HackNotice launched phishing capabilities to empower users

HackNotice has launched continuous phishing functionality to assist firms to achieve cybersecurity compliance by educating staff about phishing and social engineering attacks. HackNotice’s phishing assists individuals in understanding and recognizing the many forms of attacks that threat actors can use. Writing, sending, and reviewing phishing campaigns may be a time-consuming procedure for the security team, especially when pricey phishing platforms leave a lot to be desired. 

Steve Thomas, CEO of HackNotice commented, “Social engineering attacks are rampant, and this is after the fact that security awareness training and phish testing are mandatory programs people must enroll in at work. However, the problem is that these programs are compliance-focused instead of people-focused. 

Our new phishing capability not only helps companies get to compliance, but it also opens up the conversation about phishing and helps people to understand how phishing is tied to overall threat awareness.” 

HackNotice’s phishing can be implemented with the click of a mouse, enabling people to identify phishing emails and determine what measures to do if they receive them. While HackNotice currently assists employees in identifying dangerous conduct, increasing security awareness, and monitoring, measuring, and managing employee progress, the latest component assists businesses in developing a comprehensive strategy to battle cyber threats

Phishing is covered in the current service for clients who use HackNotice to defend their firm. The new feature includes dynamic phishing emails and landing sites, open and clicks tracking, and more dashboards and analytics to help you evaluate how your staff is progressing. 

Insight Enterprises expanded its Managed XDR

Insight Enterprises announced the expansion of its managed security service with new extended detection and response (XDR) capabilities to help enterprises modernize and strengthen their security posture without adding overhead for internal IT teams. 

Stephen Moss, senior vice president of managed services at Insight stated, “There’s no doubt that finding the right skills in security — like many other technology disciplines — is incredibly difficult today. Our clients are seeing a dramatic decrease in security fatigue and burnout through the automation that this service provides — building correlations in the background eliminates manual interventions and transforms reaction time drastically. Our clients are consuming a service that’s outcome-based while leaning on a full-spectrum security provider they can trust. This not only spans managed service but consulting and project services for an end-to-end experience.” 

The Insight Managed XDR service is part of managed IT services offered by Insight that simplify asset management, quicken issue resolution, cut down on operational costs, and free up in-house IT staff to concentrate on strategic initiatives. This allows CISOs and CIOs to source all their technology requirements from a single partner and extends Insight’s security architecture and overall IT modernization services. 

By giving 24/7 visibility into the entire IT environment and covering the entire digital estate, including endpoints, cloud, and data center infrastructure. Insight Managed XDR both lowers risk and streamlines security management by removing simple fixes for every attack surface. Utilizing analytics powered by AI and machine learning to identify threats and reducing the months-long process of discovering a security breach attempt to hours or even minutes. Providing automated orchestration and built-in orchestration for quick incident response and remediation. 

BigID announces data deletion capabilities!

BigID, a leading data intelligence platform that enables businesses to understand their enterprise data and take action for privacy, security, and governance, today unveiled native data deletion capabilities that make it simple for businesses to swiftly and effectively delete sensitive and personal data from all of their data stores, including Snowflake, AWS S3, mySQL, Google Drive, Teradata, and others. 

Additionally, customers may use this new application to reduce attack surfaces, enhance data security posture, and comply with a number of privacy regulations while taking the required precautions to safeguard their data. 

BigID CISO Tyler Young  said, “Data deletion is typically an ‘I’ll do that later’ project – but as data volume explodes, it’s more critical than ever to be able to delete the right data at the right time – from the right systems and storage. BigID’s data deletion app changes the game, enabling data lifecycle management in a single platform so that companies can minimize their attack surface, achieve compliance, and improve their data hygiene.” 

Benefits of BigID’s data deletion are as follows: 

-          Accelerate data minimization initiatives  
-          Reduce cloud data risk  
-          Fulfill data deletion requests  
-          Initiate data deletion  

With BigID’s data intelligence platform organizations can learn about their company data and take action for privacy, security, and governance. BigID is used by customers to proactively find, manage, safeguard, and maximize the value of their regulated, sensitive, and personal data across their entire data environment. 

Read More : Cyble Partners With VirusTotal for Cybersecurity

Delinea released DevOps Secrets Vault enhancements

Delinea released the most recent version of its high-speed vault for DevOps and DevSecOps teams, DevOps Secrets Vault. In an effort to speed up development and increase visibility, the newest Mac computers are now supported for development and automation for improved secret management usability.  

Jason Michell, SVP of Engineering at Delinea “The exponential growth of machine identities as applications are modernized and architected as micro-services continues to place organizations at increased risk. Delinea’s ongoing focus on making security seamless for developers is reflected in these recent enhancements, enabling them to use DevOps Secrets Vault to dynamically insert credentials in their code, in line with security best practices.” 

For developers using Macs, it offers expanded support with the addition of support for the M1 chip, developers writing code on the most recent Macs can now take advantage of the command line interface (CLI) and DSV Engine (an agent supporting database dynamic secrets) of DevOps Secrets Vault. Delinea continues to remove the friction that frequently occurs when securing sensitive secrets and credentials, particularly in hectic DevOps environments, by building on its focus on seamless usability. 

The friction between DevOps teams is constantly being reduced. Continuous usability and flexibility improvements are made to both the CLI and the graphical interface, enabling developers to work without interruption in their preferred interface with their preferred tools and assisting businesses in lowering the risk of credentials being compromised. 

In both interfaces, new features have been added, for improved Security Information and Event Management (SIEM) functionality support along with an approved ansible plugin for use with ansible automation Hub and additional authentication techniques. 

Authomize expanded its REST API framework

Authomize announced the expansion of its REST API framework to enable customers to build their own custom connectors to their cloud and homegrown applications and services in a couple of hours. With the help of Authomize’s Software-as-a-Service (SaaS) solution, businesses can automatically secure access rights across every cloud service they use, including IaaS, SaaS, and IAM solutions. 

Guy Katzir, Head of Product at Authomize stated, “Authomize’s exceedingly granular connectors allow us to provide in-depth visibility into the most complex IAM permission models, including users, groups, roles, access privileges, assets, and activity. Our ability to map and understand the hierarchy structures within assets and groups gives customers the fine-grained insights they need to apply the most effective identities and access security controls and perform the most thorough incident investigations. 

We are already seeing customers using the REST API to build integrations to Coupa, Workday, Zuora, Chef, NetSuite, and Tenable.io. and more. They are using these connectors to get the same high level of IAM permission modeling and depth of visibility value that we provide for our native connectors. Our new framework enables them to perform all functions they look to Authomize for, from running accurate streamlined User Access Reviews to enforcing security policies with continuous monitoring.” 

Authomize can ingest, normalize, and analyze identity and access data from any cloud, on-premises, or custom application or service by using native connectors, REST APIs, SCIM connectors, and a file uploader. Using this data as a foundation, Authomize can gain deep insights into the efficient access paths that would otherwise be hidden by the proliferation of IAM structures and siloed environments across multiple clouds. To enable users to connect more of their applications and services with the same level of granularity and coverage as the native connectors, Authomize has just released a new version of its API. 

Businesses can integrate Authomize with every component of their security infrastructure, including the top SIEMs, SOARs, and ITSMs, using the new REST API. 

Along with the recently released APIs, users can now take advantage of new webhook functionalities to automate access privilege revocation directly through Okta, send alerts to security orchestration tools like Microsoft Sentinel, and open tickets in ServiceNow and Jira, enhancing the value of the rest of their tooling ecosystem with Authomize’s identity and access data enrichment. 

Authomize has expanded its integrations by including Identity Providers (IdPs) OneLogin and JumpCloud, as well as Bamboo HR and Delinea’s Secret Server, which will enable them to track users between Secret Server and AWS, assisting clients in locating stale accounts and secrets. 

Read More : API Security Should Be Your Priority in 2022

Phosphorus partnered with Dewpoint to Expand Its xIoT Security Solutions

Phosphorus partnered with Dewpoint to provide value-added reseller (VAR) services for Phosphorus in the US. Dewpoint, an IT, and security solutions provider will jointly deliver a new generation of xIoT security solutions in the US to meet growing enterprise demand for xIoT attack surface management and remediation capabilities. 

Kal Gajera, Director of North America Channels at Phosphorus commented, “xIoT security is a critical need for today’s enterprises, and these risks are left unaddressed by traditional IT security solutions. We look forward to working with Dewpoint to help expand our US sales channels and bring the world’s most advanced xIoT security platform to more organizations.” 

The Extended Enterprise xIoT Security Platform from Phosphorus is an automated security platform that can provide xIoT Attack Surface Management, xIoT Hardening, and Remediation, and xIoT Detection and Response for the entire range of IoT, OT, and Network-connected devices, including both new and legacy devices. 

This enables big businesses to scale xIoT technologies (which can result in millions of devices per organization) without having to hire more staff to locate, maintain, and keep an eye on them. 

Phosphorus Cybersecurity® is xTended Security of ThingsTM platform created to protect the rapidly expanding and frequently unmonitored Things throughout the enterprise xIoT landscape. Its extended enterprise xIoT Security Platform offers attack surface management, hardening & remediation, and detection & response to extend enterprise xIoT security to all cyber-physical things in your enterprise environment. Phosphorus automates the remediation of the largest IoT, OT, and network device vulnerabilities, including unknown and inaccurate asset inventories, outdated firmware, default credentials, risky configurations, and out-of-date certificates. 

Commvault launched Metallic ThreatWise

Commvault  launched Metallic ThreatWise, an early warning system that proactively surfaces unknown and zero-day threats to minimize compromised data and business impact. According to Enterprise Strategy Group, only 12% of the IT directors polled expressed confidence in having the necessary tools and location-neutral security to equally secure data both on-premises and in the cloud. 

Jon Oltsik, Senior Principal Analyst and Fellow at Enterprise Strategy Group stated, “In surveying enterprise IT directors with direct knowledge and influence on their company’s data security strategies, the results we found were eye-opening. It is very clear that many IT teams do not have adequate tools in place to detect ransomware attacks on production environments early enough in the attack chain to neutralize stealthy cyber-attacks before they cause harm. Ransomware has revolved around encryption for a long time, but newer extortion techniques like exfiltration go beyond rapidly spreading malware, and data recovery alone cannot help if sensitive business data is leaked to the Dark Web.” 

ThreatWise from Commvault adds an early warning system that no other vendor in this market offers, further defining data security. It employs decoys to foresee threats in production environments, lure malicious actors into using fake resources and equip businesses with tools to protect data. In addition, Commvault is expanding the capabilities of its wider platform, which is already available, in terms of machine learning, critical threat detection, and security. 

Ranga Rajagopalan, Senior Vice President, Products, Commvault commented, “Data recovery is important, but alone it’s not enough. Just a few hours with an undetected bad actor in your systems can be catastrophic. By integrating ThreatWise into the Metallic SaaS portfolio, we provide customers with a proactive, early warning system that bolsters their zero-loss strategy by intercepting a threat before it impacts your business.” 

DartPoints launched an enhanced MDR product

DartPoints launched an updated managed detection and response (MDR) product. The product combines MDR, endpoint detection and response (EDR), extended detection and response (XDR), and security orchestration, automation, and response (SOAR) into one complete solution with support and monitoring by DartPoints experts. 

Brad Alexander, CTO for DartPoints “Executives and security leaders know they need a multi-layered cybersecurity strategy that combines MDR, EDR, SOAR, and XDR solutions, but increasingly, they don’t have the in-house resources to make that happen. Plus, with the hundreds of tools and providers on the market, analysis paralysis sets in. We are proud to help our clients by bringing these best-in-class security vendors and technologies together into one comprehensive, airtight solution.” 

The prevalence of ransomware and other cybersecurity incidents makes it more important than ever to have a solution that can quickly identify threats across endpoints, networks, clouds, and SaaS applications. 

The enhanced MDR offering from DartPoints addresses a number of flaws in traditional antivirus and security solutions, including the exorbitantly high number of alerts and false positives. The solution is designed for high-risk, compliance-sensitive verticals like finance, government, manufacturing, education, and healthcare. It offers advanced threat detection, continuous threat hunting, 24-hour monitoring, and investigations. 

The improved product will be especially helpful to organizations with compliance, standard, or framework requirements, those looking to purchase or renew cyber insurance, and those without their own security operations center. 

An average of 270 cyberattacks per company are expected in 2021, up 31% from the year before, according to a global survey of nearly 4,800 executives, as detailed in Accenture’s State of Cybersecurity Resilience 2021 report. Ransomware attacks, meanwhile, nearly doubled in 2021. According to IBM’s most recent Cost of a Data Breach Report, in 2022 the average cost of a data breach will reach a record high of $4.35 million. 

ThreatQuotient introduces New ThreatQ TDR Orchestrator Features!

ThreatQuotient announced a new version of ThreatQ TDR Orchestrator, which is known to be the industry’s first solution for a simplified, data-driven approach to security operations. The expanded automation, analysis, and reporting capabilities of ThreatQ TDR Orchestrator speed up threat detection and response across several platforms. 

Leon Ward, Vice President of Product Management at ThreatQuotient stated that “Leveraging automation to do the heavy lifting and cut through the noise is vital to helping cybersecurity teams thrive under pressure. ThreatQuotient continues to innovate in a way that drives meaningful operational benefits to customers. Many process-based SOAR platforms are designed such that only security engineers and analysts have the skills necessary to use them directly; making these traditional platforms hard to implement and maintain which drives higher costs over time. This ThreatQ TDR Orchestrator release reinforces the need for no-code solutions that empower operators to adapt to dynamic threat landscapes faster and focus their energy on security operations workflows that provide critical business context.” 

ThreatQuotient’s most recent study, whose complete release is scheduled for later in 2022, reveals indications that security automation adoption is progressing as 98% of businesses increase their budgets in this area. The study also shows that firms are more confident in automation itself, with over 88% of businesses expressing some level of confidence in the results of automation, up from only 59% the year before. However, 98% of respondents claim that implementation issues plagued them. ThreatQuotient has prioritized the development of ThreatQ TDR Orchestrator to enable more effective operations that can be directly measured by time savings and FTEs gained, improved risk management, and easier-to-use security automation solutions that are less expensive than traditional automation tools and learn over time. 

The latest version of ThreatQ TDR Orchestrator provides the following benefits: 

  1. Prioritize automation on the most important events/alerts 
  1. Playbooks are easier to maintain  
  1. Less training is required upfront  

iBASIS partners with jtendo to protect signaling networks

iBASIS  and jtendo have partnered to integrate the multi-protocol signaling firewall of jtendo to iBASIS Security iQ360, managed cloud-based security portfolio. To monitor, analyze, detect, and prevent security breaches, it is necessary to use advanced testing features and cross-protocol correlation due to the growth in network protocols (including those for 5G) and technologies, as well as roaming traffic. 

Piotr Szymański, CEO of jtendo stated, “We are very proud to partner with one of the largest international signaling, voice, and data networks and complement iBASIS’ 360-degree intelligence-based solution. Mobile operators are increasingly searching for threat management that continuously adapts to their ever-changing network landscape, offering a flexible managed solution hosted on the IPX network is an effective way to secure their signaling network as an ongoing process. We are always there to support our customers in keeping their network safe in all areas.” 

The strategic alliance brings together the global and managed cloud-based expertise of iBASIS with the security audit experience, in-depth technical knowledge of telco protocols, and cross-protocol correlation expertise of Jtendo. 

The iBASIS Security iQ360 platform gives MNOs process automation to identify security risks and address vulnerabilities. In-depth visibility, monitoring, and attack detection are the foundation of the solution, which also includes automatic rule updates for protection against continuously evolving threats. 

Guillaume Klein, iBASIS Vice President of Product Management expressed, “The growing threat trend around today’s telecom networks drives the need for innovative security management solutions that can adapt quickly to new threats. We are thrilled to collaborate with jtendo to achieve effective threat management and be able to leverage their unique auditing and multiprotocol expertise to raise the level of protection even further.” 

Read More : Cloud Security; concerns, and safety