Featured Archives - Solutions Review Technology News and Vendor Reviews https://solutionsreview.com/category/featured/ The Best Enterprise Technology News, and Vendor Reviews Fri, 01 Sep 2023 15:02:40 +0000 en-US hourly 1 https://wordpress.org/?v=6.3 https://solutionsreview.com/wp-content/uploads/2023/07/SR_Icon.png Featured Archives - Solutions Review Technology News and Vendor Reviews https://solutionsreview.com/category/featured/ 32 32 38591117 Identity Management and Information Security News for the Week of September 1; Okta, Exabeam, QuSecure, and More https://solutionsreview.com/identity-management/identity-management-and-information-security-news-for-the-week-of-september-1-okta-exabeam-qusecure-and-more/ Fri, 01 Sep 2023 15:02:40 +0000 https://solutionsreview.com/identity-management-and-information-security-news-for-the-week-of-september-1-okta-exabeam-qusecure-and-more/ The editors at Solutions Review have curated this list of the most noteworthy identity management and information security news for the week of September 1. This curated list features identity management and information security vendors such as Okta, Exabeam, QuSecure, and more. Keeping tabs on all the most relevant identity management and information security news […]

The post Identity Management and Information Security News for the Week of September 1; Okta, Exabeam, QuSecure, and More appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
Identity Management and Information Security News for the Week of September 1

The editors at Solutions Review have curated this list of the most noteworthy identity management and information security news for the week of September 1. This curated list features identity management and information security vendors such as Okta, Exabeam, QuSecure, and more.

Keeping tabs on all the most relevant identity management and information security news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month, in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy identity management and information security news items.


Widget not in any sidebars

Identity Management and Information Security News for the Week of September 1


Okta Announces Okta for Global 2000 Platform

Okta, Inc., a leading independent identity solutions provider, this week announced Okta for Global 2000, a solution designed to give the world’s largest organizations choice in how they run their technology infrastructure with flexible and automated identity management. Okta for Global 2000 enables the technical agility executives need to balance centralization and decentralization of their organizations as well as resources and governance models with secure identity infrastructure.

Read on for more.

Descope Adds Third-Party Connectors to Its No-Code Toolset

Descope, an authentication solutions provider, this week announced the availability of third-party connectors that enable app developers to create and customize entire user journeys using no-code tools. Available connectors include Google reCAPTCHA Enterprise, Traceable, Segment, HubSpot, Amazon Rekognition, Google Cloud Translation, Amazon Translate, SendGrid, Datadog, Twilio, and Amazon S3. Customers can add data and actions from connectors to their user journey flows for use cases, such as risk-based authentication, bot mitigation, localization, identity verification, and identity orchestration.

Read on for more.

Incode and Simpello Announce Strategetic Alliance

Incode Technologies and Simpello, two data security solutions providers, announced this week a strategic alliance, integrating Incode’s biometric identity proofing solutions with Simpello’s patented interactive decentralization platform. This collaboration introduces frictionless data sharing with processing on the edge to hoteliers, retail, financial institutions, and others– providing data privacy and seamless user experiences.

Read on for more.

Exabeam Partners with Google Cloud on New Generative AI Features

Exabeam, a cybersecurity solutions leader, this week announced it is expanding its partnership with Google Cloud in the development of generative artificial intelligence (AI) models in its cloud-native New-Scale SIEM product portfolio. As a Google Cloud partner, the collaborative development process on Google Cloud generative AI products will accelerate the design of AI-based security product enhancements for Exabeam.

Read on for more.

Laminar Expands Data Security Platform with Support for Microsoft OneDrive and Google Drive

Laminar, a data security solutions provider, recently acquired by Rubrik, this week announced that it has added support for Microsoft OneDrive and Google Drive. Customers can now use Laminar to continually discover overexposed and unprotected sensitive data in OneDrive and Google Drive, enabling proactive risk remediation and data leak detection. With this expanded support, organizations can safeguard sensitive data across their entire digital landscape, including major cloud service providers Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure as well as Snowflake, BigQuery, and other SaaS applications.

Read on for more.

QuSecure Named Showcase Winner by Air Force Global Strike Command and the SBCC

QuSecure, Inc., a leader in post-quantum cryptography (PQC), this week announced it has been named a winner in the annual Commercial Capabilities Showcase award competition by the Air Force Global Strike Command (AFGSC) and the Small Business Consulting Corporation (SBCC). Earning recognition and a signed Phase I Letter of Support from the AFGSC, the win gives QuSecure a competitive advantage for future business, including important Department of Defense (DoD) contracts and Small Business Innovation Research (SBIR) opportunities. Additionally, the award grants QuSecure access to strategic networking consultations with SBCC and relevant government stakeholders across the DoD. SBCC’s continued support will help QuSecure get its technology in the hands of the operators as well as navigate requirements, contracts, government acquisitions, and operations to help align all the critical players and find continued success in the defense market.

Read on for more.


Expert Insights Section

expert insight badgeWatch this space each week as Solutions Review editors will use it to share new Contributed Content Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry thought leaders together to publish the web’s leading insights for enterprise technology practitioners.

The Battle for Cyber Talent: A Balance Between Quantity and Quality

Jon Check of Raytheon, an RTX Business, charges into the battle for cyber talent while pushing for a balance between quality and quantity. The cybersecurity industry faces a daunting challenge in the battle for talent. With the increasingly complex threat landscape, the demand for advanced security solutions is higher than ever. To meet this challenge, we need a workforce with a broad range of skills and expertise. However, simply focusing on volume alone will not solve the problem. As an industry, we must reflect on whether we are doing everything possible to achieve the right balance of quantity and quality in our workforce. This requires looking beyond traditional cybersecurity resumes for new talent, supporting education and training programs, and creating positive work environments. By doing so, we can develop a quality cyber workforce critical to fighting today’s threat actors.

Read on for more.

ChatGPT, LLMs, and the Future of Cybersecurity

Karthik Krishnan of Concentric AI looks to ChatGPT and LLMs, and sees the future of cybersecurity in them. Artificial intelligence (AI) has achieved remarkable advancements over the past few years, with examples such as ChatGPT dominating recent headlines. Similarly, large language models (LLMs) are emerging as game-changing innovations. LLMs like GPT 3.5 and GPT 4 have demonstrated an unprecedented ability to understand and generate human-like text, opening up new possibilities for every type of industry. In the tech news cycle, AI is everywhere. But AI in cybersecurity is a little different. It is important to understand the critical need for innovative solutions to protect digital assets and infrastructures— especially as cyber threats become increasingly pervasive and sophisticated. In fact, large language models may just represent the future of cybersecurity.

Read on for more.

AI-Based Red Teaming: Why Enterprises Need to Practice Now

Brette Geary of Camelot Secure urges enterprises to incorporate AI-based red teaming into their strategy now. In the dynamically changing world of cybersecurity, no one can afford to become complacent. As tech professionals, we understand this constant flux, watching as adversarial actors continually adapt their strategies and tools. We are stepping into an era where artificial intelligence (AI) is no longer a futuristic concept, but an active player in the cybersecurity landscape. This article aims to shed light on a significant aspect of AI in cybersecurity– its role in red team exercises. In this article, we’ll explore why investing and integrating AI into red team operations should be a crucial part of any cybersecurity company’s strategic radar, and how this integration can help organizations stay one step ahead of ever-evolving threats.

Read on for more.


Widget not in any sidebars

The post Identity Management and Information Security News for the Week of September 1; Okta, Exabeam, QuSecure, and More appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
48845
Endpoint Security and Network Monitoring News for the Week of September 1; Infovista, Fianu Labs, the FBI, and More https://solutionsreview.com/endpoint-security/endpoint-security-and-network-monitoring-news-for-the-week-of-september-1-infovista-fianu-labs-the-fbi-and-more/ Fri, 01 Sep 2023 14:32:43 +0000 https://solutionsreview.com/endpoint-security-and-network-monitoring-news-for-the-week-of-september-1-infovista-fianu-labs-the-fbi-and-more/ The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of September 1. This curated list features endpoint security and network monitoring vendors such as Infovista, Fianu Labs, the FBI, and more. Keeping tabs on all the most relevant endpoint security and network […]

The post Endpoint Security and Network Monitoring News for the Week of September 1; Infovista, Fianu Labs, the FBI, and More appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
Endpoint Security and Network Monitoring News for the Week of September 1

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of September 1. This curated list features endpoint security and network monitoring vendors such as Infovista, Fianu Labs, the FBI, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.


Widget not in any sidebars

Endpoint Security and Network Monitoring News for the Week of September 1


Infovista and BT Proof-of-Concept Aims to Reduce Troubleshooting Time

Infovista, a global leader in network lifecycle automation, has announced a collaborative effort with BT on a proof of concept aimed at developing a new automated Root-Cause Analysis (RCA) use case for its fixed voice services. The use case, which will be showcased for the first time at TM Forum’s DTW23, demonstrates how CSPs such as BT can realize substantial operational efficiencies. Infovista predicts that the technology will be able to reduce resolution times for CSPs by more than two-thirds allowing for enhanced customer satisfaction.

Read on for more.

NordVPN Launches NordLabs to Encourage Innovation in Experimental Technologies

NordVPN, a VPN solutions provider, launches NordLabs – a platform for experimental projects and cutting-edge innovations. It will explore emerging technologies, such as AI, to create new tools and services. NordLabs will work in two main directions. First, it will provide a broader space for NordVPN’s team of engineers and developers to experiment with new ideas and emerging technologies and encourage creative thinking to explore novel approaches to online privacy and security. Secondly, the platform will allow early adopters and tech enthusiasts to gain exclusive access to innovative projects before they become mainstream. To access upcoming NordLabs experimental projects, users must register on the waiting list. Once new experimental projects are released, registered users can test and provide feedback on features and services developed by NordVPN. Signed up users can expect the first products to test in September.

Read on for more.

Fianu Labs Secures $2 Million in Seed Funding from DataTribe

Fianu Labs, a software governance automation solutions provider, this week secured a $2 million seed investment from DataTribe, a global cyber foundry that invests in and co-builds next-generation cybersecurity and data science companies. Fianu’s platform captures evidence across the DevSecOps toolchain mapped to internal policy during real-time, continuous audits against established risk controls and compliance frameworks. Each software release is accompanied by a Software Bill of Attestations (SBOA) designed to transmit immutable, audit-worthy evidence.

Read on for more.

U.S. Army Selects BackBox to Automate Multi-Vendor Network Environment

BackBox, a network automation solutions provider, this week announced the U.S. Army has selected BackBox’s Network Automation Platform to automate Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) compliance of their multivendor network environment. BackBox integrates with all major network monitoring platforms and has added new features to enable customers to easily migrate to BackBox.

Read on for more.

Aqua Security Threat Alert: “Kinsing Malware Exploits Novel Openfire Vulnerability”

Aqua Nautilus discovered a new campaign that exploits the Openfire vulnerability (CVE-2023-32315), that was disclosed in May of this year, to deploy Kinsing malware and a cryptominer. This vulnerability leads to a path traversal attack, which grants an unauthenticated user access to the Openfire setup environment. This then allows the threat actor to create a new admin user and upload malicious plugins. Eventually the attacker can gain full control over the server. In this blog, we explain the vulnerability, Kinsing’s campaign, and quantify the extent of instances potentially exposed to this specific vulnerability.

Read on for more.

FBI and Partners Dismantle Qakbot Infrastructure in Multinational Cyber Takedown

This week, the FBI and the Justice Department announced a multinational operation to disrupt and dismantle the malware and botnet known as Qakbot. The action, which took place in the U.S., France, Germany, the Netherlands, Romania, Latvia, and the United Kingdom, represents one of the largest U.S.-led disruptions of a botnet infrastructure used by cybercriminals to commit ransomware, financial fraud, and other cyber-enabled criminal activity.

Read on for more.


Expert Insights Section

expert insight badgeWatch this space each week as Solutions Review editors will use it to share new Contributed Content Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry thought leaders together to publish the web’s leading insights for enterprise technology practitioners.

Finding Business Value in the Vast Sea of Threat Intelligence

Delilah Schwartz of Cybersixgill crosses over the vast sea of threat intelligence, in search of added value by combining the right tools. The continued acceleration of highly sophisticated cyber-attacks impacts countless organizations, their brand’s reputation, and their bottom line. This situation puts growing pressure on security leaders to effectively and successfully reduce organizational threat exposure across a rapidly proliferating attack surface. Without the means to identify the threats that pose the most significant risk to their organizations, security teams continue to fight cyber warfare like playing a game of whack-a-mole, addressing issues as they occur without successfully getting ahead of malicious actors. Cyber threat intelligence plays a vital role in cyber warfare and is no longer a “nice-to-have” but a “need-to-have” weapon. With the right intelligence tools, teams can derive critical insights into the emerging tactics, techniques, vectors, and procedures that could expose their network to attack. But selecting the right threat intelligence products and services to maximize business value is not easy.

Read on for more.

Home Grown: How to Fill the Cybersecurity Talent Gap from the Inside

Pieter Danhieux of Secure Code Warrior discusses how filling the cybersecurity talent gap starts with getting everyone on board with security familiarity. The universal corporate culture still generally believes that outside hiring represents the primary way to fill in talent gaps. However, given the mounting hiring costs and the severe consequences of cyber threats, CISOs would greatly benefit from re-evaluating how they address the situation by looking within. Instead of the traditional recruitment of outside candidates, we should leverage proven, internal performers. Those performers may not be highly skilled security professionals. But by providing proper learning pathways and support, leaders can empower them to take on critical roles in cyber defense.

Read on for more.


Widget not in any sidebars

 

The post Endpoint Security and Network Monitoring News for the Week of September 1; Infovista, Fianu Labs, the FBI, and More appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
48843
Finding Business Value in the Vast Sea of Threat Intelligence https://solutionsreview.com/network-monitoring/finding-business-value-in-the-vast-sea-of-threat-intelligence/ Wed, 30 Aug 2023 20:36:55 +0000 https://solutionsreview.com/finding-business-value-in-the-vast-sea-of-threat-intelligence/ Solutions Review’s Contributed Content Series is a collection of contributed articles written by thought leaders in enterprise technology. Delilah Schwartz of Cybersixgill crosses over the vast sea of threat intelligence, in search of added value by combining the right tools. Given today’s expansive digital landscape and widening attack surface, the volume of threat intelligence data has […]

The post Finding Business Value in the Vast Sea of Threat Intelligence appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
Threat Intelligence

Solutions Review’s Contributed Content Series is a collection of contributed articles written by thought leaders in enterprise technology. Delilah Schwartz of Cybersixgill crosses over the vast sea of threat intelligence, in search of added value by combining the right tools.

Given today’s expansive digital landscape and widening attack surface, the volume of threat intelligence data has reached unmanageable levels. However, there is a way for companies to overcome these challenges and optimize the business value of their cyber threat intelligence investments.

The continued acceleration of highly sophisticated cyber-attacks impacts countless organizations, their brand’s reputation, and their bottom line. This situation puts growing pressure on security leaders to effectively and successfully reduce organizational threat exposure across a rapidly proliferating attack surface. Without the means to identify the threats that pose the most significant risk to their organizations, security teams continue to fight cyber warfare like playing a game of whack-a-mole, addressing issues as they occur without successfully getting ahead of malicious actors.

Cyber threat intelligence plays a vital role in cyber warfare and is no longer a “nice-to-have” but a “need-to-have” weapon. With the right intelligence tools, teams can derive critical insights into the emerging tactics, techniques, vectors, and procedures that could expose their network to attack. But selecting the right threat intelligence products and services to maximize business value is not easy.


Widget not in any sidebars

Finding Business Value in the Vast Sea of Threat Intelligence


Gaining an Accurate Picture of the Threat Landscape Through Context and Accuracy

The value of threat intelligence depends not only on the relevance and timeliness of the information but also – and perhaps more importantly – on the context it provides. For threat intelligence to be effective, it must support risk assessment with critical context about threat actor groups and their tactics, techniques, procedures, vulnerability exploits, indicators of compromise, and more. In its recent Market Guide for Security Threat Intelligence Products and Services, Gartner recommends that organizations look for vendors offering context-rich threat intelligence that can be customized and tailored for their unique threat landscape.

For example, through the combination of advanced AI, machine learning, and processing and analyzing comprehensive data from millions of online and dark web sources, organizations can receive early warnings of potential risks to their network. When threat intelligence blends context about each organization’s unique attack surface and assets, companies gain contextual, accurate insights into the nature, source, and urgency of each threat they face. As a result, security teams can operate more efficiently, knowing that they’re taking action to mitigate the most urgent, dangerous threats to their corporate environment.

Integrating CTI, DRPS, and EASM

With so much at stake and so many dollars invested in a wide range of cybersecurity solutions, organizations need to prove the value of their security stack. The need to show value drives a shift toward companies consolidating vendors and products to simplify their solution suites. As a result, threat intelligence vendors are beginning to integrate features from adjacent markets, such as Digital Risk Protection Services (DRPS) and External Attack Surface Management (EASM), to offer a more comprehensive cybersecurity solution.

When vendors add DRPS to their threat intelligence solutions, companies can proactively monitor their digital footprint across the surface web and underground sites, forums, and marketplaces, identifying and mitigating risks that could impact their brand reputation, customer trust, or compliance status. Additionally, integrating EASM discovery capabilities with Attack Surface Management (ASM) gives companies a comprehensive view of their unknown externally-facing assets so they can identify and manage discovered vulnerabilities and potential entry points for threat actors. By combining these solutions with threat intelligence, organizations gain a unified view of their complete asset inventory and overall threat exposure to proactively identify and mitigate risks to their environment.

Enhancing CTI Outputs with Data Analytics and Automation

The ever-expanding, continuously evolving threat landscape means the volume of threat intelligence data that organizations must understand and act upon is now unmanageable. In its Market Guide for Security Threat Intelligence Products and Services, Gartner notes that analytics, data science, and automation are becoming critical components of threat intelligence solutions. These capabilities are increasingly important because they can significantly reduce the time and effort needed to operationalize threat intelligence across large, mixed datasets and arms organizations with actionable, contextual insights. As a result, security teams are much better equipped to protect their assets and attack surfaces.

Automated CTI that autonomously infiltrates deep, dark, and clear web sources enables frontline defenders to extract, process, correlate, and analyze data in real-time — without human intervention or validation — and gain threat intelligence that is refined to their organization’s unique assets and attack surface. These benefits are more significant when adding features like graph analytics, link analysis, and rich threat actor modeling.

Additionally, advanced capabilities like entity extraction, visual graph analyzers, peer network analysis, and a customizable dashboard interface help organizations understand their threat exposure at a glance and quickly identify and prioritize the threats that pose the most significant risk. In essence, next-generation CTI solutions that blend robust analytics with automation and other cutting-edge capabilities give customers powerful data to rapidly respond to critical threats and mitigate risks before they can be exploited.

Tailoring Predictions and Risk Assessments According to Business-Criticality

With the amount of data available from millions of clear web and underground sources, threat intelligence can be overwhelming. Unless it is scoped and filtered for organizational relevancy, the sheer volume of data is nearly impossible to manage, resulting in a delay in incident detection and remediation and inhibiting effective decision-making.

Organizations can optimize their threat intelligence investments by developing a CTI program tailored to their unique business needs, risks, and objectives. By refining threat intelligence with the organization’s critical internal context, security teams can filter out irrelevant data and focus on the threats and insights that matter most to their business. Additionally, business executives are better equipped to make informed decisions and prioritize their resources effectively.

These benefits are another reason for integrating an EASM solution with CTI. EASM continuously discovers and classifies known and unknown networked assets that could expose an organization to risk, while combining the two technologies enables companies to tailor threat intelligence to their unique attack surface. Security teams can then monitor their complete asset inventory in real-time across the deep, dark, and clear web and conduct detailed, refined risk assessments to receive early warnings of emerging threats targeting the business. With this type of full visibility into organizational threat exposure, security teams can confidently prioritize their efforts and resources where they are needed most.

Final Thoughts on Threat Intelligence

The rapidly expanding digital landscape and proliferation of potential attack vectors have created an increasingly complex and challenging environment for security teams. The accelerated pace of technological advancements means that manual and hybrid solutions are no longer adequate to protect the expanding attack surface at the scale and sophistication of emerging threats. Threat actors increasingly leverage AI and automation, making it imperative for security vendors and defenders to incorporate these technologies in their cybersecurity strategy.

Given the pace of threat actor activity and the sophistication of their tools and technologies, organizations must embrace AI and automation, incorporating these capabilities within their cybersecurity programs to keep pace with the evolving threat landscape. By doing so, they can scale their threat intelligence activities, augment and optimize the efficiency of their existing teams, and provide faster time to insight and action. Ultimately, this will enable them to better protect their systems, data, and customers from cyber-attacks.


Widget not in any sidebars

The post Finding Business Value in the Vast Sea of Threat Intelligence appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
48818
ChatGPT, LLMs, and the Future of Cybersecurity https://solutionsreview.com/security-information-event-management/chatgpt-llms-and-the-future-of-cybersecurity/ Wed, 30 Aug 2023 18:55:04 +0000 https://solutionsreview.com/chatgpt-llms-and-the-future-of-cybersecurity/ Solutions Review’s Contributed Content Series is a collection of contributed articles written by thought leaders in enterprise software categories. Karthik Krishnan of Concentric AI looks to ChatGPT and LLMs, and sees the future of cybersecurity in them. Artificial intelligence (AI) has achieved remarkable advancements over the past few years, with examples such as ChatGPT dominating recent […]

The post ChatGPT, LLMs, and the Future of Cybersecurity appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
LLMs

Solutions Review’s Contributed Content Series is a collection of contributed articles written by thought leaders in enterprise software categories. Karthik Krishnan of Concentric AI looks to ChatGPT and LLMs, and sees the future of cybersecurity in them.

Artificial intelligence (AI) has achieved remarkable advancements over the past few years, with examples such as ChatGPT dominating recent headlines. Similarly, large language models (LLMs) are emerging as game-changing innovations. LLMs like GPT 3.5 and GPT 4 have demonstrated an unprecedented ability to understand and generate human-like text, opening up new possibilities for every type of industry.

In the tech news cycle, AI is everywhere. But AI in cybersecurity is a little different. It is important to understand the critical need for innovative solutions to protect digital assets and infrastructures— especially as cyber threats become increasingly pervasive and sophisticated. In fact, large language models may just represent the future of cybersecurity.


Widget not in any sidebars

ChatGPT, LLMs, and the Future of Cybersecurity


A Brief History of Language Models

The development of language models has undergone remarkable transformations from the preliminary days. Early models, such as n-grams, relied on basic statistical methods to generate text based on the probability of word sequences. As machine learning techniques improved, more advanced models such as recurrent neural networks (RNNs) and long short-term memory (LSTM) networks emerged, offering improved context understanding and text generation capabilities.

However, it was the introduction of transformer architectures that provided a turning point in natural language processing (NLP). OpenAI’s popular GPT (Generative Pre-trained Transformer) series has significantly advanced the capabilities of language models. These models are trained on vast amounts of data, allowing them to generate highly coherent and contextually relevant text very rapidly.

Large language models like GPT-4 have demonstrated significant progress in understanding and generating text that closely resembles human language. These models can capture context, comprehend nuances, and even exhibit a certain degree of creativity, paving the way for various applications in multiple industries.

Applications of Large Language Models in Cybersecurity

Large language models have shown great potential for enhancing various aspects of cybersecurity. From threat detection to security awareness training to data security posture management (DSPM), AI-driven language models can streamline processes, improve accuracy, and support human experts.

Here are some key applications of large language models in the cybersecurity domain:

  • Threat detection and response. LLMs can analyze and process vast amounts of data, including logs and threat intelligence feeds, to identify suspicious patterns and potential threats. By automating the analysis of this data, these models can help security teams respond to incidents more quickly and effectively.
  • Data Security. LLMs can help security teams understand data with context, enabling enterprises to inventory and understand where their sensitive data is and where the risks may be to that data. By analyzing data at scale, these models can help teams discover, monitor, and protect their mission-critical data.
  • Automated vulnerability assessment. AI-driven language models can automatically analyze code and identify potential vulnerabilities, providing developers with insights to help them address security risks before they become exploitable. Additionally, language models can generate recommendations for remediation, making it easier for developers to write secure code.
  • Secure code analysis and recommendations. LLMs can be used to analyze code repositories for potential security issues and recommend best practices for secure coding. By learning from historical vulnerabilities and coding patterns, these models can suggest improvements to help prevent future security incidents.
  • Phishing detection and prevention. Phishing attacks often rely on manipulating language to deceive victims. LLMs can be trained to recognize phishing attempts in emails, social media messages, or other communication channels, helping to prevent successful attacks and protect sensitive information.
  • Security awareness and training. LLMs can generate realistic simulations and scenarios for security awareness training. By providing personalized and engaging content, these models can help improve employees’ understanding of cybersecurity risks and best practices, ultimately strengthening an organization’s overall security posture.

How AI is Helping Companies Protect Sensitive Data

With massive cloud adoption and migration, companies are generating and processing vast amounts of sensitive information. Maintaining a robust security posture becomes increasingly important to ensure the confidentiality, integrity, and availability of digital assets.

LLMs like GPT can be crucial in improving a company’s data security posture management (DSPM). By leveraging the power of advanced AI-driven language models, companies can better understand and manage their data security requirements, ultimately reducing the risk of data breaches and other cyber threats.

Perhaps the most significant contribution of LLMs in data security is automating the analysis and categorization of sensitive data. LLMs can efficiently process and classify data based on its level of sensitivity, enabling organizations to prioritize the protection of their most valuable and sensitive information. By identifying and classifying sensitive data, organizations can implement appropriate security measures and controls, ensuring that their security posture aligns with the specific requirements of each data category.

Plus, LLMs can be used for creating, reviewing, and updating security policies and procedures to ensure adherence to industry best practices and compliance with relevant regulations. With AI, organizations can maintain up-to-date policies with greater accuracy and consistency, ultimately improving their overall security posture.

Can ChatGPT Actually Make a Difference in Cybersecurity?

The widespread adoption of ChatGPT can be attributed to its versatility, ease of integration, and effectiveness in handling a variety of tasks. Its ability to understand context, generate coherent responses, and adapt to different domains has made it an attractive option for businesses and developers.

ChatGPT demonstrates promising potential for the cybersecurity industry, offering various advantages, including:

  • Incident response and triage. ChatGPT can assist security teams by automating the initial stages of incident response, such as gathering information, prioritizing incidents, and providing preliminary analysis. This can help teams focus on more complex tasks, improving efficiency and reducing response times.
  • Security policy management. ChatGPT can generate and review security policies, ensuring they adhere to industry best practices and comply with relevant regulations. Organizations can maintain up-to-date policies with greater accuracy and consistency by automating this process.
  • Enhancing security operations center (SOC) efficiency. ChatGPT can support SOC teams by automating routine tasks, such as log analysis, threat hunting, and communication with stakeholders. This can free up time and resources for SOC analysts to focus on more strategic and complex tasks.

Challenges and Limitations of Large Language Models in Cybersecurity

While LLMs like ChatGPT have shown great promise in enhancing cybersecurity, they also come with their own set of challenges and limitations. Overcoming these concerns is crucial for realizing the full potential of AI-driven technologies:

  • Addressing biases and ethical concerns. Language models are trained on vast amounts of data from the internet, which may contain biases, misinformation, or offensive content. As a result, these models can inadvertently generate biased or harmful outputs. Therefore, developers must invest in refining the training process, implementing mechanisms to filter out biased content, and prioritizing ethical considerations.
  • Ensuring data privacy and security. LLMs can sometimes inadvertently reveal sensitive or private information in the training data. To mitigate this risk, it is essential to establish robust data processing and privacy-preserving techniques during the development and deployment of these models.
  • Balancing automation with human expertise. Despite their advanced capabilities, LLMs should not be considered a replacement for human expertise in cybersecurity. It is crucial to strike the right balance between automation and human intervention, ensuring that AI-driven solutions are used to support, rather than replace, human experts in detecting, analyzing, and responding to threats. In addition, we must acknowledge that many of the tools AI brings to cybersecurity can be used against us by bad actors.

Who wins out? If defenders and attackers can both leverage AI to serve their purposes, the one with the most resources probably prevails. Whoever has more money, time, and AI tools to process the data will be successful.

The good news is that as AI becomes more commoditized, the resources required to harness them diminish.

Future Applications of LLMs in Cybersecurity

As LLMs continue to evolve and improve, their potential applications in cybersecurity are expected to grow in both scope and impact. Here are a few things we can look forward to:

  • Continuous improvement of language models. The continuous development and refinement of LLMs will likely lead to even better performance in natural language understanding and generation. LLMs can contribute to more accurate threat detection, improved secure code analysis, and more efficient security operations.
  • Integration with other AI technologies. The combination of LLMs with other AI-driven technologies, such as computer vision, anomaly detection, and machine learning algorithms, can lead to more comprehensive and robust cybersecurity solutions.
  • Emergence of new cybersecurity applications. As LLMs become more advanced, we can expect to see the emergence of new applications in the cybersecurity marketplace. For example, AI-driven language models could generate realistic threat simulations for training purposes, create more sophisticated and adaptive phishing detection systems, and improve existing solutions that address data security posture management.

Advancements in large language models clearly represent a significant opportunity for the cybersecurity industry. By staying ahead of these developments and adapting them to address cybersecurity challenges, organizations will be in a better position than ever before to protect their digital assets and infrastructures


Widget not in any sidebars

The post ChatGPT, LLMs, and the Future of Cybersecurity appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
48816
Restoring Cybersecurity Confidence Amidst a Resource Crisis https://solutionsreview.com/security-information-event-management/restoring-cybersecurity-confidence-amidst-a-resource-crisis/ Wed, 30 Aug 2023 15:39:31 +0000 https://solutionsreview.com/restoring-cybersecurity-confidence-amidst-a-resource-crisis/ Solutions Review’s Contributed Content Series is a collection of contributed articles written by thought leaders in enterprise software categories. Marie Wilcox of Panaseer hammers home the importance of restoring cybersecurity confidence, despite the talent and resource shortage. It’s no secret– there’s a prolonged skills crisis unfolding as the demand for cybersecurity talent far outstrips the available […]

The post Restoring Cybersecurity Confidence Amidst a Resource Crisis appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
Cybersecurity Confidence

Solutions Review’s Contributed Content Series is a collection of contributed articles written by thought leaders in enterprise software categories. Marie Wilcox of Panaseer hammers home the importance of restoring cybersecurity confidence, despite the talent and resource shortage.

It’s no secret– there’s a prolonged skills crisis unfolding as the demand for cybersecurity talent far outstrips the available supply. The situation in the US is particularly alarming, with a current ratio standing at 69 percent, indicating that less than 7 in 10 cybersecurity jobs can be filled by the existing workforce.

To compound the issue of a lack of security skills, nearly one-third of cybersecurity leaders are also deeply concerned about meager security training budgets, and over one-quarter are worried about the low-security team headcount and inadequate overall security budget. These challenges have led cybersecurity teams to believe that a substantial 40 percent budget increase is necessary to instill confidence in their ability to mitigate security risks effectively.

As the resource crisis continues, it’s imperative that organizations transform their cybersecurity strategy and processes to regain confidence in their security posture, and enable them to do more with less. Streamlining operations through vendor consolidation and embracing automation are key components of this transformation.


Widget not in any sidebars

Restoring Cybersecurity Confidence Amidst a Resource Crisis


Closing the Talent Shortage

Security leaders find themselves in a constant cycle of stress and burnout as they grapple with insufficient personnel, skills, and budgets to effectively manage their priorities and maintain robust cyber hygiene. As a result, we’re seeing that 52 percent of security professionals would hire more security specialists if they had a budget increase.

However, there are more viable solutions to this dilemma than merely increasing headcount. The industry’s high stress levels and overworked teams, with people often covering multiple positions, mean high staff turnover will continue to be a challenge for organizations. Skilled professionals face a ‘whack-a-mole’ challenge, where teams are perpetually solving urgent problems, leaving little time to implement deeper, systemic changes.

To address this pressing issue, organizations must prioritize process automation to manage the more laborious routine tasks and processes, alleviate the constant firefighting, and free up security teams to focus on a more strategic approach to strengthening their security posture and mitigating risk.

Automation: Enhancing Efficiency and Compliance

Organizations that have already adopted security automation report numerous benefits, such as more efficient use of resources, improved decision-making, and more accurate prioritization of tasks. Automation alleviates the pressure felt by employees, allowing them ample time to focus on critical issues and enhance overall security posture.

Moreover, automation plays a vital role in ensuring compliance with new and evolving regulations. The EU’s Digital Operational Resilience Act (DORA), for instance, mandates the continuous monitoring of IT security. Automation becomes indispensable in meeting these regulatory requirements and adapting to evolving frameworks and guidance.

Furthermore, automation is essential for enhancing board oversight of security risk – a necessity under new regulations. With increased accountability for cybersecurity at the board level, security teams face growing pressure to provide accurate insights into their organization’s security posture using trusted metrics and measures. Automation becomes the key to building confidence and trust in this data, driving greater efficiency, and maximizing the value of existing tools and resources.

Streamlining with Consolidation

According to a recent survey from Gartner, security leaders have become increasingly unhappy with the inefficiencies and risk that come from such a heterogenous security stack, and, consequently, are consolidating the number of security vendors that they use – 75 percent of organizations are pursuing consolidation in 2022, nearly tripling the number since 2020. Consolidation can bring its own challenges, and, in our research, nearly 4 in 5 security leaders expressed concerns that it may reduce their ability to mitigate cyber risk. This skepticism, though understandable, is unfounded. Nearly half of those who have embraced consolidation have seen an improvement in security posture.

The motivation behind consolidation is clear– an alarming 35 percent of cyber budgets are being spent on tools that do not provide measurable improvements in cybersecurity posture. By consolidating vendors and tools, businesses seek to optimize their cyber spending and achieve more with less. Consolidation streamlines security operations, unifying disparate tools and data sources. This enables security professionals to respond to threats more effectively and manage their organization’s security posture more efficiently. Consolidation eliminates redundancies and ensures a more cohesive and holistic security ecosystem.

Doing More with Less: Embracing Change

Amidst the severe resource challenges in cybersecurity, a significant transformation is essential. Embracing consolidation and automation will be critical for organizations to navigate the resource crisis, restore cybersecurity confidence, and thrive in the face of evolving threats and regulations.

By prioritizing strategic changes, organizations can confidently optimize their resources, empower their cybersecurity teams, and establish a proactive security posture that mitigates risks effectively. This journey of transformation is not without its challenges, but it is a crucial step towards doing more with less in the ever-evolving world of cybersecurity.


Widget not in any sidebars

The post Restoring Cybersecurity Confidence Amidst a Resource Crisis appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
48814
The Battle for Cyber Talent: A Balance Between Quantity and Quality https://solutionsreview.com/security-information-event-management/the-battle-for-cyber-talent-a-balance-between-quantity-and-quality/ Mon, 28 Aug 2023 19:28:43 +0000 https://solutionsreview.com/the-battle-for-cyber-talent-a-balance-between-quantity-and-quality/ Solutions Review’s Contributed Content Series is a collection of contributed articles written by thought leaders in enterprise software categories. Jon Check of Raytheon, an RTX Business, charges into the battle for cyber talent while pushing for a balance between quality and quantity. The cybersecurity industry faces a daunting challenge in the battle for talent. With the […]

The post The Battle for Cyber Talent: A Balance Between Quantity and Quality appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
Cyber Talent

Solutions Review’s Contributed Content Series is a collection of contributed articles written by thought leaders in enterprise software categories. Jon Check of Raytheon, an RTX Business, charges into the battle for cyber talent while pushing for a balance between quality and quantity.

The cybersecurity industry faces a daunting challenge in the battle for talent. With the increasingly complex threat landscape, the demand for advanced security solutions is higher than ever. To meet this challenge, we need a workforce with a broad range of skills and expertise.

However, simply focusing on volume alone will not solve the problem. As an industry, we must reflect on whether we are doing everything possible to achieve the right balance of quantity and quality in our workforce. This requires looking beyond traditional cybersecurity resumes for new talent, supporting education and training programs, and creating positive work environments. By doing so, we can develop a quality cyber workforce critical to fighting today’s threat actors.


Widget not in any sidebars

Cyber Talent: Balancing Between Quality and Quantity


Looking Beyond the Traditional Cyber Resume

To widen the talent pool and bring different perspectives to the field, organizations must diversify where and how they find potential cyber job candidates. This change is essential for solving unique security challenges and addressing the evolving threat landscape.

For instance, individuals from various fields and backgrounds can possess skill sets well suited for a career in cybersecurity. Critical thinking, communication, and problem-solving skills, often found in finance, math, and science industries, are crucial for cyber defenders to do their jobs efficiently. Additionally, recruiters should recognize the value of soft skills such as public speaking, teamwork, and personableness. These skills are especially helpful when a breach occurs, and all stakeholders must be alerted and kept up to speed.

To attract this diverse talent, recruitment processes, and messaging must shift. This refinement includes updating databases, field matching, and role descriptions to attract those with varied skill sets successfully. Recent Congressional testimony shows that removing a bachelor’s degree from early-career cybersecurity job postings can increase the candidate pool by over 60 percent. By taking these steps, organizations can ensure their job postings are accessible to everyone, which helps individuals qualify for positions regardless of their experience or education by applying attributes from adjacent fields to cyber jobs. This can be implemented by inviting candidates based on demonstrated ability and skills-based assessments.

Investing in Education and Training Programs

According to the (ISC)² 2022 Cybersecurity Workforce Study, 43 percent of respondents cited a lack of qualified talent as the most significant cause of staff shortages. To address this issue, security leaders can take an active role in training candidates and providing the resources to develop the necessary qualifications for the job.

Organizations should start by creating more equitable opportunities for potential talent to learn about what a career in cybersecurity entails. Providing or sponsoring education programs for K-12 and colleges can create better awareness around cybersecurity as a career and provide beneficial mentorship and shadowing opportunities. For example, Girls Who Code and the Girl Scouts Cyber Challenge offer curriculum-based programs and mentorships tailored to prepare women for success early in their cyber careers. Additionally, organizations should consider collaborating with colleges and universities to host events that enable students to gain hands-on experience and connect with field experts. The National Collegiate Cyber Defense Competition is an excellent example of such an event, bringing together college students from across the country to test their skills, network, and connect with mentors, laying a critical foundation to prepare themselves for a career in cyber.

Moreover, there needs to be more emphasis placed on the value of company programs that train cyber defenders to meet specialized needs and challenges within the cybersecurity field. These programs can become another source for developing talent internally by providing non-cyber employees an opportunity to switch career paths, especially if they have the right skill sets and passion to learn something new. By investing in training and development programs, organizations can create a pipeline of qualified talent and reduce the need to rely solely on experienced candidates.

Creating a Positive and Supportive Work Environment

One way to achieve this is by embracing the concept of “Cyberlandia” – a people-first work culture that empowers cyber defenders to feel prepared for any threats they encounter. In Cyberlandia, new employees are encouraged on their path to learning and empowered to try new projects and roles. They also have a space to vocalize what they need to be productive on the job, such as changes to the work schedule or more training opportunities.

The cyber talent shortage is an industry-wide issue that requires a collective effort to solve. It’s not just about increasing the number of cyber professionals, but also about hiring, training, and supporting the people who can effectively overcome the next cyber-attack. Organizations must focus on building a high-caliber cyber workforce to put themselves in the best possible position to combat evolving security threats. By investing in their employees and creating a supportive work environment, organizations can attract and retain top talent, reduce burnout, and ultimately improve the quality of their security teams.


Widget not in any sidebars

The post The Battle for Cyber Talent: A Balance Between Quantity and Quality appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
48810
AI-Based Red Teaming: Why Enterprises Need to Practice Now https://solutionsreview.com/security-information-event-management/ai-based-red-teaming-why-enterprises-need-to-practice-now/ Fri, 25 Aug 2023 20:20:49 +0000 https://solutionsreview.com/ai-based-red-teaming-why-enterprises-need-to-practice-now/ Solutions Review’s Contributed Content Series is a collection of contributed articles written by thought leaders in enterprise software categories. Brette Geary of Camelot Secure urges enterprises to incorporate AI-based red teaming into their strategy now. In the dynamically changing world of cybersecurity, no one can afford to become complacent. As tech professionals, we understand this constant […]

The post AI-Based Red Teaming: Why Enterprises Need to Practice Now appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
AI-Based Red Teaming

Solutions Review’s Contributed Content Series is a collection of contributed articles written by thought leaders in enterprise software categories. Brette Geary of Camelot Secure urges enterprises to incorporate AI-based red teaming into their strategy now.

In the dynamically changing world of cybersecurity, no one can afford to become complacent. As tech professionals, we understand this constant flux, watching as adversarial actors continually adapt their strategies and tools. We are stepping into an era where artificial intelligence (AI) is no longer a futuristic concept, but an active player in the cybersecurity landscape. This article aims to shed light on a significant aspect of AI in cybersecurity– its role in red team exercises.

In this article, we’ll explore why investing and integrating AI into red team operations should be a crucial part of any cybersecurity company’s strategic radar, and how this integration can help organizations stay one step ahead of ever-evolving threats.


Widget not in any sidebars

AI-Based Red Teaming: Why Enterprises Need to Practice Now


The Urgency of AI-Based Red Teaming

Integrating AI into cybersecurity capabilities is not just a forward-thinking approach; it’s an urgent requirement. The cybersecurity landscape is constantly evolving, and threats are becoming more sophisticated every day. AI and machine learning are not just buzzwords but tools increasingly being weaponized by adversaries to develop new attack vectors and evade traditional security measures. The democratization of AI brings numerous advantages but also lowers the barriers of entry for cyber-criminals, enabling them to harness AI for the development of exploits and execution of attacks. The rapid evolution of cyber threats requires organizations to go beyond reactive responses and proactively invest in AI to shield themselves effectively. Moreover, investing in AI empowers organizations to gain a deeper understanding of their vulnerabilities and anticipate potential attack scenarios, enabling proactive risk mitigation and enhancing overall security posture.

Against this backdrop, the integration of AI into red teaming operations is quickly transforming into a vital capability for contemporary enterprises. AI, when leveraged appropriately, can considerably enhance the abilities of red teams. It enables them to simulate real-world attacks more convincingly, thereby unearthing weaknesses in an organization’s defense mechanisms. Many organizations are already harnessing AI to develop innovative offensive tools to address specific use cases and bolster the effectiveness of red team engagements. With a background in penetration testing and red teaming, I can testify to the power of AI in aiding the generation of phishing emails and the development of social engineering campaign narratives, the gathering and aggregation of target information, and the significant amplification of malicious code development capabilities.

In the offensive domain, one area where AI proves to be a game-changer is code obfuscation. Obfuscation is a technique used by red teamers, and adversaries alike, to mask the true intent and functionality of malicious code. Red teamers frequently resort to obfuscation to make their simulated attacks stealthier and challenge a defensive security system’s ability to detect and counteract these threats. By integrating AI into this tactic, red teamers can automate, enhance, and accelerates the process of incorporating obfuscation techniques into their code. These techniques include aspects like encryption, which disguises the data within the code, and polymorphism, where the code changes each time it runs but maintains its original functionality. AI-assisted automation not only quickens this process but also allows the red teamers to constantly adapt their attack strategies to evade detection by security systems. The result? An enhanced capability to pressure-test an organization’s defenses effectively.

However, while AI’s role is transformative, it is vital to remember that it is not a panacea for all cybersecurity issues. It should be employed as a part of a wider security strategy. AI enhances our ability to respond to cyber threats, but it should work in harmony with other security measures to provide a comprehensive and multi-layered defense against cyber threats. Remember, a diverse defensive portfolio is key to a robust security stance.

Maintaining Security Posture

As we delve deeper into the potent combination of AI and red teaming, it’s clear that organizations need to approach this with a comprehensive plan. For enterprises that already incorporate AI and machine learning (ML) systems into their daily operations, the shift to an AI-enhanced red teaming approach can be an organized progression rather than a sudden leap. Let’s explore a systematic approach that these organizations can adopt to maintain a thorough understanding of their security posture:

  1. Conduct a comprehensive security assessment: This forms the foundation of your security strategy. Identify vulnerabilities in your system and create a benchmark to measure the effectiveness of your security controls. Techniques like vulnerability scanning, penetration testing, and code review should be employed for a thorough assessment.
  2. Establish and routinely review security controls: These controls are specific to your AI/ML-based systems. They should include a variety of access control measures, robust authentication mechanisms, and effective data protection measures.
  3. Implement threat modeling: This practice will help identify potential attack scenarios. Once identified, security measures can be prioritized based on the likelihood of occurrence and the potential impact.
  4. Integrate monitoring and detection mechanisms: A proactive security stance also includes real-time identification and response to potential threats. Monitoring and detection mechanisms help in achieving this.

Bear in mind that while these steps provide a general pathway, the specifics must be customized to the unique needs of your enterprise and the nature of your AI/ML-based systems. The multi-faceted nature of AI and ML presents a challenging but exciting undertaking for organizations. This broad scope inevitably leads us to discuss a fundamental aspect of integrating AI into red teaming: the people who make it happen.

Building an AI-Based Red Team

Building an AI-based red teaming platform calls for a unique blend of skills and expertise. It’s not just about having proficiency in AI and ML, but also about understanding the interplay between technology, security, and the threat landscape.

So, who are the players in this team?

  • Red Teamers/Penetration Testers: The linchpins of any successful red teaming operation, these cybersecurity experts bring a deep understanding of the current threat landscape, the latest attack techniques, and the vulnerabilities that adversaries may exploit. They provide the backbone for realistic attack scenarios and are crucial for validating the effectiveness of the AI system.
  • Software Engineers/Developers: Responsible for developing the AI-based red teaming platform, a team of skilled software developers enables the building, testing, and deploying of such platforms. Their experience with integrating AI-based tools and frameworks into existing systems is invaluable.
  • Data Scientists: Lastly, the success of an AI-based red teaming platform will highly depend on the quality and relevance of the data used to train the machine learning models. Data scientists will assist developers to ensure that the data is accurate, unbiased, and representative of real-world scenarios.

As we navigate through an increasingly complex cyber threat landscape, AI’s role in red teaming emerges as an essential consideration for all tech professionals, especially CISOs. We’ve explored the transformative power of AI and how it can be harnessed to enhance red team operations, particularly in areas like code obfuscation. We’ve also highlighted the vital steps for organizations using AI/ML-based systems to bolster their cybersecurity postures, underlining the necessity of tailoring the approach to their unique needs. And we’ve delved into the people who play pivotal roles in creating an effective AI-based red teaming platform– from red teamers and software developers to data scientists. Each player brings their expertise to the table, contributing to the development of a robust platform capable of keeping organizations one step ahead of the evolving threats. As we continue to embrace the potential of AI in cybersecurity, the integration of AI into red teaming will undoubtedly become a crucial element in our collective journey toward building more secure digital landscapes.


Widget not in any sidebars

The post AI-Based Red Teaming: Why Enterprises Need to Practice Now appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
48797
Endpoint Security and Network Monitoring News for the Week of August 25; Auvik, Dope Security, Hewlett Packard Enterprises, and More https://solutionsreview.com/network-monitoring/endpoint-security-and-network-monitoring-news-for-the-week-of-august-25-auvik-dope-security-hewlett-packard-enterprises-and-more/ Fri, 25 Aug 2023 15:30:45 +0000 https://solutionsreview.com/endpoint-security-and-network-monitoring-news-for-the-week-of-august-25-auvik-dope-security-hewlett-packard-enterprises-and-more/ The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of August 25. This curated list features endpoint security and network monitoring vendors such as Auvik, Dope Security, Hewlett Packard Enterprises, and more. Keeping tabs on all the most relevant endpoint security and […]

The post Endpoint Security and Network Monitoring News for the Week of August 25; Auvik, Dope Security, Hewlett Packard Enterprises, and More appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
Endpoint Security and Network Monitoring News for the Week of August 25

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of August 25. This curated list features endpoint security and network monitoring vendors such as Auvik, Dope Security, Hewlett Packard Enterprises, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.


Widget not in any sidebars

Endpoint Security and Network Monitoring News for the Week of August 25


Auvik Announces Partnership with Jenne

Auvik, a provider of cloud-based network management software, this week announced a new partnership with Jenne Inc., a value-added technology solutions distributors and cloud services brokerage. Together, Auvik and Jenne will deliver network management and SaaS monitoring solutions to value-added resellers (VARs), managed service providers (MSPs), integrators and telephony service provider companies, ultimately serving small and medium-sized businesses.

Read on for more.

Fortress Adds Former Congressman John Katko to Its Advisory Board

John Katko, a former U.S. Congressman and New York Republican has joined the advisory board of Fortress Information Security (Fortress), a vendor of critical supply chain cyber security. Katko joins advisory board members Norm Willox, Ben Miron, Emily Murphy, Brian Harrell, and Anna Cotton. Katko, an original co-sponsor of the legislation that created the Cybersecurity and Infrastructure Security Agency (CISA) and a driving force behind the multiple increases in funding CISA received after its inception. He offers a unique perspective on how policy and legislation can drive industry action on cybersecurity.

Read on for more.

DoControl Launches SaaS to SaaS Remediation Workflows

DoControl, an SaaS security platform, announced the launch of its SaaS to SaaS Remediation Workflows. The new expansion will extend its offering for SaaS to SaaS critical capabilities and initiate on-demand, scheduled, and fully automated remediation workflows to minimize the risk of cybersecurity supply-chain attacks originated from SaaS OAuth tokens. Deploying DoControl’s SaaS to SaaS Remediation Workflows is straightforward and will provide DoControl’s SSP users with a comprehensive and holistic remediation process through discovery, control, and automated remediation.

Read on for more.

Dope Security Adds Shadow IT Monitoring Capability

This week, Dope Security, an endpoint security solutions provider, announced that it has added a shadow IT monitoring capability to its secure web gateway (SWG) offering, dope.swg. Dubbed Extended Shadow IT, the new feature is designed to help organizations keep track of when employees use unapproved IT resources, violating company policies on data security, privacy, or compliance. Monitoring personal and corporate types of access will allow organizations to monitor if and how much corporate data is being transferred to personal accounts. The dope.swg subscription gives users complete access to all of Dope’s secure web gateway features. This includes integrated URL filtering, SSL inspection with one-click error bypass, instant policy push, extended shadow IT monitoring, comprehensive cloud application controls, and customizable user and group-based policies.

Read on for more.

Asimily Announces New Report; Quantifies Hospitals’ IoT and IoMT Cybersecurity Risk

Asimily, an Internet of Things (IoT) and Internet of Medical Things (IoMT) risk management platform, this week announced the availability of a new report: Total Cost of Ownership Analysis on Connected Device Cybersecurity Risk. The full report highlights the unique cybersecurity challenges that healthcare delivery organizations (HDOs) face and the true costs of their IoT and IoMT security risks. HDOs have a low tolerance for service interruptions to network-connected devices and equipment because of their crucial role in patient outcomes and quality of care. Resource-constrained HDO security and IT teams continue to face operational difficulties in sufficiently securing critical systems from increasingly-sophisticated attacks, as their vast and heterogeneous IoMT device fleets complicate management and, left unchecked, offer a broad attack surface. The report concludes that adopting a holistic risk-based approach is the most cost-efficient and long-term-effective path for HDOs to secure their critical systems and IoMT devices.

Read on for more.

Hewlett Packard Announcement: YMCA of Greater Boston Chooses Aruba Instant On for Network Infrastructure

Hewlett Packard Enterprise announced this week that the YMCA of Greater Boston has updated its networking infrastructure with the Aruba Instant On small- and medium-sized business (SMB) portfolio. This enables the organization to support a growing number of Internet of Things (IoT) devices and other connected applications, while providing facility-wide connectivity for its members and visitors. The deployment is also reducing network management costs by 50 percent. As one of the largest private social services providers in Massachusetts, with an annual operations budget of over $84M, the YMCA of Greater Boston is utilizing its new network across 24 locations to innovate and digitize operations and provide guest Wi-Fi to more than 70,000 members and a total of nearly 2 million annual visits by members, program participants, visitors, and business partners.

Read on for more.


Expert Insights Section

expert insight badgeWatch this space each week as Solutions Review editors will use it to share new Contributed Content Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry thought leaders together to publish the web’s leading insights for enterprise technology practitioners.

US Cyber Trust Mark VS EU Cyber Resilience Act

Carsten Gregersen of Nabto examines the US Cyber Trust Mark, the EU Cyber Resilience Act, and what they both mean for IoT security. Finally, cybersecurity rules are coming to the Internet of Things (IoT). Following a decade of simultaneous endpoint and hacker growth, minimum cybersecurity thresholds will soon be in place for device vendors on either side of the Atlantic. Last month, The Biden Administration announced The Cyber Trust Mark, a consumer checkmark for digital products that meet required thresholds. Meanwhile, European leaders are currently debating The Cyber Resilience Act, legislation that will enshrine strong cybersecurity into law. But what impact will these rules have on device creators and consumers? And what differs between each jurisdiction? Let’s explore.

Read on for more.

Learning from MOVEit: What to Do When a Zero-Day is Identified

Pandian Gnanaprakasam of Ordr examines what we can learn from MOVEit and what to do when a zero-day event is identified. Disclosure of the MOVEit managed file transfer software vulnerability sent companies scrambling to identify, contain and patch the potentially disastrous security issue. It’s a big problem– MOVEit is used by thousands of companies, including an estimated 1,700 software companies and 3.5 million developers. MOVEit is also significantly used in the healthcare industry, with HHS taking the extraordinary step of issuing an alert about the vulnerability. Are we exposed? Do we use it? Have these vulnerabilities already been exploited in my network? How deeply have the hackers penetrated my network– and how much data has already been exfiltrated? These are the questions asked immediately after a vulnerability of this sort is identified. Despite vulnerability disclosures of this magnitude happening often (remember how Log4j ruined IT teams’ December holidays a couple of years ago?), many companies need help to see if they are exposed and how deep the exposure might be. While it’s easy to ask questions about a zero-day vulnerability like this, finding the answers — and ensuring you’re better prepared for future unexpected disclosures like this — takes some work.

Read on for more.

PCI DSS 4.0: Why Pen Testing is Key for Compliance

Eren Cihangir of Outpost24 makes the argument for why pen testing will be the key to meeting PCI DSS 4.0 Compliance. In a world where cyber-attacks are rife, and data breaches are an unfortunate daily occurrence, we’ve witnessed the disastrous impact when credit card information is breached. In 2017, the Equifax data breach exposed over 209,000 credit card details and impacted over 147 million people. The aftermath resulted in Equifax settling with regulators for $700 million. In 2019, Capital One (the fifth largest credit card issuer in the US) suffered a hack that compromised 106 million customers across the US and Canada. If we look more recently, HRM Enterprises, which owns the US’s largest independent hardware store, had 40,000 credit cards stolen because of a cyber-attack. To ensure that all merchants, credit card providers, and services that process, store, or transfer credit card data keep such information secure, they must adhere to the Payment Card Industry Data Security Standard (PCI DSS). This sets out the cybersecurity and privacy requirements to ensure these organizations maintain a safe environment. The compliance requirements are regularly being updated, with PCI version 4.0 announced in March 2022, with a deadline of March 31, 2024, for all organizations to be compliant.

Read on for more.


Widget not in any sidebars

The post Endpoint Security and Network Monitoring News for the Week of August 25; Auvik, Dope Security, Hewlett Packard Enterprises, and More appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
48786
Identity Management and Information Security News for the Week of August 25; Thoma Bravo, Rambus, Deep Instinct, and More https://solutionsreview.com/security-information-event-management/identity-management-and-information-security-news-for-the-week-of-august-25-thoma-bravo-rambus-deep-instinct-and-more/ Fri, 25 Aug 2023 15:29:58 +0000 https://solutionsreview.com/identity-management-and-information-security-news-for-the-week-of-august-25-thoma-bravo-rambus-deep-instinct-and-more/ The editors at Solutions Review have curated this list of the most noteworthy identity management and information security news for the week of August 25. This curated list features identity management and information security vendors such as Thoma Bravo, Rambus, Deep Instinct, and more. Keeping tabs on all the most relevant identity management and information […]

The post Identity Management and Information Security News for the Week of August 25; Thoma Bravo, Rambus, Deep Instinct, and More appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
Identity Management and Information Security News for the Week of August 25

The editors at Solutions Review have curated this list of the most noteworthy identity management and information security news for the week of August 25. This curated list features identity management and information security vendors such as Thoma Bravo, Rambus, Deep Instinct, and more.

Keeping tabs on all the most relevant identity management and information security news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month, in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy identity management and information security news items.


Widget not in any sidebars

Identity Management and Information Security News for the Week of August 25


Thoma Bravo Completes Acquisition of ForgeRock

Thoma Bravo and ForgeRock this week announced the completion of Thoma Bravo’s acquisition of ForgeRock in an all-cash transaction valued at approximately $2.3 billion. The acquisition agreement was previously announced on October 11, 2022, and approved by ForgeRock stockholders at ForgeRock’s Special Meeting of Stockholders held on January 12, 2023. Thoma Bravo also announced that it has combined ForgeRock into its portfolio company Ping Identity. The combined company is positioned to better serve customers across the dynamic and fast-growing Identity and Access Management market by providing enhanced products and services, broader geographic support, and increased innovation. The combined company will seek to accelerate the delivery of identity security experiences for the customers, employees, and partners of companies worldwide.

Read on for more.

Cyberint and Cyware Announce Dark Web Intelligence Integration

This week, Cyberint, a cybersecurity solutions provider, announced its integration with Cyware,a provider of threat intelligence management solutions. The combined solution enables organizations to access and integrate contextual threat intelligence, enhance their threat-hunting capabilities, and automate collaborative response actions to potential attacks. The joint solution and use cases will be detailed in an upcoming webinar on August 29 at 1:00 pm EDT.

Read on for more.

Concentric AI Announces Multi-Lingual Support for DSPM Platform

Concentric AI, a data security solutions provider, this week announced support for data in German, Spanish, Italian, French, and Dutch languages, enabling it to meet rapidly growing global demand for its DSPM solution. Concentric AI’s DSPM solution scans organizations’ data, detects sensitive or business critical content, identifies the most appropriate classification category, and automatically tags the data. Concentric AI uses artificial intelligence (AI) to improve discovery and classification accuracy and efficiency to “avoid endless regex rules and inaccurate end user labeling.” In addition, Concentric AI can monitor and autonomously identify risk to financial and other data from inappropriate permissioning, wrong entitlements, risky sharing, and unauthorized access. It can automatically remediate permissions and sharing issues or leverage other security solutions and cloud APIs to quickly and continuously protect exposed data.

Read on for more.

Rambus Announces Full Suite of Security IP Solutions for the FPGA Market

Rambus Inc., a chip and silicon IP provider, this week announced a full suite of Security IP solutions for the FPGA market with “state-of-the-art” cryptographic, side-channel, and Quantum Safe protections. Designed to meet the unique needs of FPGAs, the offering secures the broad range of devices from high-performance accelerators for generative AI, to low-power solutions for IoT devices. Rambus security IP protects FPGAs serving applications in the Data Center, AI/ML, Edge, IoT, Defense, and beyond.

Read on for more.

ELB Learning and CyberCatch Unveil HackOps, A Cybersecurity Learning Game

ELB Learning, an e-learning solutions and services provider, announced a new corporate learning and development game, HackOps. This game is the first in a series of next-generation cybersecurity awareness training games created by CyberCatch in partnership with ELB Learning. CyberCatch is an industry-leading defense-grade AI-enabled cybersecurity compliance and cyber risk mitigation solution provider. This engaging gamified course combines the best of two entertainment worlds: movies and games, into “an immersive VR experience like no other.”

Read on for more.

Deep Instinct Research: “Significant Increase in Cybersecurity Attacks Fueled by Generative AI”

Deep Instinct, a cybersecurity solutions provider, released the fourth edition of its Voice of SecOps Report. The research – “Generative AI and Cybersecurity: Bright Future or Business Battleground?” – was conducted by Sapio Research and surveyed over 650 senior security operations professionals in the US, including CISOs and CIOs. The study highlights the impact of generative AI in the cybersecurity industry, analyzing the technology’s positive and negative effect on organizations’ security postures and preparedness. The research found that 75 percent of security professionals witnessed an increase in attacks over the past 12 months, with an astonishing 85 percent attributing this rise to bad actors using generative AI.

Read on for more.


Expert Insights Section

expert insight badgeWatch this space each week as Solutions Review editors will use it to share new Contributed Content Series articles, Contributed Shorts videos, Expert Roundtable and event replays, and other curated content to help you gain a forward-thinking analysis and remain on-trend. All to meet the demand for what its editors do best: bring industry thought leaders together to publish the web’s leading insights for enterprise technology practitioners.

Only Up: Building SecOps in the Cloud

Maxime Lamothe-Brassard of LimaCharlie says the only place left for SecOps development to go is up– into the cloud. SecOps in 2023 is a lot like IT was in 2003– cumbersome. However, just as Amazon transformed IT with AWS and EC2 to enable flexible and scalable services, there is the potential to transform SecOps with a cloud platform, which could also enable efficient and cost-effective services. SecOps has been bound by multiple-point solutions and tied down by multi-year contracts. Even worse, many of these solutions lack any sort of meaningful customization or require a second layer of solutions just to manage the first. However, just as the cloud-enabled economies of scale, easy configuration, and integration via APIs, SecOps now has the opportunity to embrace the same transformation. There are multiple operating systems, an endless spectrum of applications and services, databases, developers, devices, and different users. Security teams frequently have to stitch together integrations between intractable black-box solutions and open-source tools. SecOps has become a burden and the cloud could lighten the load.

Read on for more.


Widget not in any sidebars

The post Identity Management and Information Security News for the Week of August 25; Thoma Bravo, Rambus, Deep Instinct, and More appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
48784
The 13 Best VPN Services in 2023 https://solutionsreview.com/network-monitoring/best-vpn-services/ Wed, 23 Aug 2023 20:50:47 +0000 https://solutionsreview.com/best-vpn-services/ The editors at Solutions Review examine the best VPN services enterprises should consider implementing into their security strategy today. Virtual Private Network (VPN) services are pivotal in fortifying enterprise security through advanced encryption, secure data transmission, and enhanced privacy mechanisms. In the contemporary landscape of interconnected digital operations, VPNs serve as a vital shield against […]

The post The 13 Best VPN Services in 2023 appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
Best VPN Services

The editors at Solutions Review examine the best VPN services enterprises should consider implementing into their security strategy today.

Virtual Private Network (VPN) services are pivotal in fortifying enterprise security through advanced encryption, secure data transmission, and enhanced privacy mechanisms. In the contemporary landscape of interconnected digital operations, VPNs serve as a vital shield against cyber threats and unauthorized access. By establishing encrypted tunnels over public networks, VPNs enable employees to access sensitive corporate resources remotely, while shielding their communications from potential eavesdropping and data interception. This encryption not only safeguards proprietary information, trade secrets, and confidential communication from cyber-criminals but also protects against potential breaches when using unsecured networks. Furthermore, VPNs can ensure that data is routed through secure and monitored pathways, reducing the risk of man-in-the-middle attacks and preventing cyber adversaries from exploiting vulnerabilities in open Wi-Fi networks.

Through a stringent authentication process, VPNs enforce multi-factor authentication and user identity verification, ensuring that only authorized personnel can access critical enterprise systems. Additionally, VPNs can provide location masking, which obscures the actual geographical location of employees– making it more challenging for malicious actors to target specific individuals. Overall, by bolstering data confidentiality, securing remote connections, and mitigating exposure to cyber threats, VPN services stand as an indispensable component of modern enterprise security frameworks.

If a VPN isn’t already part of your business’s cybersecurity strategy, these are the best VPN services to consider today.


Widget not in any sidebars

The 13 Best VPN Services in 2023


Atlas VPN

Atlas VPNFounded in 2019, Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone. In 2021, Atlas VPN became part of Nord Security— a leader in providing digital security and privacy solutions. While relatively new to the VPN scene, they are already trusted by more than 6 million users across the world. Their main driving force is to make digital privacy and security accessible to all consumers, irrespective of their budget or tech-savviness. Anyone is welcome to try Atlas VPN for free or sign up for premium services with more additional features.


CyberGhost

CyberGhost VPNCyberGhost is a Romania-based VPN provider that protects users’ data from online surveillance and censorship. Since 2011, the company has been preventing shady organizations and actors who wish to profit off of personal information maliciously. With CyberGhost, users can mask their IP address by connecting to one of over 5,700 VPN servers located in 90 countries, keeping their web traffic anonymous and secure. CyberGhost defends privacy as a fundamental human right, being the first in the industry to publish a transparency report while building new user-oriented crypto-technology for the future.


ExpressVPN

ExpressVPNExpressVPN is a British-based company whose VPN solution lets users securely and anonymously browse the web and access blocked worldwide content from anywhere. The company currently hosts over 3,000 VPN servers, with 160 server locations in 94 countries across the globe, and users have the option to switch between servers whenever they want. Users can hide their IP addresses from potentially malicious actors and enjoy anonymous web surfing, unlocked regional content, and unthrottled data speeds.


GoodAccess

GoodSecureFounded in 2020, GoodAccess is a Czech-based cloud VPN with zero-trust access controls specially designed for small and medium businesses. Developed with simplicity and ease of use in mind, GoodAccess is a secure remote access solution that interconnects remote workers, applications, data centers, clouds, and offices via one resilient virtual network. No hardware or complex setup is required, as the platform is fully cloud-based and is deployable in less than 10 minutes. With customers in over 120 countries, GoodAccess is recognized by TechRadar as one of the best ZTNA solutions and acclaimed by leading review platforms such as G2 and Capterra for its excellence in customer support, simplicity, and ease of use.


HideMyAss!

HideMyAss!HMA is a United Kingdom-based virtual private network provider that has operated as a subsidiary of the Czech cybersecurity company Avast since 2016. Founded in 2005, the vendor is one of the oldest VPN providers still in existence. HMA provides digital software and services intended to help users remain anonymous online and encrypt their online traffic. Its software is used to access websites that may be blocked in the user’s country, to anonymize information that could otherwise be used by hackers, and to do something unscrupulous without being identified. HMA operates over 1,000 servers in 290 locations across the globe and offers VPN applications for Windows, Mac, iOS, Android, Linux, routers, Apple TV, Android TV, Chrome, and Firefox.


IPVanish

IPVanishIPVanish is a USA-based virtual private network provider founded in 2012 that was recently acquired in 2019 by J2 Global. The vendor offers VPN software and applications for desktop and mobile devices, including Windows, macOS, iOS, Android, Linux, ChromeOS, and Amazon devices. IPVanish also offers VPN software for routers. IPVanish uses the OpenVPN and IKEv2/IPsec technologies in its applications, while the L2TP and PPTP connection protocols can also be configured. IPVanish supports the AES (128-bit or 256-bit) specifications, with SHA-256 for authentication and an RSA-2048 handshake IPVanish currently operates over 1,300 servers in over 75 global locations, with most of its servers located in North America and Europe.


NordVPN

NordVPNNordVPN is a Panama-based virtual private network provider formed in 2012 to fight against Internet censorship, content control, and intrusive government surveillance. As of 2020, the vendor helps more than 12 million customers protect their online transactions and web traffic from Internet surveillance and cyber threats. The vendor operates over 5500 VPN servers in 58 countries, providing military-grade encryption, DNS leak protection, and lightning-fast data speeds. In April 2022, NordVPN’s parent company Nord Security raised $100 million in a round of funding led by Novator. The company’s valuation reached $1.6 billion.


PrivadoVPN

PrivadoVPNPrivadoVPN is a Switzerland-based platform, launched in 2019. PrivadoVPN’s simple-to-use apps for Android, Windows, macOS, iOS, Fire TV Stick, and AndroidTV. You can also access their super fast servers manually in Linux. When you connect to the PrivadoVPN network, you are protected by 256-bit AES encryption. All of your incoming and outgoing data is sent through an encrypted tunnel so that third parties won’t be able to intercept your private information. There’s even the option to securely access region-blocked content by changing to any of their global servers– effectively masking your IP address and physical location.


Private Internet Access

Private Internet AccessPrivate Internet Access is a USA-based virtual private network provider founded in 2010 and recently acquired by Kape Technologies in 2019. The vendor offers applications for Windows, Mac, iOS, Android, Linux, and Google Chrome devices to provide uncensored access to the Internet and allow users to browse the web privately and securely. Private Internet Access currently operates over 3,300 servers in over 50 locations across over 30 countries. The VPN is torrent-friendly, provides SOCKS5 Proxy feature, and also port forwarding function.


Surfshark

SurfSharkSurfshark is a British Virgin Islands-based virtual private network provider founded in 2018. In 2021 Surfshark merged with Nord Security. However, both companies still operate independently. The vendor offers VPN applications for multiple platforms and devices, including iOS, Android, macOS, Windows, Linux, Chrome, Firefox, FireTV, and Apple TV. Surfshark currently offers over 1,040 servers in more than 61 countries. All of Surfshark’s servers come with private DNS, Camouflage Mode, IPsec/IKEv2, P2P-friendly capabilities, OpenVPN, and extension support.


TorGuard

TorGuardTorGuard is a Caribbean-based virtual private network provider that was founded in 2012. The vendor offers anonymous VPN applications for several common operating systems, devices, and browsers, including Windows, macOS, Linux, Android, iOS, Firefox, and Chrome. TorGuard currently operates over 3,000 servers in 50 countries across the globe. In addition to allowing users to browse the Internet anonymously, the provider offers a 24/7 support system to help keep your company protected.


TunnelBear

TunnelBearTunnelBear is a Canada-based virtual private network provider founded in 2011 and acquired by McAfee in 2018. The vendor offers VPN applications for multiple device types and operating systems, including Windows, Mac, iOS, and Android devices. TunnelBear also offers VPN for web browsers like Chrome, Firefox, and Opera; in addition, the company provides a specific service called Blocker for Chrome to attack online tracking. The VPN currently runs VPN servers in 23 different countries across the globe.


VyprVPN

VyprVPNVyprVPN is a Switzerland-based virtual private network solution offered by Internet privacy and security solution provider Golden Frog. The solution currently operates over 700 servers in over 70 different locations and currently offers VPN applications for Windows, Mac, Android, and iOS devices. In addition, VyprVPN also delivers specific apps for routers and smart TVs. In addition to providing IP address protection and high-speed streaming, the vendor offers a 24/7 support system to help keep your company protected.


Widget not in any sidebars

The post The 13 Best VPN Services in 2023 appeared first on Solutions Review Technology News and Vendor Reviews.

]]>
48758