Secure Delivery from Haystack Ensures Protection of Sensitive Data!

Haystack unveiled Secure Delivery, a feature that protects sensitive information from unattributed and unauthorized sharing and keeps internal information intact. The company offers four solutions including internal communications protected by Secure Delivery.  

Cameron Lindsay, CEO, and Co-Founder, Haystack,stated, “Taking an email out of context can be disastrous. Leaking company information can be even more damaging. Organizations can now rest assured they’ve gone the extra mile to prevent internal communications from being shared haphazardly. With Haystack, organizations can communicate more transparently and confidently with their internal teams and not worry that info can be copied/pasted. Our design also deters screenshots by digitally painting content with viewer-specific watermarks.” 

Every company has confidential information i.e., it cannot be distributed to the public, and henceforth engineers of Haystack made a system that needs authentication before specific content gets viewable. Haystack’s proprietary technology enables company management to get reassurance that their data, be it executive memos, fundraising announcements, financial documents, HR policy updates, or news about mergers and acquisitions cannot be shared outside approved channels. 

Secure Delivery also makes it virtually impossible for employees to share accidentally as they have designed sensitive communications for that. 

Secure Delivery from Haystack is an innovative platform that works as a hub where employees access important announcements, know more about the firm, and connect with their colleagues. Haystack got SOC 2 Type 2 & ISO 27001 compliance this year only, giving reassurance to hiring managers, and executives that confidential information including data, is nurtured with the utmost security and care. Co-Founder Haibo Zhao’s product thinking at Google and Snapchat inspired the security focus of Haystack. 

On average, around 98% of employees at Haystack’s early adopters are nerdwallet, Chime, and Novo that use Haystack every month for internal communication and knowledge management inside their offices. 

Read More: Cyble Partners With VirusTotal for Cybersecurity


11:11 Systems acquires Static1!

Static1, a leader in managed network and IT infrastructure development and services, has been acquired by 11:11 Systems, a provider of managed infrastructure solutions. Static1 creates, constructs, manages, and optimizes IT infrastructure, resulting in greater productivity, effectiveness, and security for its clients.

The changing dynamics of remote work and the increased demand for bandwidth and technology to enable wireless migration are major factors driving the connectivity market’s growth. Although most businesses lack the internal resources to manage these new, complex infrastructure requirements, IT leaders must ensure that applications and data are connected anywhere, at any time.

Brett Diamond, CEO, 11:11 Systems, said, “Feedback from customers has shown that there is a dearth of offerings that combine cloud, connectivity, and security in one platform. We are focused on providing the platform for these three core pillars while ensuring that our customers’ apps and data are always running, accessible, and protected. Static1 is a natural addition to our portfolio, particularly because of the team’s significant depth in connectivity. With this acquisition, we will strengthen our existing managed services and add entrenched industry expertise and relationships to our portfolio.”

Static1 is a market leader in highly specialized industries such as media, entertainment, pharmaceuticals, retail, financial services, and not-for-profits. Their offerings range from connectivity to security management to network, infrastructure, and SD-Wan technology. Static1’s team and technology will complement 11:11’s recent acquisitions of Unitas, Cleareon, iland, and Green Cloud Defense, all of which are market leaders in the cloud, connectivity, and security spaces.

Anthony Lobretto, president, and CTO, Static1, said, “11:11 and Static1 share a vision for addressing the most pressing issues businesses face. This exciting step forward benefits our customers with continued best-in-class support, greater uptime, reliability, and security, all while reaping the benefits of accessing the full spectrum of purpose-driven solutions 11:11 has to offer.”

Kingston IronKey Locker+ 50 safeguards sensitive data!

The Kingston IronKey Locker+ 50 (LP50) provides consumer-grade security with AES hardware encryption in XTS mode to defend against BadUSB with digitally-signed firmware as well as Brute Force password attacks, in contrast to other USB drives. It has a multi-password Admin / User option with Complex or Pass modes for added security.

With its small metal body, an integrated key loop, and optional USB to Cloud (by ClevX) feature, it is made with convenience in mind. The latter allows users to take and access their data from any location, including Google Drive, Microsoft OneDrive, Amazon Cloud Drive, Dropbox, and Box. The best part is that all the necessary software and security are already installed on the drive, so you won’t have to install anything.

Richard Kanadjian, encrypted business manager, Kingston, “We are excited to offer another great option for those looking to store their sensitive personal or business data with our IronKey Locker+ 50. LP50 has our most requested feature, dual passwords, along with a new Passphrase mode that will allow users to pick a password that is easier to remember.

Read More: Resecurity Launched its Cybersecurity Solutions on Microsoft Azure

CircleCI revealed new DevOps capabilities with server 3.1!

CircleCI revealed enhanced security and automation features for its self-hosted runners. The release of version 3.1, a significant server update that includes improvements to security, observability, and integrations, was announced by Circle Internet Services Inc., a continuous integration and delivery platform for DevOps teams.

The CircleCI runner on the server is one of the features added to server 3.1, giving DevOps teams the ability to expand their compute options to macOS and run distinctive builds on their own infrastructure more extensive backup and restore capabilities, including both local and cloud-based services, as well as the capacity to return server instances to an earlier backup.

CircleCI servers can now be made private by using a privately assigned internet protocol address for use with a load balancer, a virtual private network, or other secure network access tools.

Customers who use self-hosted runners can now benefit from CircleCI’s parallelism and test splitting features. The more tests a project has, the longer it will take to finish using a single compute resource. Developers and their teams can divide their tests and run them simultaneously in various parallel execution environments to shorten this time. Developers can save time and remain focused on creating the things that matter most by splitting tests intelligently and using parallelism.

Customers can use additional configured SSH keys for running processes on other services during job execution by using add SSH keys. Along with connecting to private networks, closely monitoring their operating systems, imposing limitations using static IP addresses, and other capabilities, they also have this.

Jim Rose, CircleCI, CEO stated, “Being able to move quickly and reliably is no longer ‘nice to have’ but core to the responsibilities of today’s engineering teams. CircleCI’s latest additions will make it easier for enterprise-level customers or those in highly regulated industries to have a deeper access to the most intelligent and performant CI/CD tooling on the market.”

Agita Labs Offers TrustForge On Microsoft Azure Cloud!

Agita Labs declared that the Microsoft Azure cloud now offers the TrustForge secure computation capability. TrustForge, which is based on Agita’s sequestered encryption technology, allows users to upload data to the cloud while maintaining complete control over who can view and process it. In order to protect them from hackers, programmers, and IT personnel, the data and its decryption keys are always encrypted.

Todd Austin, CEO and co-founder of Agita Labs said, “Trying to find and fix every last vulnerability is a losing battle–-the code is too complex and the attackers are too clever. TrustForge tips the balance of power from the attacker to the defender by keeping data always encrypted and accessible only by a provably secure cryptographic enclave deployed in the cloud. Even if the system is hacked, data stays secure.”

Austin explains that the underlying idea of TrustForge—computing on encrypted data—is comparable to fully homomorphic encryption (FHE), which processes encrypted data using intricate mathematical equations without disclosing its contents. TrustForge, however, is unique in that it secures data without the use of mathematics by using specialised hardware. As a result, its computing overhead is thousands of times lower, and it avoids the cumbersome programming constraints of FHE.

 Alex Kisil, Agita Labs’ director of engineering said, “Our TrustForge secure computation framework was designed with DevOps programmers in mind. “We can quickly deploy TrustForge to solve specific data privacy needs, stop data breaches, and give users and their customer’s peace of mind when sharing sensitive data,”

Cloud-based processing is now possible for data types that were previously too risky to entrust to the cloud thanks to the technology’s high security, low computing overhead, and ease of deployment. You can now upload applications to the cloud for always-secure and auditable sharing, including medical EMR data, financial data, private machine learning and recommendation, privatized surveillance, and genomics information.

NXM Labs introduces the NXM Autonomous Security platform!

NXM Labs a pioneer in advanced cybersecurity software for smart devices which protects space infrastructure and IoT devices from cyberattacks introduced the NXM Autonomous Security platform. NXM has successfully demonstrated the capability of its cutting-edge technology to provide automatic protection of future Mars rowing machines and recovery from cyber-attacks through tests conducted in collaboration with Jet Propulsion Laboratory (JPL) and California Institute of Technology (Caltech). Caltech manages the Jet Propulsion Laboratory on behalf of the National Aeronautics and Space Administration (NASA).

Lt. General Harry D. Raduege, Jr., USAF (Ret), former Director, Defense Information Systems Agency, and CIO for the North American Aerospace Defense Command and U.S. Space Command commented, “NXM’s technology is game-changing. “NXM provides a new layer of cybersecurity that enables unified command and control, as well as data interoperability, providing an unprecedented capability that we have long sought but until now wasn’t possible.” Lt. General Raduege serves as an advisor to NXM.

JPL created the Athena test rover as part of NASA’s High Performance Spaceflight Computing (HPSC) programme, which aims to develop new computing technologies with far greater capabilities than current spaceflight computers. JPL engineers used the rover’s off-the-shelf NVIDIA Jetson edge AI platform’s advanced computing power to create innovative, machine learning-based applications for future Mars rovers. This includes artificial intelligence software that recognises objects of scientific interest as a vehicle travel through the Martian terrain, using vision-based navigation and path planning software to greatly extend the driving range of energy-limited rovers.

Scott Rankine, NXM’s President and Co-founder stated, “We’re thrilled to have collaborated with NASA JPL to show how our security can protect critical assets in space as well as here on Earth. Our unique zero-trust and zero-touch security software is chip and cloud agnostic, enabling device manufacturers and their component suppliers to easily and cost-effectively develop the industry’s most trustworthy products that can be deployed rapidly and remain secure for their entire operating lifetime.”

SaaS- Software as a Service!

Software as a service (SaaS) is a cloud-based software delivery model in which the cloud provider develops and maintains cloud application software, offers automatic software updates, and makes software available to customers on a pay-as-you-go basis via the internet. All hardware and traditional software, including middleware, application software, and security, are managed by the public cloud provider. As a result, SaaS customers can significantly reduce costs, deploy, scale, and upgrade business solutions faster than they could with on-premises systems and software, and predict ownership costs with improved efficiency.

What exactly is a software as a service?

The cloud delivery model is used for SaaS. A software provider will either host the application and associated data on its own servers, databases, networking, and computing resources, or an ISV will contract with a cloud provider to host the application in the provider’s data center. Any device with a network connection will be able to access the application. Web browsers are typically used to access SaaS applications.

Significance of SAAS

In today’s scenario, web-based software is adaptable enough to be customized for specific business needs as well as for individual users. Customers can modify the user interface (UI) to alter the program’s appearance and feel as well as components, like data fields, to change the data that is displayed. A few business process features can also be modified on and off at will.

Users can frequently customize their own personal workspace, such as a dashboard or task list, to display only the information they need to see and optimize their individual work styles. Even though both on-premises and SaaS systems can now be completely customized for each client, cloud-based software still offers a lot more flexibility and agility for the average business.

  • Access to innovations and rapid application development

Businesses want to utilize the most recent capabilities because innovation is so important in the digital age. Cloud-based SaaS accelerates innovation cycles and provides faster access to the most recent innovations and applications. In contrast, because of the longer development cycles typical of on-premises solutions and applications, the on-premises in-the-cloud SaaS model necessitates waiting for innovations.

  • SaaS business processes that are connected

A SaaS solution is required by organizations to support cloud-based processes such as procure-to-pay or order-to-cash without requiring costly integrations or complex management. Modern SaaS suites are built on a single, standards-based platform that includes a unified enterprise-wide data model, a unified user experience (including mobile and social), shared security levels, synchronized release schedules, and more.

This growth is anticipated to be aided by future SaaS innovation in the SaaS solutions themselves, including:

Artificial intelligence (AI) solutions are becoming more widely used, and it is anticipated that they will be incorporated into all enterprise cloud applications soon. Artificial intelligence will power adaptive intelligence solutions, allowing back-office and front-office applications to learn and adapt to user data and behaviour.

Autonomous IT management, artificial intelligence, and machine learning will all play important roles in enabling more autonomous, less reliant management of cloud applications and cloud infrastructure. Aside from AI and machine learning, there is a new set of adaptive intelligent technologies driving change in all SaaS applications. Among them were chatbots, virtual reality, augmented reality, blockchain, IoT, and digital assistants. For forward-thinking providers to expand their SaaS offerings, each of these technologies is becoming more and more important.

Industry Organizations continue to be driven by depth and horizontal connectedness in SaaS solutions or vertical cloud applications. While SaaS was originally designed to provide quick vertical solutions to a single department, businesses are increasingly requiring and expecting cross-business visibility. Expect more vertical depth from providers offering cross-business suites, as well as more APIs and turnkey integrations for hybrid cloud solutions, as applications continue to evolve.

Crossword Cybersecurity launches a new Supply Chain Cyber practice!

Crossword Cybersecurity, a cybersecurity solutions provider focused on cyber strategy and risk, has announced the establishment of a new integrated Supply Chain Cyber practise.

In response to client demand and a significant increase in supply chain cyber threat levels, the integrated practise offers a set of controls, processes, and tools, as well as a variety of managed services, advice, and training, to significantly reduce the risk of direct cyber-attacks as well as threats via third parties across a company’s supply chain.

By providing an end-to-end solution, Crossword’s Supply Chain Cyber approach is dedicated to meeting any organization’s cybersecurity and supply chain resilience obligations.

Crossword’s Supply Chain Cyber solution provides a group of cybersecurity industry experts committed to defining and delivering best practices in managing risk. It also offers comprehensive and adaptable supply chain cybersecurity Standard Operating Model that defines the processes, techniques, and structures required to manage supply chain assurance, compliance, and risk across all industries.

Rizikon Assurance, a SaaS-based, automated platform for managing risk, compliance, and supply chain strategy, policy, and operations, has been updated. The supplier provides low-cost cyber audits and security testing. Consulting services include supply chain cyber benchmarking, maturity assessments, advisory consulting, and training. Supply chain cyber assurance, compliance, and risk management services in one package.

Stuart Jubb, Group Managing Director at Crossword Cybersecurity Plc, commented: “A whole new operating model and mindset is required to properly address supply chain cyber risks and attacks. Looking only inwards and relying on internally focused controls, systems and thinking is not enough to protect organisations today. Crossword’s Supply Chain Cyber practice addresses the severity and fast-growing nature of risks present in supply chains. It gives our customers the tools and processes to securely and cost effectively manage these risks, benefiting not only the customer, but all members of their supply chain. The objective is to minimise collective risk and ensure cost-effective governance and adherence to regulations across all industries.”

Airiam introduces AirProducts!

Airiam introduces AirProducts to protect small and medium-sized businesses from cyberattacks.

Ohad Jehassi, Airiam’s CEO said, “Ransomware is on the rise, and cybercrime is growing more sophisticated. Fifty percent of companies now report being targeted by a cyberattack at least once a week, and the risk to SMEs is substantial. SMEs don’t have the same resources as large enterprises, and they’re far less equipped to deal with cybercriminals. They prefer to work with one vendor, but most vendors don’t offer everything they need for enterprise-level protection. That’s why we’ve built a national cybersecurity-focused MSP with a suite of products designed to cover all their cybersecurity and managed IT needs, even offering a $2 million ransomware warranty.”

Airiam’s AirProducts and services are flexible enough to meet the needs of expanding SMEs. The services can be combined to provide total infrastructure management. AirScapeTM includes everything a user requires for MSP and MSSP. AirAssureTM is a cybersecurity insurance toolkit designed to help businesses stay compliant. They also provide expert IT assistance in addition to typical Tier 1 help desk requests. Airiam’s highly experienced DevOps talent is available through AirAssistTM when customers require Tier 2 or 3 engineering for complex situations.

Airiam’s flagship product, AirGuard, offers improved cybersecurity as well as managed detection and response (MDR), identity and access management (IAM), Zero Belief, and multi-factor authentication (MFA) for a flat monthly fee. AirGapd another product by Airiam provides cloud backup and continuity options that are inaccessible to risk actors in order to make infrastructures ransomware resilient and disaster restoration options optimized to eliminate ransom funds, data loss, and business interruption. Airiam’s AirAudit keeps prospects one step ahead of attackers by conducting in-depth discovery and penetration testing.

Airiam’s AirCTRL provides full managed service provider (MSP) proactive management and assistance for networks, servers, and workstations. AirMonitor provides IT Monitoring with a remote monitoring and administration (RMM) toolkit that allows MSPs to perform techniques remotely. AirMonitor searches for security flaws after performing routine maintenance to ensure that networks run smoothly.

Art Ocain, Airiam’s vice president of incident response commented that, “Our AirProducts provide peace of mind and the robust protection formerly afforded only to large enterprises. As cybercrime evolves, it’s critical to stay a step ahead of the threat actors. Airiam is here to ensure our customers can operate their businesses without costly interruptions from cybercrime.”

Peer Software Collaborated with Pulsar Security!

Peer Software and Pulsar Security have announced a strategic alliance. Peer Software will use Pulsar Security’s team of cyber security experts to continuously monitor and analyze emerging and evolving ransomware and malware attack patterns on unstructured data as part of the alliance. These attack patterns will be leveraged to enable an additional layer of cyber security detection and response by PeerGFS.

PeerGFS is an enterprise-class software solution that streamlines the deployment of a contemporary distributed file system across multi-site, on-premises, and cloud storage. These capabilities will improve PeerGFS’s Malicious Event Detection (MED) feature.

Duane Laflotte, CTO at Pulsar Security stated, “Each ransomware and malware attack are encoded to infiltrate and propagate through a storage system in a unique manner that gives it a digital fingerprint. By understanding the unique behavior patterns of ransomware and malware attacks and matching these against the real-time file event streams that PeerGFS collects across the distributed file system, Peer can now empower its customers with an additional layer of fast and efficient cyber security monitoring. We are excited to be working with Peer Software on this unique capability.”

Through additional services like penetration testing, vulnerability assessments, dark web assessments, phishing simulations, red teaming, and wireless intrusion prevention, Pulsar Security and Peer Software will collaborate to educate and inform enterprise customers about new trends in cyber security and how to fortify their systems against attacks.

Jimmy Tam, CEO of Peer Software commented, “Ransomware attacks have become so common that almost every storage infrastructure architecture plan now also requires a cyber security discussion. “But whereas other storage-based ransomware protection strategies have focused mainly on the recovery from an attack, Peer Software’s goal in working with Pulsar Security is to prioritize the early detection of an attack and limit the spread to minimize damage, speed recovery, and keep data continuously available for the business.”