BigID announces data deletion capabilities!

BigID, a leading data intelligence platform that enables businesses to understand their enterprise data and take action for privacy, security, and governance, today unveiled native data deletion capabilities that make it simple for businesses to swiftly and effectively delete sensitive and personal data from all of their data stores, including Snowflake, AWS S3, mySQL, Google Drive, Teradata, and others. 

Additionally, customers may use this new application to reduce attack surfaces, enhance data security posture, and comply with a number of privacy regulations while taking the required precautions to safeguard their data. 

BigID CISO Tyler Young  said, “Data deletion is typically an ‘I’ll do that later’ project – but as data volume explodes, it’s more critical than ever to be able to delete the right data at the right time – from the right systems and storage. BigID’s data deletion app changes the game, enabling data lifecycle management in a single platform so that companies can minimize their attack surface, achieve compliance, and improve their data hygiene.” 

Benefits of BigID’s data deletion are as follows: 

-          Accelerate data minimization initiatives  
-          Reduce cloud data risk  
-          Fulfill data deletion requests  
-          Initiate data deletion  

With BigID’s data intelligence platform organizations can learn about their company data and take action for privacy, security, and governance. BigID is used by customers to proactively find, manage, safeguard, and maximize the value of their regulated, sensitive, and personal data across their entire data environment. 

Read More : Cyble Partners With VirusTotal for Cybersecurity

Delinea released DevOps Secrets Vault enhancements

Delinea released the most recent version of its high-speed vault for DevOps and DevSecOps teams, DevOps Secrets Vault. In an effort to speed up development and increase visibility, the newest Mac computers are now supported for development and automation for improved secret management usability.  

Jason Michell, SVP of Engineering at Delinea “The exponential growth of machine identities as applications are modernized and architected as micro-services continues to place organizations at increased risk. Delinea’s ongoing focus on making security seamless for developers is reflected in these recent enhancements, enabling them to use DevOps Secrets Vault to dynamically insert credentials in their code, in line with security best practices.” 

For developers using Macs, it offers expanded support with the addition of support for the M1 chip, developers writing code on the most recent Macs can now take advantage of the command line interface (CLI) and DSV Engine (an agent supporting database dynamic secrets) of DevOps Secrets Vault. Delinea continues to remove the friction that frequently occurs when securing sensitive secrets and credentials, particularly in hectic DevOps environments, by building on its focus on seamless usability. 

The friction between DevOps teams is constantly being reduced. Continuous usability and flexibility improvements are made to both the CLI and the graphical interface, enabling developers to work without interruption in their preferred interface with their preferred tools and assisting businesses in lowering the risk of credentials being compromised. 

In both interfaces, new features have been added, for improved Security Information and Event Management (SIEM) functionality support along with an approved ansible plugin for use with ansible automation Hub and additional authentication techniques. 

Elevate Security launched a new SaaS offering to its cyber risk intelligence capabilities

Elevate Security launched a new SaaS offering building on Elevate’s cyber risk intelligence capabilities to deliver risk assessments, visibility to company-wide internal cyber risk, and the ability to deliver risk-adjusted security controls at the individual worker level. Elevate offers a comprehensive user risk analysis that is based on millions of independent data points. 

The need for aggressive management of internal threats is now gaining prominence, even though many organizations have implemented external security measures. With the current spikes in ransomware, malware, and supply chain attacks making headlines, several recent research reports identify worker risk as the new primary reason behind cyberattacks. 

Robert Fly, CEO at Elevate stated, “The inspiration for Elevate’s unique approach grew out of our own frustration identifying and deterring high risk workers. Our customers are now benefiting across security operations, governance and risk management, insurance, and strategy. Today’s announcement helps further address growing customer demand with easy to implement out-of-the-box solutions tailored for specific situations and cyber maturity levels.” 

Elevate reduces workforce risk by integrating data feeds from different parts of the company and outside sources to generate a unique risk score for each employee, which works a lot like a credit score. 

An ever-evolving Human Risk Score is created by combining risk factors like employee susceptibility to phishing, sensitive data handling, safe browsing, and password management with demographics and other traits. 

Elevate’s Human Risk Score can influence every aspect of an organization’s security posture, from zero trust to data protection and more, thanks to its close integration with security controls. 

Controls can then be tailored to each individual’s risk level, ensuring that the entire workforce is productive while also safeguarding high-risk individuals, the organization, and itself from employee-predator attacks. 

The Elevate platform was developed to address unintentional user risk: 

  • predicts when and how attackers will target risky users by identifying them 
  • uses risk-based safety measures to keep them and the company safe 
  • automates giving managers and users personalized feedback 
  • The idea for Elevate’s distinctive approach originated from our own 

ThreatLocker Adds Network Access Control to Company’s Zero Trust Platform

ThreatLocker, a cybersecurity company that provides businesses and managed service providers (MSPs) with enterprise-level tools to protect endpoints, announced the release of ThreatLocker Network Access Control (NAC), which controls inbound traffic to endpoints to add a new layer of security to the company’s zero trust platform. 

Danny Jenkins, CEO of ThreatLocker, said “With remote work as the standard practice, the local network is no more. Companies need to have full visibility of the traffic going to their endpoints, as nation-state threat actors and everyday cybercriminals are hitting targets across every industry. This is a pivotal moment in the battle to stop attacks that have been launched on remotely accessible servers, including MSPs RMM servers. 

Customers can now configure network access to endpoints using global policies thanks to ThreatLocker’s introduction of NAC. Whether it’s a local server or a remote laptop, the solution provides visibility into all permitted and denied inbound traffic within a single audit. Like a typical firewall, policies can be created. A centralized view of endpoints is offered to clients by the cloud-managed system. 

Neal Juern from Juern Technology, a Texas-based MSP stated, “We now have the ability to take RMM servers off the general internet while dynamically allowing agents to connect from where they are without a VPN… This gives us peace of mind knowing that we are protected against an RMM vulnerability that could allow an attacker to use our tools to push ransomware to clients.” 

Box Upgrades Box Sign To Make Digital Transactions Convenient!

Box Inc., the industry-leading provider of content clouds, unveiled a new set of features for Box Sign, its built-in e-signature functionality. This decision was taken to encourage clients to transfer more of their transactions to the cloud. Through this, users can publish documents for electronic signature, update signature requests in flight, enhance the signer experience, and more using these features, which are already available. 

Box additionally declared that starting right now, Box Sign is accessible to all Box users at no additional charge. 

Diego Dugatkin, Chief Product Officer at Box stated, “The future of work is digital-first and paper-based processes hold companies back from reaching their full potential. Since entering the e-signature space, our north star has been to deliver all customers with a simple, secure, and cost-effective e-signature solution. Today, we take another big step towards achieving that goal by expanding Box Sign’s core capabilities so that customers can do more with The Box Content Cloud without added costs. We are just getting started within this space, and customers can expect to see even more innovation for Box Sign in the future.” 

Features of the new box sign 

Box Sign, a feature included in all Box plans, enables users to complete employee, customer, and partner transactions digitally and gives them access to e-signature capabilities. Box Sign is already being used by more than 500,000 Box users to speed up digital transactions, and this number will increase as new use cases are opened by improved Box Sign features. With the enhancements made today, users of Box Sign can now streamline high-volume business procedures for standardized documents including NDAs, event registrations, liability waivers, and more. Businesses can now use the Box Content Cloud to quickly and securely complete more of their signature-based business operations, thereby lowering their IT costs.  

Read More : CFBD and Resecurity Collaborate to Provide Cyber Threat Protection

Resecurity announced partnership with ECOMIL SAS

Resecurity announced a partnership with ECOMIL SAS to offer its AI-driven cybersecurity solutions and threat intelligence services in Colombia. ECOMIL SAS is a Colombian company headquartered in Bogotá and offers networking, cybersecurity, and IT management solutions to business and government clients there.

In Colombia, the shift to a digital economy is happening quickly, and since the pandemic, remote work has increased by 400%. Cyberattacks have become more dangerous because of the shift to a digital economy; they rose by 59% in just the first half of 2020.

Gene Yoo, CEO of Resecurity, Inc. commented, “We are thrilled to partner with ECOMIL and to join forces to deliver our solutions across all market verticals in Colombia.”

With the help of Resecurity’s cutting-edge cybersecurity solutions, businesses can automate the detection, evaluation, and prioritization of potential cyber threats while avoiding being targeted by organized cybercrime using cutting-edge attack methods.

The AI-driven platform enables administrators to quickly view in-depth analysis and specific artifacts obtained through the Dark Web, botnet activity, network intelligence, and high-quality threat intelligence, thereby reducing potential blind spots and security gaps.

Edgar Ernesto Hernandez, CEO of Ecomil SAS stated, “Partnership with Resecurity will positively impact on Colombian cybersecurity market and will enable the delivery of cutting-edge solutions to protect critical sectors of the economy.”

ActZero Announces the Release of Blueprint for Ransomware Defense

ActZero, a cybersecurity start-up providing ransomware defense, recently launched the Ransomware Task Force’s (RTF) Blueprint for Ransomware Defense.

In order to promote adoption, ActZero actively engages with its clients, partners, and prospects. The Blueprint offers a set of implementable ransomware precautions to fortify their IT infrastructures and is aimed at helping small- and medium-sized enterprises (SMEs) with limited cybersecurity knowledge.

The cybersecurity community was encouraged in the RTF’s 2021 report to “create a clear, practical methodology for ransomware mitigation, response, and recovery.” A number of significant public and private players in the cybersecurity sector joined together to form the Blueprint for Ransomware Defense Working Group. As a result, the Working Group created a set of suggested countermeasures against ransomware and other widespread cyberattacks. The safeguards were initially designed to offer “essential cyber hygiene” in order to help ward off broad, untargeted attacks.

To effectively prevent ransomware attacks, it’s important to be able to stop attackers who have gotten beyond security measures. For SMEs, establishing an MDR service is the practical approach to achieve this objective. Being a key member of the working group, ActZero is in a good position to assist SMEs in implementing the safeguards. Moreover, the Blueprint establishes the foundation for more sophisticated capabilities, such as the ability to identify and address threats that have eluded security mechanisms. By adding on the sophisticated threat hunting and AI-driven prevention and detection capabilities of its MDR service, ActZero can also complete its resilience endeavor and help SMEs against cyber-attacks.

Cyberbit Adds Cyber Crisis Stimulator to its Platform

Cyberbit, a leading cyber skills development platform, recently added a collaborative cyber crisis simulator to its platform to provide boardroom and SOC integrated exercises, allowing the C-Suite to work with its cyber defense team in real-time while responding to an organizational cyber crisis.

With the help of Cyberbit’s crisis simulator, management teams including the CEO, CFO, Legal, Communications & PR, CISO, CIO, and SOC managers can simulate a cyber crisis that affects the entire firm. The exercises are made to help managers improve their decision-making abilities, get ready for cyber crisis scenarios, and test out crisis response playbooks. The crisis simulator enables organizations to swap out static tabletop exercises for a dynamic, lifelike experience where exercise results are based on performance and management decisions made in real-time.

Executives have previously been restricted to using basic crisis simulation software or taking part in traditional tabletop exercises without the assistance of the information security team. The new crisis simulator is completely connected with cyber range drills, allowing businesses to conduct joint exercises that bring together executive teams and cyber defense teams.

In a real-world crisis, management teams are often updated by the information security team, and their choices are influenced by the success of the incident response. The brand-new Cyberbit product closes this crucial gap and enables complete communication, guaranteeing that an organization’s incident response team is ready to handle a cyber crisis as a cohesive unit.

The platform is offered as a SaaS option, enabling scattered teams or teams working from home to communicate whenever and wherever it is most convenient for them. Additionally, Cyberbit offers unified measurement tools that let users view the performance of both executive teams and operational teams from a single dashboard.

Adi Dar, CEO at Cyberbit, said, “We’ve worked extensively with our F500 customers and global consulting firms to develop the new crisis simulation module, complementing our catalog of live-fire team exercises. We’ve always believed in teamwork as one of the key elements of cyber readiness and we can now offer the only simulation solution that connects the entire organization exactly as they would be required to perform in real-life.”

Read More: Resecurity Launched its Cybersecurity Solutions on Microsoft Azure

Endace Announces Partnership with Vectra

Endace, a leading provider of network visibility infrastructure products, partnered with Vectra AI, a cybersecurity leader in threat detection and response. Vectra and Endace have teamed to integrate the Vectra AI-driven threat detection and response platform with Endace’s packet capture and always-on network recording. Combining the two solutions will enable security teams to quickly and easily investigate threats and respond to them, by providing accurate detection at all attack stages along with compelling forensic evidence.

“SOC teams often rely on recorded packet data during forensic investigations to support their findings. We are excited that customers can now Integrate the Vectra Platform with EndaceProbes and accelerate the incident response process”, said Brad Woodberg, Director of Product Management at Vectra.

The Vectra platform uses AI to automate and detect hidden cyber threats through continuous analysis of network traffic. Attack behaviours are exposed through a combination of data science, machine learning and behavioral analytics. Vectra is the most recent business to sign up for Endace’s Fusion Partner Program. To give performance, integration, and on-demand deployment to customers, the program offers pre-built integrations of solutions using EndaceProbe’s API. EndaceProbes captures weeks or months’ worth of network traffic, giving users instant access to every aspect of any threat.

This integration will ultimately provide the following features to customers:

  • Faster detection, research, and action on all network-wide threats and risks.
  • Streamlined processes enabling instant access to conclusive evidence.
  • Conclusive proof and a detailed history of every stage of cyber threat.

Cary Wright, VP of Products at Endace, said, “Detecting and responding to threats before the attackers establish a foothold is critical to defending against advanced cyber threats. Integrating Vectra’s AI driven threat detection with EndaceProbe provides security teams with one-click to all the evidence required to respond to any threat.”

Claroty Released Claroty xDome, a Cybersecurity Platform for Industries

Claroty released a cloud-driven cybersecurity platform, Claroty xDome that enables cyber and operational strength to new-age industrial firms. It is a solution that provides ease of use and scalability similar to SaaS products without leveraging protection, visibility, and monitoring control. These factors are essential to the overall CPS security journey, majorly when CPS across the XIoT expands rapidly. 

Claroty xDome addresses the requirement as it supports the complete CPS security journey for every firm, irrespective of cyber-physical system types that strengthen their operation or network architecture. The features of Claroty xDome consists of-  

  • The asset discovery features of any SaaS solution- CPS security has its foundation in the entire XIoT asset inventory and achieving it needs various asset discovery methods custom to evert environment’s unique requirements. While other SaaS solutions depends on passive monitoring, xDome provides this plus other methods and allow consumers to access ease and scalability of SaaS and effective asset discovery. 
  • Research-backed Vulnerability and risk management support- Vulnerabilities, a major roadblock to resilience is distinctively common in industrial environments. xDome removes this issue by correlating each asset with findings from Team82. Then it offers remediation guidance and custom risk scoring so consumers can focus on and remove the most critical risks. 
  • Network segmentation controls that safeguard against rising risks- effective segmentation is essential to reduce cyber and cyber and operational risk exposure but implementing it can be troublesome and dangerous as CPS security is critical, complex, and fragile. xDome eases this issue by clearly defining segmentation policies. 
  • Detection and response features to fight known and unknown threats- Understanding that no environment is safe from threats, xDome provides customers resources to detect and fix attack vectors, recognise and react to early indicators of both known and new threats, and integrate these capabilities with current SOC tools and workflows. 

Yaniv Vardi, CEO of Claroty, stated, “While asset discovery is an urgent need and how every enterprise starts their security journey, an asset inventory by itself is not a source of value. By supplementing asset information with vulnerability and risk management, organizations can pivot to a much more advantageous position: from reacting to cyber threats and incidents that already exist in the network, to proactively preventing them from ever taking hold in the first place. Making this shift is critical for achieving cyber and operational resilience, and xDome empowers our customers to do so. An ounce of prevention is worth a pound of cure.”