BigID announces data deletion capabilities!

BigID, a leading data intelligence platform that enables businesses to understand their enterprise data and take action for privacy, security, and governance, today unveiled native data deletion capabilities that make it simple for businesses to swiftly and effectively delete sensitive and personal data from all of their data stores, including Snowflake, AWS S3, mySQL, Google Drive, Teradata, and others. 

Additionally, customers may use this new application to reduce attack surfaces, enhance data security posture, and comply with a number of privacy regulations while taking the required precautions to safeguard their data. 

BigID CISO Tyler Young  said, “Data deletion is typically an ‘I’ll do that later’ project – but as data volume explodes, it’s more critical than ever to be able to delete the right data at the right time – from the right systems and storage. BigID’s data deletion app changes the game, enabling data lifecycle management in a single platform so that companies can minimize their attack surface, achieve compliance, and improve their data hygiene.” 

Benefits of BigID’s data deletion are as follows: 

-          Accelerate data minimization initiatives  
-          Reduce cloud data risk  
-          Fulfill data deletion requests  
-          Initiate data deletion  

With BigID’s data intelligence platform organizations can learn about their company data and take action for privacy, security, and governance. BigID is used by customers to proactively find, manage, safeguard, and maximize the value of their regulated, sensitive, and personal data across their entire data environment. 

Read More : Cyble Partners With VirusTotal for Cybersecurity

Delinea released DevOps Secrets Vault enhancements

Delinea released the most recent version of its high-speed vault for DevOps and DevSecOps teams, DevOps Secrets Vault. In an effort to speed up development and increase visibility, the newest Mac computers are now supported for development and automation for improved secret management usability.  

Jason Michell, SVP of Engineering at Delinea “The exponential growth of machine identities as applications are modernized and architected as micro-services continues to place organizations at increased risk. Delinea’s ongoing focus on making security seamless for developers is reflected in these recent enhancements, enabling them to use DevOps Secrets Vault to dynamically insert credentials in their code, in line with security best practices.” 

For developers using Macs, it offers expanded support with the addition of support for the M1 chip, developers writing code on the most recent Macs can now take advantage of the command line interface (CLI) and DSV Engine (an agent supporting database dynamic secrets) of DevOps Secrets Vault. Delinea continues to remove the friction that frequently occurs when securing sensitive secrets and credentials, particularly in hectic DevOps environments, by building on its focus on seamless usability. 

The friction between DevOps teams is constantly being reduced. Continuous usability and flexibility improvements are made to both the CLI and the graphical interface, enabling developers to work without interruption in their preferred interface with their preferred tools and assisting businesses in lowering the risk of credentials being compromised. 

In both interfaces, new features have been added, for improved Security Information and Event Management (SIEM) functionality support along with an approved ansible plugin for use with ansible automation Hub and additional authentication techniques. 

Elevate Security launched a new SaaS offering to its cyber risk intelligence capabilities

Elevate Security launched a new SaaS offering building on Elevate’s cyber risk intelligence capabilities to deliver risk assessments, visibility to company-wide internal cyber risk, and the ability to deliver risk-adjusted security controls at the individual worker level. Elevate offers a comprehensive user risk analysis that is based on millions of independent data points. 

The need for aggressive management of internal threats is now gaining prominence, even though many organizations have implemented external security measures. With the current spikes in ransomware, malware, and supply chain attacks making headlines, several recent research reports identify worker risk as the new primary reason behind cyberattacks. 

Robert Fly, CEO at Elevate stated, “The inspiration for Elevate’s unique approach grew out of our own frustration identifying and deterring high risk workers. Our customers are now benefiting across security operations, governance and risk management, insurance, and strategy. Today’s announcement helps further address growing customer demand with easy to implement out-of-the-box solutions tailored for specific situations and cyber maturity levels.” 

Elevate reduces workforce risk by integrating data feeds from different parts of the company and outside sources to generate a unique risk score for each employee, which works a lot like a credit score. 

An ever-evolving Human Risk Score is created by combining risk factors like employee susceptibility to phishing, sensitive data handling, safe browsing, and password management with demographics and other traits. 

Elevate’s Human Risk Score can influence every aspect of an organization’s security posture, from zero trust to data protection and more, thanks to its close integration with security controls. 

Controls can then be tailored to each individual’s risk level, ensuring that the entire workforce is productive while also safeguarding high-risk individuals, the organization, and itself from employee-predator attacks. 

The Elevate platform was developed to address unintentional user risk: 

  • predicts when and how attackers will target risky users by identifying them 
  • uses risk-based safety measures to keep them and the company safe 
  • automates giving managers and users personalized feedback 
  • The idea for Elevate’s distinctive approach originated from our own 

ThreatLocker Adds Network Access Control to Company’s Zero Trust Platform

ThreatLocker, a cybersecurity company that provides businesses and managed service providers (MSPs) with enterprise-level tools to protect endpoints, announced the release of ThreatLocker Network Access Control (NAC), which controls inbound traffic to endpoints to add a new layer of security to the company’s zero trust platform. 

Danny Jenkins, CEO of ThreatLocker, said “With remote work as the standard practice, the local network is no more. Companies need to have full visibility of the traffic going to their endpoints, as nation-state threat actors and everyday cybercriminals are hitting targets across every industry. This is a pivotal moment in the battle to stop attacks that have been launched on remotely accessible servers, including MSPs RMM servers. 

Customers can now configure network access to endpoints using global policies thanks to ThreatLocker’s introduction of NAC. Whether it’s a local server or a remote laptop, the solution provides visibility into all permitted and denied inbound traffic within a single audit. Like a typical firewall, policies can be created. A centralized view of endpoints is offered to clients by the cloud-managed system. 

Neal Juern from Juern Technology, a Texas-based MSP stated, “We now have the ability to take RMM servers off the general internet while dynamically allowing agents to connect from where they are without a VPN… This gives us peace of mind knowing that we are protected against an RMM vulnerability that could allow an attacker to use our tools to push ransomware to clients.” 

Box Upgrades Box Sign To Make Digital Transactions Convenient!

Box Inc., the industry-leading provider of content clouds, unveiled a new set of features for Box Sign, its built-in e-signature functionality. This decision was taken to encourage clients to transfer more of their transactions to the cloud. Through this, users can publish documents for electronic signature, update signature requests in flight, enhance the signer experience, and more using these features, which are already available. 

Box additionally declared that starting right now, Box Sign is accessible to all Box users at no additional charge. 

Diego Dugatkin, Chief Product Officer at Box stated, “The future of work is digital-first and paper-based processes hold companies back from reaching their full potential. Since entering the e-signature space, our north star has been to deliver all customers with a simple, secure, and cost-effective e-signature solution. Today, we take another big step towards achieving that goal by expanding Box Sign’s core capabilities so that customers can do more with The Box Content Cloud without added costs. We are just getting started within this space, and customers can expect to see even more innovation for Box Sign in the future.” 

Features of the new box sign 

Box Sign, a feature included in all Box plans, enables users to complete employee, customer, and partner transactions digitally and gives them access to e-signature capabilities. Box Sign is already being used by more than 500,000 Box users to speed up digital transactions, and this number will increase as new use cases are opened by improved Box Sign features. With the enhancements made today, users of Box Sign can now streamline high-volume business procedures for standardized documents including NDAs, event registrations, liability waivers, and more. Businesses can now use the Box Content Cloud to quickly and securely complete more of their signature-based business operations, thereby lowering their IT costs.  

Read More : CFBD and Resecurity Collaborate to Provide Cyber Threat Protection

Resecurity announced partnership with ECOMIL SAS

Resecurity announced a partnership with ECOMIL SAS to offer its AI-driven cybersecurity solutions and threat intelligence services in Colombia. ECOMIL SAS is a Colombian company headquartered in Bogotá and offers networking, cybersecurity, and IT management solutions to business and government clients there.

In Colombia, the shift to a digital economy is happening quickly, and since the pandemic, remote work has increased by 400%. Cyberattacks have become more dangerous because of the shift to a digital economy; they rose by 59% in just the first half of 2020.

Gene Yoo, CEO of Resecurity, Inc. commented, “We are thrilled to partner with ECOMIL and to join forces to deliver our solutions across all market verticals in Colombia.”

With the help of Resecurity’s cutting-edge cybersecurity solutions, businesses can automate the detection, evaluation, and prioritization of potential cyber threats while avoiding being targeted by organized cybercrime using cutting-edge attack methods.

The AI-driven platform enables administrators to quickly view in-depth analysis and specific artifacts obtained through the Dark Web, botnet activity, network intelligence, and high-quality threat intelligence, thereby reducing potential blind spots and security gaps.

Edgar Ernesto Hernandez, CEO of Ecomil SAS stated, “Partnership with Resecurity will positively impact on Colombian cybersecurity market and will enable the delivery of cutting-edge solutions to protect critical sectors of the economy.”

Apricorn Launches Market’s First 2TB Hardware-Encrypted Flash Key

Apricorn, the industry’s top producer of software-free, 256-bit AES XTS hardware-encrypted USB drives launched the USB 3.2 Gen 1 Aegis Secure Key 3 2TB encrypted flash key.  The new 2TB Aegis Secure Key 3 is the first hardware-encrypted flash key of this size and was created for businesses that need a lot of secured storage with a small footprint, continuing Apricorn’s long history of innovation. The Aegis Secure Key 3 currently offers eight capacity options, with prices ranging from $129.00 to $999.00 U.S.  

Kurt Markley, U.S. Managing Director, Apricorn said, “The Aegis Secure Key 3 line was designed to address security issues we identified in 2015 and that still plague organizations today. Most of those feature improvements have become standard in the market, including Forced Enrollment™, which we developed to force users to create their own PIN before they could use the device at all. We’ve consistently increased storage capacities for the Secure Key 3, which employs a mini SSD rather than flash memory, making the line bigger and faster than other hardware-encrypted flash keys. When it comes to tech – especially hardware – it’s rare for a product to remain at the top of its field for more than five years, much less seven. The Aegis Secure Key 3 has become Apricorn’s U2 spy plane.” 

The Aegis Secure Key 3 includes AegisWareTM as standard equipment, Apricorn’s proprietary firmware and feature set that was created to address the constantly changing security threats and commercial requirements for highly regulated industries like government, defense, finance, manufacturing, and healthcare. Apricorn’s USB 3.2 Gen 1 hardware-encrypted Secure Keys include additional security benefits like FIPS 140-2 Level 3 validated encryption module, on-the-fly 100% hardware-based encryption, and software-free setup and operation. Furthermore, it also has advantages like OS Agnostic completely cross-platform compatible, an onboard wear-resistant keypad for authentication, real-time 256-bit AES-XTS hardware encryption, and separate administrator and user modes. Not only these but it also carries additional advantages like forced-enrollment / user forced enrolment, programmable minimum PIN length, advanced configurations for enhanced security, rugged crush-resistant aluminum enclosure, Aegis Configurator™ compatibility and IP-68 validated against water and dust damage. 

Everbridge Travel Protector for Employee Safety

Everbridge has announced the complete integration of Travel Risk Management (TRM) and Critical Event Management into a single SaaS solution called Everbridge Travel Protector, which is complemented by Everbridge Assist, Powered by Anvil. 

Everbridge now provides organizations with an end-to-end, full-lifecycle solution to help them fulfill their Duty of Care/Protect Duty for out-of-office workers, field service workers, remote employees, and those who have returned to the office. 

Julie Deppe, Director of Product Management at Everbridge stated, “With the reality of the new hybrid workforce and upswing in business travel, Everbridge’s advanced Travel Risk Management features and services, now available, become even more important for fulfilling Duty of Care and building enterprise resilience. Customers seek one single pane of glass to view and manage critical events, mass notification, and travel risk and assistance services. Everbridge uniquely addresses this pressing customer need.” 

Everbridge Travel Protector extends the Everbridge CEM platform to provide businesses, healthcare, and government organizations with the functionality they need to keep their people safe wherever they go, including travel data unification, pre-trip travel advisories, and granular automated traveler alerting, and dynamic location awareness. 

These capabilities, when combined with global medical and security assistance provided by a 24/7 response center, assist organizations in developing standards that comply with the recently published ISO 31030 guidance. 

Travel risk managers and operators of Global Security Operations Centers (GSOCs) want to know where their travelers are or will be, to protect them if they are in the vicinity of a risk event. For complete travel itinerary knowledge, Everbridge presents integrated data connectors to numerous travel data sources. Organizations can now identify at-risk travelers and assess and communicate with them through mobile devices to ensure their safety. Everbridge has added a one-touch mobile push button option to Travel Protector, allowing traveling employees to access Everbridge Assist 24/7 global managed medical and security services. 

ColorTokens and Aligned Automation partnered to provide end-to-end solutions

ColorTokens has partnered with Aligned Automation to provide solutions for the journey to digital transformation along with the assurance of cybersecurity. This collaboration stems from the need for businesses to mitigate increasing risks as cyber threats continue to threaten individual privacy and business security. 

Nitin Ahuja, CEO, and Founder at Aligned Automation commented, “Our customers trust us with their sensitive data and security-compliant outcomes. ColorTokens is a natural extension of our solutions. With a smooth integration process, the platform further enhances the complete enforcement of security measures within weeks instead of months. We’re thrilled to bring this powerful combination to our customers.” 

Aligned Automation creates and implements end-to-end digital solutions across key functions via the Nerve Center, leveraging the power of data and digital technologies. In addition to empowering businesses with digital processes, the ColorTokens partnership provides visualizations in on-premises, multi-cloud, remote access, and Zero Trust security environments. 

Customers of Aligned Automation will now benefit from ColorTokens’ line of defense against ever-changing cyberattacks, lowering risk across the board. Clients benefit from a faster time-to-value because of the collaboration. The Zero Trust security platform protects adaptable solutions like the Nerve Center, which provides cloud applications for accessibility and decision-making in a global, always-on business environment. 

Rajesh Khazanchi, CEO and Co-Founder of ColorTokens stated, “Prioritizing security across all levels of connected data, from a customer’s data all the way to a supply chain’s management, is crucial. We’re excited that this partnership with Aligned Automation will now enable us to extend the benefit of Zero Trust to new markets through our solutions.” 

ColorTokens’ solutions simplify, accelerate, and automate security operations to defend against attacks on data centers, hybrid models, cloud-based applications, dynamic applications, endpoints, individual users, and devices, among other things. 

ActZero Announces the Release of Blueprint for Ransomware Defense

ActZero, a cybersecurity start-up providing ransomware defense, recently launched the Ransomware Task Force’s (RTF) Blueprint for Ransomware Defense.

In order to promote adoption, ActZero actively engages with its clients, partners, and prospects. The Blueprint offers a set of implementable ransomware precautions to fortify their IT infrastructures and is aimed at helping small- and medium-sized enterprises (SMEs) with limited cybersecurity knowledge.

The cybersecurity community was encouraged in the RTF’s 2021 report to “create a clear, practical methodology for ransomware mitigation, response, and recovery.” A number of significant public and private players in the cybersecurity sector joined together to form the Blueprint for Ransomware Defense Working Group. As a result, the Working Group created a set of suggested countermeasures against ransomware and other widespread cyberattacks. The safeguards were initially designed to offer “essential cyber hygiene” in order to help ward off broad, untargeted attacks.

To effectively prevent ransomware attacks, it’s important to be able to stop attackers who have gotten beyond security measures. For SMEs, establishing an MDR service is the practical approach to achieve this objective. Being a key member of the working group, ActZero is in a good position to assist SMEs in implementing the safeguards. Moreover, the Blueprint establishes the foundation for more sophisticated capabilities, such as the ability to identify and address threats that have eluded security mechanisms. By adding on the sophisticated threat hunting and AI-driven prevention and detection capabilities of its MDR service, ActZero can also complete its resilience endeavor and help SMEs against cyber-attacks.