at least one processor, cause a computing device to: maintain a plurality of security policies, the plurality of security policies including: a plurality of configuration states associated with configuration settings of a client device, the configuration settings referring to one or more settings of an application or operating system on the client device that grant or restrict access to one or more intended functionalities of the application or operating system; and mapping information associating the plurality of security policies to a plurality of security standards; receive a request to enforce a first security standard from the plurality of security standards; identify a first subset of security policies from the plurality of security policies having mapping information associated with the first security standard for enforcement on the client device, wherein enforcing the first security standard includes causing the client device to perform an operation to enforce a configuration state for a corresponding configuration setting defined by a security policy from the identified subset of security policies regardless of a current state of the configuration setting prior to receiving the request to implement the plurality of security policies on the client device; determine whether an exemption applies to at least one of the first subset of security policies; in response to determining that the exemption applies to the at least one of the first subset of security policies, bypass enforcement of the at least one of the first subset of security policies; and identify a second subset of security policies from the plurality of security policies having mapping information associated with a second security standard for enforcement on the client device.

2. The system of claim 1, wherein the operation to enforce the configuration state includes an idempotent operation in which a check and a fix of the security policy are the same operation.

3. The system of claim 1, wherein the instructions cause the computing device to: receive a report including information associated with enforcing at least one of the first or second subset of security policies on the client device; and generate a compliance report indicating a measure of compliance with at least one of the first or second security standard.

4. The system of claim 3, wherein generating the compliance report further includes: based on overlap between mapping information for the first subset of security policies and the mapping information associated with the second security standard, providing, within the compliance report, an indication of a second measure of compliance with the second security standard.

5. The system of claim 1, wherein the instructions cause the computing device to provide an option to request enforcement of the second security standard.

6. The system of claim 1, wherein enforcing the second security standard includes causing the client device to perform one or more operations to enforce one or more configuration states for one or more corresponding configuration settings defined by the second subset of security policies.

7. The system of claim 1, wherein the plurality of security standards includes two or more of Center for Internet Security (CIS) standards, Standard Technical Implementation Guide (STIG) standards, Payment Card Industry (PCI) standards, and Health Insurance Portability and Accountability Act (HIPAA) standards, and wherein the instructions further cause the computing device to: generate the mapping information for the plurality of security policies by mapping the plurality of configuration states associated with configuration settings of the client device to respective security standards from the plurality of security standards.

8. A computer-implemented method comprising: maintaining a plurality of security policies, the plurality of security policies including: a plurality of configuration states associated with configuration settings of a client device, the configuration settings referring to one or more settings of an application or operating system on the client device that grant or restrict access to one or more intended functionalities of the application or operating system; and mapping information associating the plurality of security policies to a plurality of security standards; receiving a request to enforce a first security standard from the plurality of security standards; identifying a first subset of security policies from the plurality of security policies having mapping information associated with the first security standard for enforcement on the client device, wherein enforcing the first security standard includes causing the client device to perform an operation to enforce a configuration state for a corresponding configuration setting defined by a security policy from the identified subset of security policies regardless of a current state of the configuration setting prior to receiving the request to implement the plurality of security policies on the client device; determining whether an exemption applies to at least one of the first subset of security policies; in response to determining that the exemption applies to the at least one of the first subset of security policies, bypassing enforcement of the at least one of the first subset of security policies; and identifying a second subset of security policies from the plurality of security policies having mapping information associated with a second security standard for enforcement on the client device.

9. The computer-implemented method of claim 8, further including: receiving a report including information associated with enforcing at least one of the first or second subset of security policies on the client device; and generating a compliance report indicating a measure of compliance with at least one of the first or second security standard.

10. The computer-implemented method of claim 9, wherein generating the compliance report further includes: based on overlap between mapping information for the first subset of security policies and the mapping information associated with the second security standard, providing, within the compliance report, an indication of a second measure of compliance with the second security standard.

11. The computer-implemented method of claim 8, wherein enforcing the second security standard includes causing the client device to perform one or more operations to enforce one or more configuration states for one or more corresponding configuration settings defined by the second subset of security policies.

12. A non-transitory computer-readable medium storing instructions thereon that, when executed by at least one processor, cause a computing device to: maintain a plurality of security policies, the plurality of security policies including: a plurality of configuration states associated with configuration settings of a client device, the configuration settings referring to one or more settings of an application or operating system on the client device that grant or restrict access to one or more intended functionalities of the application or operating system; and mapping information associating the plurality of security policies to a plurality of security standards; receive a request to enforce a first security standard from the plurality of security standards; identify a first subset of security policies from the plurality of security policies having mapping information associated with the first security standard for enforcement on the client device, wherein enforcing the first security standard includes causing the client device to perform an operation to enforce a configuration state for a corresponding configuration setting defined by a security policy from the identified subset of security policies regardless of a current state of the configuration setting prior to receiving the request to implement the plurality of security policies on the client device; determine whether an exemption applies to at least one of the first subset of security policies; in response to determining that the exemption applies to the at least one of the first subset of security policies, bypass enforcement of the at least one of the first subset of security policies; and identify a second subset of security policies from the plurality of security policies having mapping information associated with a second security standard for enforcement on the client device.

13. The non-transitory computer-readable medium of claim 12, further including instructions that, when executed by the at least one processor, cause the computing device to: receive a report including information associated with enforcing at least one of the first or second subset of security policies on the client device; and generate a compliance report indicating a measure of compliance with at least one of the first or second security standard.

14. The non-transitory computer-readable medium of claim 13, wherein generating the compliance report further includes: based on overlap between mapping information for the first subset of security policies and the mapping information associated with the second security standard, providing, within the compliance report, an indication of a second measure of compliance with the second security standard.

15. The non-transitory computer-readable medium of claim 12, wherein enforcing the second security standard includes causing the client device to perform one or more operations to enforce one or more configuration states for one or more corresponding configuration settings defined by the second subset of security policies.

URL and more information on this patent, see: Hatch, Thomas S. Scanning and remediating configuration settings of a device using a policy-driven approach. U.S. Patent Number 11310283, filed September 7, 2018, and published online on April 19, 2022. Patent URL: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=11310283.PN.&OS=PN/11310283RS=PN/11310283

(Our reports deliver fact-based news of research and discoveries from around the world.)

Read the original here:
Patent Issued for Scanning and remediating configuration settings of a device using a policy-driven approach (USPTO 11310283): VMware Inc. - Insurance...

Read More..