Emerson Expands Partnership with Nozomi Networks to Enhance Cyber Resiliency

Emerson has recently entered an agreement with Nozomi Networks to fulfil the rising need for OT cybersecurity services and solutions in the markets that both the companies serve. In accordance with the agreement, Emerson will make Nozomi Networks’ cutting-edge solutions for industrial control system cyber resilience and real-time operational visibility available to customers worldwide.

Following this integration, the OT & IoT security and visibility features from Nozomi Networks will be combined with Emerson’s DeltaV distributed control system (DCS), consulting, and professional services. The companies claim that by doing this, they will give comprehensive solutions that improve cybersecurity outcomes and lower the possibility of downtime brought on by cyberattacks or operational problems.

Alexandre Peixoto, Cybersecurity Business Director of Process Systems and Software Business, Emerson, said, “By teaming with Nozomi Networks, Emerson is enhancing our customers’ immediate access to OT network visibility, security and asset intelligence that integrates seamlessly with our DeltaV DCS and is fully supported by the Emerson Cybersecurity Services organization. Together, we are delivering the deepest possible industrial process expertise, a superior solution, and a proven track record serving the most demanding industrial customers.”

Utilizing the DeltaV suite of software and technologies, the new product can provide improved plant performance with intelligent control that is simple to use and maintain. Additionally, responsive to customer needs and goals, the DeltaV DCS can scale without adding more complexity.

In addition to optimizing overall business processes, vulnerability assessment tools will assist clients in identifying OT devices that can be used in cyberattacks. Utilizing both active and passive methods, Nozomi Networks’ asset discovery capabilities will be able to securely identify OT and IoT assets.

Edgard Capdevielle, CEO, Nozomi Networks, commented, “We are teaming with Emerson to address the growing cybersecurity concerns that are an everyday reality for modern automation processes. Industrial organizations rely on Emerson for its innovative technologies and solutions. This agreement furthers our joint commitment to help protect critical infrastructure around the world.”

Resecurity Launched its Cybersecurity Solutions on Microsoft Azure

Resecurity revealed that its award-winning cybersecurity threat intelligence and risk monitoring platform will be available on Microsoft’s Azure Marketplace. Microsoft’s Azure Marketplace is the most comprehensive marketplace on the planet, with over four million active users and subscribers and thousands of certified cloud applications and software.

Gene Yoo, CEO of Resecurity commented, “Enterprises continue to battle increasing cyber threats emerging from the Dark Web and ransomware groups targeting cloud services. Trusted partners like Microsoft Azure have enabled organizations to confidently bring in the cybersecurity expertise and solutions they need to protect their ecosystems. Resecurity is dedicated to helping organizations worldwide mitigate these risks with our reliable, scalable, and accessible cybersecurity and threat intelligence software.”

CEOs and business owners consider cyber risk as the top concern for enterprises. They are looking for additional assistance in securing and managing the evolving cyber threatscape. More importantly, they want to work with trusted vendors who offer scalable, secure solutions that can run on existing operating systems. Microsoft Azure is now used by nearly 70% of organizations worldwide for cloud services.

Resecurity’s software solutions will be easily accessible to the millions of Microsoft Azure customers who require comprehensive cybersecurity management and monitoring by joining the Microsoft Azure marketplace. The AI-powered solutions from Resecurity provide proactive alerts and comprehensive visibility of digital risks aimed at the enterprise ecosystem. Administrators can reduce potential blind spots and security gaps by quickly seeing in-depth analysis and specific artifacts obtained from the dark web, botnet activity, network intelligence, and high-quality threat intelligence data on the innovative platform.

Microsoft Azure users who integrate Resecurity into their cybersecurity strategy will benefit from the features like 24-hour security monitoring of cloud workloads and enterprise ecosystem.

Comprehensive risk assessment of the entire enterprise ecosystem (Dark Web, Compromised Accounts, Data Leaks, Network Hygiene, Cloud Security, etc.). A scalable software solution capable of monitoring any size digital footprint (Domains, Network Ranges, Cloud-based Nodes), AI-powered threat intelligence based on Rescurity’s Dark Web intelligence repositories, and cyber intelligence analysts deployed across all continents. Risk alerts with context and data-backed suggested actions to enable a proactive security strategy.

Deepwatch Introduced MXDR for Cybersecurity

Deepwatch launched managed extended detection and response (MXDR) service that provides an automated response to threats at the RSA Conference. Deepwatch protects enterprise networks and secures their digital economy. It has transformed the modern SOC through a cloud security platform backed by exceptional engineers, developers, and security experts.

Deepwatch’s MXDR service enhances detection capabilities by providing high-fidelity, contextualized alerts that enable rapid response and containment of cyber threats.

Wes Mullins, chief technology officer at Deepwatch stated, “Deepwatch MXDR automates response capabilities that help security operations teams contain threats and mitigate risk faster and more confidently than ever before. Automation delivers accelerated response times when powered by robust and accurate information on detected threats. High-fidelity alerts, enriched with information across endpoint, network, cloud, email, and identities correlated over a while, enables security teams to swiftly identify and contain threats before they disrupt business.”

Deepwatch MXDR reduces the risk of business-impacting security incidents by responding at machine speed, allowing analysts to complete the rest in human time. Deepwatch produces the most comprehensive high-fidelity alerts by leveraging the Deepwatch SecOps platform to collect, process, and analyze security telemetry from data sources.

Dave Gruber, Principal ESG Analyst stated, “Security leaders considering XDR should focus on security outcomes, including fast and efficient alert triage and prioritization, advanced threat detection, and rapid detection and response times, all aimed at supporting a growing attack surface. ESG research shows that half of the security teams prefer a fully managed XDR solution, with 52% of organizations believing that an MDR service provider can do a better job at threat detection and response than they can. Other MDR use cases reported in support of XDR deployments include the need for more expert security skills, staffing augmentation, and off-hours coverage.”

Deepwatch enhances threat detection while reducing alert overload by correlating related threat activity for a single entity and escalating only alerts that exceed the customer-defined risk threshold. Deepwatch MXDR automates response actions through advanced detection capabilities, reducing lag time and reliance on security personnel and cross-departmental resources.

Read more news:

OVO Energy and Noetic Cyber Collaborated for Critical Cybersecurity

OVO Energy and Noetic Cyber Collaborated for Critical Cybersecurity

OVO Energy has chosen Noetic Cyber as a solution partner to assist them in gaining greater visibility and insights into their current cybersecurity posture. OVO is deploying the Noetic platform to better understand and contextualize their cyber risk. OVO Energy, the UK’s third-largest energy supplier, has adopted a cloud-first approach enabled by implementing a culture of technical autonomy in which OVO teams select the cloud platforms and services best suited to their specific needs.

Paul Ayers, CEO, and co-founder at Noetic Cyber commented, “OVO is known as an innovator in the UK energy market in its business model and approach to technology. Our partnership with them showcases that innovation as we’re working together to address a fundamental cybersecurity challenge in finding and securing unknown and unprotected assets.”

OVO’s security team requires an automated way to understand their cybersecurity landscape across cloud platforms, SaaS applications, on-premises systems, and others.  The team adopted a data model that supports multiple business units and product teams, allowing them to maintain their current agility while also ensuring that central visibility of security control coverage and configuration. It will secure the organization and meet the regulatory requirements of the UK’s critical national infrastructure.

The collaboration with Noetic will provide OVO with the integration of Noetic’s existing security and IT management tools to ingest security data, creating a multi-dimensional map of all assets in the organization and their cyber relationships. OVO team can identify security coverage gaps, cloud service misconfigurations, and security control violations, all of which are prioritized based on business criticality and potential impact.

The Noetic platform integrates with OVO’s existing tooling for EDR, vulnerability management, device control, application security, network monitoring, cloud management, and more to continuously discover, inventory, and manage all assets in OVO’s environment.

The Novetic platform can assist OVO in identifying and correcting security coverage gaps in common cloud and endpoint use cases. By mapping business criticality, asset exposure, and exploitability to the existing vulnerability process, critical insights into patching and vulnerability management. Providing more detailed information and context on affected assets to the security operations team for incident investigation. Working with GRC to ensure that all aspects of the OVO business build and manage controls based on a common understanding of security data.

Read more articles:

thatDot Launched Novelty Detector for Cybersecurity

Flosum Trust Center by Flosum for Secured Salesforce Environments

Flosum Trust Center by Flosum is an integrated security solution that monitors, alerts, and scans for potential threats in a Salesforce environment. It enables businesses to follow SecOps and DevSecOps best practices while focusing on securing Salesforce environments from cybersecurity threats and data breaches. Flosum is an Enterprise Continuous Integration Delivery and Release Management Solution for Salesforce.

According to a report, by 2022, ninety percent of software development projects will claim to use DevSecOps practices, up from forty percent in 2019.

Girish Jashnani, CEO of Flosum commented, “Taking ownership of security within a third-party platform helps to manage risk, which is why we like to say that customers have a shared sense of responsibility for ensuring the security and trust of their Salesforce environment. Flosum’s new security automation solution assists customers in staying secure without requiring advanced security teams for implementation.”

Flosum Trust Center adds an adaptive security framework, existing customers can easily incorporate Trust Center into their solution, and new customers can implement Trust Center with or without Flosum’s Release Management platform. The Trust Center enables close collaboration between corporate security and Salesforce teams.

Flosum Trust Center will provide a full Security Event and Information Management (SEIM) solution that will enhance data masking, code security, and detailed audit trails to reduce audit costs, complementing existing Salesforce Privacy Center, Trust, and Shield solutions.

Flosum Trust Center features and benefits for Salesforce customers include Org monitoring, a consolidated view of all org settings, and best practices enforcement. Templates for security, users can create templates and apply them to multiple organizations. Salesforce teams will save time while collaborating with InfoSec to ensure that hardening rules are followed. Users can create security policies within these templates, and those policies will always be enforced.

Remediation allows clients to address changes or issues raised by their templates. These can be completed by moving the item to a solution branch. Security violations in DevOps allow the use of templates to indicate violations to the developer as they work, saving the company from any potential conflicts or issues. Audit trails, allow users to track all changes in detail, allowing them to prioritize their designated risk levels and keep the audit record for any length of time.  Data masking provides sample data to sandbox environments to ensure realistic tests without jeopardizing confidential data. Masking can be used on both data at rest and data in transit between organizations.

Read more articles:

API Security Should Be Your Priority in 2022

Fortinet Launched FortiNDR to Help Identify Cyberattacks

Fortinet FortiNDR is a new network detection and response offering that uses artificial intelligence and pragmatic analytics to enable faster incident detection and threat response. Advanced, persistent cybercrime is more vicious and volatile than ever before, with an attack surface that continues to grow with hybrid IT architectures and ongoing staff shortages due to the cybersecurity skills gap.

Legacy security solutions also face a daunting and time-consuming manual alert triage process that diverts valuable resources away from higher-priority tasks like threat mitigation. As cybercriminals improve their abilities, so should an organization’s security tool.

John Maddison, EVP of Products and CMO at Fortinet commented, “With the introduction of FortiNDR, we’re adding robust network detection and response to the Fortinet Security Fabric. Powered by purpose-built machine learning, deep learning, pragmatic analytics, and advanced AI capabilities, FortiNDR automatically detects and responds to abnormal network activity to thwart security incidents. Fortinet’s full suite of detection and response offerings feature native integration for a coordinated response to empower security teams to move from a reactive to a proactive security posture.”

FortiNDR also includes native integrations with the Fortinet Security Fabric as well as API integrations with third-party solutions for a coordinated response to discovered threats to reduce their impact. Quarantining devices generating anomalous traffic, enforcing with third-party devices via an API framework, initiating an orchestrated process guided by SOAR, and other common automation to speed response.

Robust Portfolio of Detection and Response Solutions from Fortinet’s existing detection and response portfolio includes managed detection and response (MDR), endpoint detection and response (EDR), and extended detection and response (XDR) solutions.

John Grady, Senior Analyst, Cybersecurity at ESG stated, “As enterprises struggle to coordinate threat detection and response across individual point products, the ability for them to leverage a complete set of integrated SOC capabilities as part of a cybersecurity platform promises significant improvement in the effectiveness and efficiency of discovering and mitigating threats. Fortinet’s portfolio of detection and response products such as FortiNDR, FortiEDR, FortiXDR, and more, which are all integrated as part of a platform, should be considered for any organization looking to improve their security operations function.”

Read more articles:

cyber threat intelligence!

QuSecure Introduced Post-Quantum Cybersecurity

QuSecure launched QuProtect an end-to-end PQC software-based solution tailored to protect encrypted communications and data with quantum resilience utilizing quantum secure channels. In an industry-first innovation, QuProtect enables organizations to use quantum resilient technology to prevent current cyberattacks alongside shielding networks from future post-quantum cyberthreats.

QuProtect provides quantum-resistant cryptography in real-time, on any device. It addresses the most vulnerable aspects of the digital ecosystem by adding zero-trust, next-generation post-quantum cryptography, and active defense into an all-around cybersecurity suite. QuProtect offers end-to-end quantum security as a service (QSaaS) architecture, the whole approach is built around the entire data lifecycle, including data storage, communication, and use.

Skip Sanzeri, QuSecure Founder and COO commented, “Enterprises are charged with providing high levels of data security. We are facing the largest computer upgrade cycle in history as all public-key cryptography globally needs to be upgraded to PQC. Our QuProtect solution provides organizations with a first-mover advantage as the industry accelerates toward a quantum future. QuProtect allows organizations and their clients to maintain the highest level of quantum-resilient security to address cyber threats with minimal disruption to existing systems.”

QuProtect secures quantum communications channels for any node on the network by utilizing National Institute of Standards and Technology (NIST) approved quantum algorithms. Its technology supports backward compatibility and can translate from PQC to standard Transport Layer Security (TLS), ensuring network interoperability. No other company combines QuSecure’s broad-based quantum and post-quantum technologies to provide secure, interoperable cybersecurity to organizations’ networks against quantum threats.

Laura Thomas, former CIA Chief of Base and currently VP of Corporate Strategy at ColdQuanta stated, “Quantum technologies have the potential to represent a platform shift, and platform shifts don’t come around that often. When they do, they bring enormous opportunity coupled with the power for intense disruption, in all areas, including national security and economic security. Organizations should be evaluating post-quantum encryption solutions now and mapping out the resources and timelines needed to deploy them on their networks. QuSecure is playing a key role in future-proofing our networks from current classical and future quantum attacks.”

Read more articles:

C2A Security and Stefanini to Bring Cybersecurity Solutions

Nozomi and Siemens Collaborated for Cybersecurity

Nozomi Networks and Siemens have expanded their collaboration by incorporating Nozomi Networks’ Guardian Remote Collector software into the Siemens Scalance LPE local processing engine, a hardware platform tailored to process data for edge and cloud applications in manufacturing environments. Customers can now deploy the leading OT & IoT continuous monitoring solution to their industrial networks with ease, thanks to the power and simplicity of the Siemens Scalance LPE hardware.

Maximilian Korff, Lead, Business Development for Scalance at Siemens commented, “This is the first distributed cybersecurity data collection and analysis software embedded in the Scalance LPE platform and is a vital part of our defense-in-depth concept for OT cybersecurity. This integration offers our customers a non-intrusive and powerful solution to detect threats in real-time and gain deeper visibility of their OT network.”

The Scalance LPE hosts a Docker containerized version of the Guardian Remote Collector, that brings local data collection, pre-processing, and analytics to operational technology deployments. It enables more efficient analysis and data aggregation by any centralized application, including Nozomi Networks Vantage cloud-hosted security platform, and provides an effective way to distribute processing power across large manufacturing operations.

Sid Snitkin, Vice-President of Cybersecurity Advisory Services at ARC Advisory Group stated, “This is a significant milestone for the Siemens partnership with Nozomi Networks. Embedding Nozomi Networks solutions into Siemens Scalance LPE eliminates integration cycles and gives users an efficient and reliable solution with cybersecurity capabilities baked in.”

The Scalance LPE solution delivers highly scalable continuous monitoring and intrusion detection to the network edge. Data is sent from the edge to the Nozomi Networks Remote Collector, which is hosted on the Scalance LPE, to monitor and analyze industrial network protocols for anomalous behavior and potential threats. This integration is unique and can collect traffic from parallel PROFIsafe production cells using the Siemens reference network architectures.

Chet Namboodri, Vice President of Business Development at Nozomi Networks stated, “Supporting the Scalance LPE with a docker container version of our Remote Collector will streamline deployment options for our customers and follows on our existing support for the Siemens Ruggedcom APE platform. Siemens helps customers get the most out of the Nozomi Networks platform at any scale for these critical manufacturing and industrial control customers.”

Read more articles:

Kroll and Armis Have Partnered for Cyber Resilience

Degreed and Cybrary formed partnership to provide integrated cybersecurity learning experiences

Cybrary, a cybersecurity employee development platform, and Degreed, the upskilling platform that connects learning to opportunities, formed a strategic partnership to produce a more comprehensive integrated learning process for cybersecurity experts devoted to cyber skill development.

The partnership will offer a smooth integration across the Cybrary and Degreed platforms, as well as give cybersecurity experts access to the most extensive and comprehensive collection of cybersecurity learning content presently available.

By making Cybrary’s entire library of Learning Paths available through Degreed Plans, learners can build their cybersecurity competencies through a balance of expert-led training and experiential learning. Cybrary will provide Degreed clients with a personalised consultation to assess each company’s unique training requirements as part of the deal.

Degreed clients can collaborate with Cybrary to develop a strategy that matches to organization’s strategic learning goals with precise knowledge, skills and abilities that are required for each job function, as well as identify workforce gaps.

“Partnering with a growing company like Degreed is a fantastic opportunity not only for us at Cybrary, but also our collective global community. The recent major breaches only adds fuel to the fire in meeting the demands for cybersecurity skills growth to combat ongoing threats. This partnership is another step in the right direction in supporting the frontline cybersecurity professional,” said Wesley Samuel III, Senior Vice President of Global Sales at Cybrary.

“The Degreed team is excited to partner with Cybrary to help solve the issues plaguing security training and cyber skill development. As more of our lives are digitized, cyber security skills have become increasingly sought after and this partnership provides Degreed clients and users with the resources they need to meet new demands,” said Rob Wellington, Head of Experience Partnerships at Degreed.

DRT Cyber, a VersaBank subsidiary based in Washington, DC, has signed an agreement with EzoTech to expand its Cybersecurity offering with AI Penetration Testing

VersaBank announced that DRT Cyber Inc. (“DRT Cyber”), its wholly-owned Washington, DC-based subsidiary, has signed a reseller and development agreement with EzoTech Inc. (“EzoTech”), the creators of the world’s first AI-powered Autonomous cybersecurity penetration testing platform. Penetration testing is the process of imitating a cyber cyberattack on a company’s assets and infrastructure in order to find both strengths and vulnerabilities in security systems and processes so that real-world cyber attacks can be avoided.

DRT Cyber will expand its solutions to present and new customers throughout the United States, Canada, and Europe with an AI-powered, automated, on-demand penetration testing platform under the reseller component of the arrangement. DRT Cyber will use EzoTech’s advanced AI Cyber Security technology and prowess to develop and rollout what it anticipates to be the world’s first AI-powered, automated, and continuous cyber security posture reporting platform for businesses of all types and sizes, as part of the development component of the agreement.

“Our agreement with EzoTech is a significant step forward in our strategy to expand DRT Cyber’s suite of cybersecurity offerings to complement existing services to our clients, as well as attract new clients, as we leverage our acquisition of Digital Boundary Group (DBG) last November. DRT Cyber’s acquisition of DBG provided a tremendous platform to build one of the pre-eminent cybersecurity businesses in North America; DRT Cyber boasts a client roster of national and multinational corporations, as well as government entities, including infrastructure assets, numerous police departments in the U.S., national retailers, and many others.  The addition of AI-powered, automated penetration testing, followed by a continuous, automated cyber security reporting solution, designed for organizations large and small, will significantly help expand DRT’s client roster, as the identification of cyber security vulnerabilities moves to the top of the priority list for IT departments globally,” said David Taylor, President and CEO of VersaBank and DRT Cyber.

“We are very pleased to be working with the team at DRT Cyber. Our fully autonomous, AI-driven penetration testing platform is licensed and deployable in a number of ways: as a stand-alone testing platform, as an autonomous test in combination with manual testing resources, and also ultimately as the engine for continuous reporting at the executive and working levels, to deliver a high level of confidence to organizations that their systems, networks and assets are well positioned to thwart cyber threats that are growing globally at an accelerating rate,” said Xristos Silaidis, President and CEO, EzoTech. 

“Businesses, governments and other entities are especially vulnerable to cybersecurity breaches due to a number of factors including, but not limited to, continuous changes in infrastructure, patch management issues and incorrect or stale security configurations, all of which can result in unforeseen security consequences that may not be readily apparent. In today’s IT environment, in which systems are being continuously deployed, updated or moved, continuous cyber security testing is essential to ensure that an organization’s IT systems are resistant to adversarial attacks 24/7, every week of the year. Our goal is to provide an automated and continuous cyber security reporting solution that not only is best-in-class for large organizations but also fits the IT budgets for the mass market of small-to-mid-size businesses and government entities,” said Gurpreet Sahota, Chief Operating Officer, DRT Cyber.