Commvault launched Metallic ThreatWise

Commvault  launched Metallic ThreatWise, an early warning system that proactively surfaces unknown and zero-day threats to minimize compromised data and business impact. According to Enterprise Strategy Group, only 12% of the IT directors polled expressed confidence in having the necessary tools and location-neutral security to equally secure data both on-premises and in the cloud. 

Jon Oltsik, Senior Principal Analyst and Fellow at Enterprise Strategy Group stated, “In surveying enterprise IT directors with direct knowledge and influence on their company’s data security strategies, the results we found were eye-opening. It is very clear that many IT teams do not have adequate tools in place to detect ransomware attacks on production environments early enough in the attack chain to neutralize stealthy cyber-attacks before they cause harm. Ransomware has revolved around encryption for a long time, but newer extortion techniques like exfiltration go beyond rapidly spreading malware, and data recovery alone cannot help if sensitive business data is leaked to the Dark Web.” 

ThreatWise from Commvault adds an early warning system that no other vendor in this market offers, further defining data security. It employs decoys to foresee threats in production environments, lure malicious actors into using fake resources and equip businesses with tools to protect data. In addition, Commvault is expanding the capabilities of its wider platform, which is already available, in terms of machine learning, critical threat detection, and security. 

Ranga Rajagopalan, Senior Vice President, Products, Commvault commented, “Data recovery is important, but alone it’s not enough. Just a few hours with an undetected bad actor in your systems can be catastrophic. By integrating ThreatWise into the Metallic SaaS portfolio, we provide customers with a proactive, early warning system that bolsters their zero-loss strategy by intercepting a threat before it impacts your business.” 

ThreatQuotient introduces New ThreatQ TDR Orchestrator Features!

ThreatQuotient announced a new version of ThreatQ TDR Orchestrator, which is known to be the industry’s first solution for a simplified, data-driven approach to security operations. The expanded automation, analysis, and reporting capabilities of ThreatQ TDR Orchestrator speed up threat detection and response across several platforms. 

Leon Ward, Vice President of Product Management at ThreatQuotient stated that “Leveraging automation to do the heavy lifting and cut through the noise is vital to helping cybersecurity teams thrive under pressure. ThreatQuotient continues to innovate in a way that drives meaningful operational benefits to customers. Many process-based SOAR platforms are designed such that only security engineers and analysts have the skills necessary to use them directly; making these traditional platforms hard to implement and maintain which drives higher costs over time. This ThreatQ TDR Orchestrator release reinforces the need for no-code solutions that empower operators to adapt to dynamic threat landscapes faster and focus their energy on security operations workflows that provide critical business context.” 

ThreatQuotient’s most recent study, whose complete release is scheduled for later in 2022, reveals indications that security automation adoption is progressing as 98% of businesses increase their budgets in this area. The study also shows that firms are more confident in automation itself, with over 88% of businesses expressing some level of confidence in the results of automation, up from only 59% the year before. However, 98% of respondents claim that implementation issues plagued them. ThreatQuotient has prioritized the development of ThreatQ TDR Orchestrator to enable more effective operations that can be directly measured by time savings and FTEs gained, improved risk management, and easier-to-use security automation solutions that are less expensive than traditional automation tools and learn over time. 

The latest version of ThreatQ TDR Orchestrator provides the following benefits: 

  1. Prioritize automation on the most important events/alerts 
  1. Playbooks are easier to maintain  
  1. Less training is required upfront  

Secureworks partners with Netskope and SCADAfence

Secureworks has announced that it will expand its alliances program into new solution areas. Threats are moving into crucial production environments and the service edge, so detection tools must advance as well. Through two new partners, Netskope and SCADAfence, Secureworks expands the scope of potential security vulnerabilities addressed by Secureworks Taegis XDR to include Secure Access Service Edge (SASE), Operational Technology (OT), and Industrial Control Systems (ICS). Better detection with a higher value is now more accessible to organizations than ever. 

Chris Bell of Secureworks commented, “We’re bringing together the best-of-breed detection and response capabilities across domains where we see the threat landscape most exposed to adversary attacks. As part of our mission to help secure human progress, we will continue to forge new alliances that can deliver technology innovation while incorporating new threat intelligence into the methods and intentions of the adversary.” 

Secureworks is focusing on Secureworks Taegis as a unifying XDR platform by announcing two new and rapidly expanding partnerships across new alliance domains. Taegis’ broad integration capabilities offer the best detection and quickest response times without vendor lock-in, and continuously expanding open technology makes it simple for customers to integrate with Taegis. 

As a pioneer in the Secure Access Service Edge (SASE) framework for converged networking and security, Netskope has developed a distinctive method for safeguarding data and people across devices and applications, inside and outside the conventional company network. Customers will be able to conduct all investigations and apply detectors using Secureworks Taegis thanks to the integration between Netskope and Secureworks, allowing for a more comprehensive view of threats and business risks and opening cyber environments to the edge. 

Secureworks extends Taegis XDR into the industrial environment in collaboration with SCADAfence, bringing OT intelligence into a unified view with all other security telemetries across the IT landscape. Security analysts now have more context about the threats they are looking into thanks to SCADAfence’s extension of market-leading insights, awareness, and asset discovery into a truly open XDR platform. 

Avast Introduces a New Ransomware Shield for Businesses!

Avast, a market leader in digital security and privacy, today introduces a new ransomware shield for companies, giving businesses an additional layer of defense against ransomware assaults. This will guarantee that organizations can secure their most vital documents and, most importantly, client data, with proactive protection that bars illegal access. As part of the Avast Essential, Premium, and Ultimate Business Security packages for businesses using Windows and MacOS, the new feature is now accessible and free of charge. 

Filip Hlinka, VP of Product, Avast Business, stated that “Small businesses are facing a growing threat from ransomware, with cybercriminals increasingly targeting smaller organizations to encrypt crucial business data and disrupt operations. The results can be devastating for small businesses that lack the financial and technical resources to rebound from such attacks. Avast’s antivirus has always offered consumers and business users powerful protection against cyber threats including ransomware, and Ransomware Shield offers a purpose-built, additional layer of protection which helps to secure businesses’ most crucial files against these highly damaging attacks.” 

While Web Shield, File Shield, and Behavior Shield, which are currently available to Avast clients, provide ransomware protection, Ransomware Shield complements these features to offer multi-layered security, guaranteeing businesses can continue to access their systems and data without interruption. For Ransomware Shield to function, files and folders must be protected from being changed, destroyed, or encrypted by unidentified apps. The most sensitive and vital information held by businesses is further protected by the ability of users to decide which programs have access to their files. Moreover, users have the option to modify the policy’s list of protected files and folders in the Avast Business Hub, where the new feature is immediately enabled by default. 

Read More : ActZero Announces the Release of Blueprint for Ransomware Defense

Anomali announced new updates to its Platform

Anomali announced quarterly updates to its platform to strengthen its customers and partners in profiling adversaries. The update enhances Anomali’s threat intelligence and extended detection and response (XDR) capabilities with new features, allowing enterprise organizations to stay one step ahead of adversaries and avoid business disruptions while optimizing security expenses. 

Anomali has been working on incorporating attack flows into The Anomali Platform. This release pushes the platform closer to an Attack Flow Library for Anomali ThreatStream, which will serve as a gateway for new Attack Flows that sequence cyberattack techniques. This capability will add new context to adversary behavior and assist security teams in profiling the adversary. It will also allow them to better protect the organization prior to an attack, detect an attack in real-time, and respond post-attack. 

Mark Alba, Chief Product Officer at Anomali stated, “Anomali’s August release offers new capabilities and enhancements for security operations teams struggling to identify not only who’s targeting them, but how and why they are being targeted.” 

CISOs and security professionals can leverage this predictive visual mapping to align attacks with potential gaps in their security posture in order to get ahead of the threat. In the macroeconomic environment, customers are looking for capabilities that will increase the impact of their existing investments. The new extensible framework to the platform will enable the automation of routine tasks. The first implementation in this release is available to automate enrichments in the investigation’s workbench. A drag-and-drop process for configuring a multi-stage enrichment task can be easily set up and run as needed, saving analysts time performing repetitive tasks. 

  • This platform release also includes support for MITRE ATT&CK Mobile & ICS: intelligence aggregation, contextualization, and analysis for Mobile and ICS attack surfaces to strengthen overall security posture.  
  • MITRE ATT&CK Enterprise v11 in Anomali Lens Scheduled retrospective search Aids the SOC in automating the correlation of historical events with newly available intelligence in order to generate reports and learn about other adversary behavior, threat actors, and TTPs. This allows CISOs to detect real-time threats in their local IT environment. 

Jon Oltsik, Senior Principal Analyst and Fellow, ESG Research stated, “ESG research found that 97% of security professionals believe that MITRE ATT&CK is important to their organization’s security operations strategy. Anomali’s commitment to integrating the MITRE ATT&CK Framework into its solutions and participating in the MITRE Engenuity Center for Threat Informed Defense can help security teams adopt the framework and better understand cyber adversaries.” 

Field Effect and RosettiStarr Collaborated for Cybersecurity

Field Effect has announced a strategic alliance with RosettiStarr, a global intelligence, investigations, and security services firm. This collaboration will provide best-in-class cyber security services to RosettiStarr’s customers worldwide, providing advanced protection against cyber threats.

RosettiStarr will leverage Field Effect’s managed detection and response solution (MDR), Covalence. Covalence is the only such tool built from the ground up to provide small and medium-sized businesses with comprehensive, sophisticated protection from a single platform. Its distinct strength is that it sees into every aspect of a company’s threat surface and aggregates data from multiple security events into simple, actionable steps, allowing quick and easy threat prevention and resolution.

Kip Edwards, Managing Director, and General Counsel of RosettiStarr commented, “Cyber security risks are embedded in everything we do online, and it is imperative that businesses enhance their security postures to meet the dynamic threat cyber criminals pose to critical systems and sensitive data. By combining Field Effect’s deep technical proficiency with RosettiStarr’s expertise in investigations, intelligence, and security, we can now deliver full-spectrum incident response services to businesses and law firms managing breaches along with a best-in-class security solution enabling our clients to monitor their threat surface and prevent attacks in the first place.”

RosettiStarr collaborated with Field Effect to create a first-of-its-kind instance of this powerful application, designed to assist institutional investors in implementing a cyber security standard across their portfolio investments while also providing real-time situational awareness of the threat surfaces of their holdings.

RosettiStarr will also collaborate with Field Effect to assist clients in responding to cyber incidents around the world, and it is now offering a comprehensive pre-transactional cyber maturity assessment for prospective clients’ investments. Field Effect and RosettiStarr’s collaboration reflects their ongoing commitment to strengthening the cyber resilience of people and organizations around the world.

Shri Kalyanasundaram, Chief Growth Officer at Field Effect, commented “We built Covalence to ensure organizations of all sizes have access to powerful cyber security protection. By joining forces with RosettiStarr, which is known for its world-class intelligence and security solutions, we’ve created a comprehensive suite of security services that will help protect their customers at the time they need it most.”

Trend Micro Launched VicOne for Vehicle Security

Trend Micro launched VicOne, a dedicated security solution for today’s and tomorrow’s electric vehicles and connected cars. With over 400 million connected cars expected to be on the road globally by 2025, there is plenty to entice threat actors. This innovation is the latest addition in Trend Micro’s long history of incubating successful business ideas to bring the best security offerings to market. Trend Micro is a global cybersecurity leader, providing a powerful set of advanced threat defense techniques optimized for environments such as AWS, Microsoft, and Google, as well as centralized visibility for better, faster detection and response.

Eva Chen, CEO, and co-founder of Trend Micro commented, “At Trend Micro, we are driven by the desire to secure the connected world. As we focus on this mission, it is imperative that we free ourselves to explore the various new business models that fit the new supply chain. With VicOne, we anticipated an urgent OEM need for enhanced automotive cybersecurity. Built with the best of Trend Micro innovation, it will offer tremendous value to the industry.”

Electric vehicles are becoming increasingly vulnerable to remote digital threats in a variety of new attack scenarios. OEMs and suppliers must implement comprehensive cybersecurity to safeguard their ecosystems and comply with the new United Nations regulation, WP.29 (UN – R155).

Soren Lau, General Manager of Asia and EMEA, IoT Partner Solutions at Microsoft stated, “Cybersecurity is an integral part of the electric vehicle (EV) ecosystem. Microsoft provides a comprehensive and open platform service with a zero-trust mindset. We look forward to working with Trend Micro and VicOne to enable end-to-end security solutions for telematics and EVs through Microsoft Cloud and AI features within Azure IoT services.”

To strengthen its commitment Trend Micro has joined the Scalable Open Architecture for Embedded Edge (SOAFEE) initiative, which aims to provide a cloud-native architecture for the creation of software-defined vehicles, and has forged a strategic partnership with MIH Consortium, an open EV platform alliance led by Foxconn. Trend Micro maintains a strong position in the vehicle supply chain as industry stakeholders invest more time and resources in cybersecurity compliance.

Dipti Vachani, SVP and GM, Automotive and IoT Line of Business, Arm said, “The software-defined vehicle is the future of the global automotive industry and a driving force in accelerating the development of innovative automotive technology applications. By joining other leaders across the automotive industry as a new member of SOAFEE, VicOne is bringing important expertise in security standards to help ensure a safer future for the automotive industry.”

Read more articles:

Deepwatch Introduced MXDR for Cybersecurity

Deepwatch Introduced MXDR for Cybersecurity

Deepwatch launched managed extended detection and response (MXDR) service that provides an automated response to threats at the RSA Conference. Deepwatch protects enterprise networks and secures their digital economy. It has transformed the modern SOC through a cloud security platform backed by exceptional engineers, developers, and security experts.

Deepwatch’s MXDR service enhances detection capabilities by providing high-fidelity, contextualized alerts that enable rapid response and containment of cyber threats.

Wes Mullins, chief technology officer at Deepwatch stated, “Deepwatch MXDR automates response capabilities that help security operations teams contain threats and mitigate risk faster and more confidently than ever before. Automation delivers accelerated response times when powered by robust and accurate information on detected threats. High-fidelity alerts, enriched with information across endpoint, network, cloud, email, and identities correlated over a while, enables security teams to swiftly identify and contain threats before they disrupt business.”

Deepwatch MXDR reduces the risk of business-impacting security incidents by responding at machine speed, allowing analysts to complete the rest in human time. Deepwatch produces the most comprehensive high-fidelity alerts by leveraging the Deepwatch SecOps platform to collect, process, and analyze security telemetry from data sources.

Dave Gruber, Principal ESG Analyst stated, “Security leaders considering XDR should focus on security outcomes, including fast and efficient alert triage and prioritization, advanced threat detection, and rapid detection and response times, all aimed at supporting a growing attack surface. ESG research shows that half of the security teams prefer a fully managed XDR solution, with 52% of organizations believing that an MDR service provider can do a better job at threat detection and response than they can. Other MDR use cases reported in support of XDR deployments include the need for more expert security skills, staffing augmentation, and off-hours coverage.”

Deepwatch enhances threat detection while reducing alert overload by correlating related threat activity for a single entity and escalating only alerts that exceed the customer-defined risk threshold. Deepwatch MXDR automates response actions through advanced detection capabilities, reducing lag time and reliance on security personnel and cross-departmental resources.

Read more news:

OVO Energy and Noetic Cyber Collaborated for Critical Cybersecurity

Mandiant and Interos to Provide Risk Management

Mandiant and Interos have announced a strategic partnership to provide advanced insights and analysis to help enterprises defend against cyber-attacks and other operational resilience threats. The collaborative partnership aims to bring to market new intelligence based on insights gleaned from the Interos Resilience Lab, as well as Interos’ SaaS platform and Mandiant’s frontline investigations and remediations of high-impact cyber-attacks around the world. Interos reinvents supply chain management and business relationships to reduce risk, avoid disruptions, and achieve superior enterprise adaptability.

According to the Mandiant M-Trends 2022 report, global supply chains remain an appealing target for threat actors looking to exploit trusted business-to-business relationships, as attacking the supply chain provides an opportunity to pivot from one supplier network into multiple customer networks at the same time. In fact, when the initial infection vector was identified, supply chain compromise accounted for 17 percent of Mandiant intrusions investigated in 2021, up from less than 1% in 2020.

Marshall Heilman, Chief Technology Officer of Mandiant commented, “Interos is focused on helping organizations ensure operational resilience; continuously delivering in-depth analysis on criticality for risk and risk management. Together with Interos, Mandiant will be able to proactively problem-solve with a company that is leading the way in ensuring organizations of all sizes understand key attack vectors across the supply chain, threat actors, and nation-state threats.”

The partnership announcement comes after the Cybersecurity and Infrastructure Security Agency (CISA) issued a recent alert warning of an increase in malicious cyber activity targeting managed service providers (MSPs). The advisory also advised MSPs to understand and manage supply chain risk proactively.

Nishant Gupta, Chief Technology Officer, Interos stated, “The CISA warning is more evidence that existing supply chain risk management systems were not designed for today’s complex risk environment. Our collaboration with Mandiant will provide multi-factor risk intelligence to help commercial and government organizations better protect targeted entities in their third-party relationships to insulate them from disruption, ransomware, and IP theft. We’re proud to partner with Mandiant to help leaders discover hidden business relationships and exposure to cyber vulnerabilities.”

Read more articles:

CyberCube and Kroll Launched CAERS

LookingGlass Suite For Cyber & Threat Intelligence

LookingGlass Cyber Solutions has announced the release of LookingGlass Suite, which simulates the adversary’s perspective to provide cybersecurity executives and their teams with a more holistic assessment of their organization’s cyber risk. The LookingGlass Suite includes three solutions for cyber threat intelligence and attack surface management: scoutPRIME, scoutINSPECT, and scoutTHREAT. LookingGlass Suite, which is based on intelligence about an organization’s internet-facing infrastructure, third-party supplier vulnerabilities and exposures, and active malicious threats, enables organizations to quickly identify relevant cybersecurity issues and reduce the time to act.

Bryan Ware, CEO, LookingGlass Cyber Solutions commented, “Current events continue to demonstrate that all organizations, particularly critical infrastructure, face increasing cybersecurity risks. The consequences and impacts on enterprises and their customers and stakeholders require a new generation of tools. Now more than ever, it is imperative for organizations to stay a step ahead of the adversary strategically, while also ensuring their security teams have the technical details and intelligence, they need to meet operational objectives. With LookingGlass Suite, cybersecurity executives can leverage the adversarial perspective to inform organizational risk models and operational teams can access more relevant threat intelligence analysis to anticipate threats, prevent attacks, and respond faster.”

Each solution adds value by providing attack surface insights or enriched threat intelligence to a broad range of cybersecurity personnel, from analysts and threat hunters to network, security, and information technology (IT) operations teams. When combined in the LookingGlass Suite, customers gain enhanced visibility with a map of their extended attack surface overlaid with threat intelligence. This provides security teams with a better understanding of how their organization appears to an adversary, how their attack surface evolves, and which risks are more likely to be exploited.

The LookingGlass Suite will provide a streamlined user experience, with a single point of entry leading to a comprehensive dashboard of the day’s most relevant cyber insights. Other significant features include more holistic risk scoring based on deeper reviews of vulnerabilities and exposures, expanded data sharing and integration capabilities based on cybersecurity data sharing standards (STIX 2.1) and executive reporting.

Cody Pierce, Chief Product Officer, LookingGlass stated, “Our priority is to make it easier for users to get the answers and insights they need faster. We understand that more data and tools are not the answer. It boils down to context. When used collectively, these solutions provide tremendous contextualization around the threats and exposures that are the highest priority. With this information, cybersecurity teams can make better decisions that lead to more secure, resilient outcomes for their organization.”

Read more articles:

Importance of Threat Intelligence in 2022!!