Last week Nethone partnered with FinMont, extending its potential customer base and bringing additional data to further improve fraud detection. Enterprise Times spoke to Alasdair Anderson, Vice President at Protegrity, about its latest solution for cross-border data flows, the Protegrity Borderless Data Solution.
Check Point Software Technologies
Check Point Software Technologies Ltd announced the appointment of Roei Golan to Chief Financial Officer after serving as acting Chief Financial Officer since November 2022. Mr Golan brings over 15 years of experience in finance to the role.
The company also announced the expansion of its Check Point Harmony Endpoint protection solution by incorporating vulnerability and automated patch management capabilities. This enhancement addresses the mounting number of cyberattacks that exploit unpatched system vulnerabilities for unauthorized access.
To deliver this advanced feature, Check Point has joined forces with Ivanti, integrating Ivanti Patch Management to assess and remediate software vulnerabilities from cloud to edge into Check Point’s Harmony Endpoint protection solution.
The Check Point Global Threat Index for April 2023 was also published. Last month, researchers uncovered a substantial Qbot malspam campaign distributed through malicious PDF files attached to emails seen in multiple languages. Meanwhile, Internet-of-Things (IoT) malware Mirai made the list for the first time in a year after exploiting a new vulnerability in TP-Link routers. Healthcare moved up to become the second most exploited industry.
Check Point Software Technologies Ltd announced that its MIND training program is now NICE compliant. Created by the National Institute of Standards and Technology (NIST), the National Initiative for Cybersecurity Education (NICE) framework is a fundamental reference for describing and sharing information about cybersecurity work.
Dragos published a fascinating blog laying out the timeline of a failed extortion attempt against Dragos. No Dragos systems were breached, including anything related to the Dragos Platform. This transparency is a welcome change to many others. It flagged four lessons learnt and seven recommendations which are worth reading.
The lessons learned were:
- In response to this event, Dragos added verification steps to further harden our onboarding process and ensure this technique cannot be repeated.
- Every thwarted access attempt was due to multi-step access approval. Dragos is now evaluating expanding this additional control based on system criticality.
- Positive outcomes further reinforce our resolve not to engage or negotiate with cybercriminals.
- Verbose system activity logs enabled this security event’s rapid triage and containment.
Experian has introduced a fintech-focused version of Experian’s Hunter, an industry-leading fraud prevention data network, to the United States. This new U.S. fintech data network already has participation commitments from nine leading fintechs and is designed to bring a new level of protection to businesses and consumers from fraud.
Robert Boxberger, president at Experian Decision Analytics in North America, commented, “Experian is dedicated to the fintech industry and to delivering innovative, data-driven solutions that can help protect them and the consumers they serve from sophisticated fraudsters.
“Our new U.S. Hunter network will harness the power of data and analytics to address real pain points that fintechs experience in combatting fraud. By taking a collaborative approach, fintechs can use this additional data to make more informed decisions that enable smart portfolio growth, improve the customer experience and mitigate major fraud losses.”
Fortra announced a compelling connection between JAMS, its top-rated workload automation and job scheduling solution and Automate, its robotic process automation solution. This first-of-its-kind integration allows organizations to supercharge their automation footprint by incorporating Automate’s low code approach to building automation with the powerful orchestration capabilities of JAMS.
Dan Laun, Managing Director of Automation at Fortra, said, “Business users are looking to build automation more than ever before but require a user-friendly solution to help streamline manual tasks associated with legacy systems and third-party websites. Likewise, we recognize that the need for connectors to applications has increased significantly.”
Ivanti has appointed software industry veteran Peter De Bock as the company’s Chief Financial Officer. De Bock will oversee all areas of the company’s Finance structure and the Facilities teams in this role.
Logpoint has appointed Sven Bagemihl as Regional Director for the CEMEA region, including Germany, Switzerland, and Austria. Following the recent investment by Summa Capital, it has also appointed veteran cybersecurity executive Frank Brandenburg to the Logpoint board.
Jesper Zerlang, Logpoint CEO, commented, “With Sven and Frank, we are adding almost 60 years of technology and cybersecurity leadership experience to the Logpoint team. We are increasing Logpoint reach and capability, extending our ability to serve strategic partners and customers, and strengthening our position in the CEMEA market, particularly in Germany. They will be key assets on our way to creating the strongest European cybersecurity company with global reach.”
LogRhythm announced a technology partnership with Mimecast. LogRhythm and Mimecast’s integration will help organizations around the globe protect against modern cyberattacks.
Organizations need the ability to correlate data from their disparate security products and services to distinguish the real threats from false alarms. LogRhythm SIEM integrates Mimecast’s email security capabilities with LogRhythm’s enterprise threat management.
LogRhythm’s scenario and behavioural-based analytics automatically consume email security data from the Mimecast cloud service and other security data from across an organization to deliver real-time threat protection based on up-to-date situational awareness and comprehensive security analytics.
Andrew Hollister, Chief Information Security Officer at LogRhythm, said, “Our integration with Mimecast is the latest example of LogRhythm maintaining its position and commitment as an authentic customer-centric partner. This integration is a game-changer as it empowers security teams to identify behavioral anomalies, internal and external threats, and to prioritize their responses based on accurate enterprise security intelligence.
“Protecting the organization against email-borne attacks should be a top priority and with this integration, organizations can gain deeper visibility into their email environment and detect email-based threats more quickly and effectively.”
Mimecast announced the executive appointment of David Call as Chief Financial Officer. Peter Bauer, Mimecast’s Chief Executive Officer, commented, “At Mimecast, we hold ourselves to the standard that actions speak louder than words.
“The appointment of David Call as Chief Financial Officer, as well as our two recent appointments in April, signify our company’s continuing commitment to investing in deeply experienced executives with a proven track record of success. David has led finance teams at industry leaders like McAfee and Intel, and we couldn’t be more excited to welcome him to the Mimecast family.”
Call commented, “Mimecast’s 20-year track record of growth and innovation was a key factor in my decision to join the company. I’m thrilled to join the Mimecast executive leadership team at such a pivotal time in the company’s transformational journey. I look forward to helping Mimecast exceed its growth and financial goals while continuing to foster a collaborative, values-driven culture.”
SolCyber has partnered with DNSFilter to simplify DNS security for small to mid-sized organizations across the globe. DNFilter’s threat protection solution will be bundled into SolCyber’s foundational and extended coverage-managed security programs as part of the engagement.
Carl Levine, Sales Engineer, DNSFilter, said, “SolCyber and DNSFilter are both on a mission to make it easier for employers to protect their business and employees from threats on the internet. The DNS-layer is ripe for exploitation from a hacker’s perspective, so protection is an essential part of the security stack. Now SolCyber customers have a simple way to deploy a DNS threat protection and content filtering solution in minutes.”
Scott McCrady, CEO, SolCyber, said, “There are more than 3,500 security vendors to choose from. Our goal is to remove the headache from the selection process, and we believe DNSFilter is the best choice for DNS protection. Their offering is accurate, reliable, easy to deploy and aligns with our modern approach to cybersecurity. We’re glad to have them on board as a technology partner and are excited about the value they bring our customers.”
Sophos has released its annual “State of Ransomware 2023” report. It found that in 76% of ransomware attacks against surveyed organizations, adversaries succeeded in encrypting data. This is the highest rate of data encryption from ransomware since Sophos started issuing the report in 2020.
The survey also shows that when organizations paid a ransom to decrypt data, they doubled their recovery costs ($750,000 in recovery costs versus $375,000 for organizations that used backups to get data back). Moreover, paying the ransom usually meant longer recovery times, with 45% of those organizations that used backups recovering within a week, compared to 39% of those that paid the ransom.
Overall, 66% of the organizations surveyed were attacked by ransomware—the same percentage as the previous year. This suggests that the rate of ransomware attacks has remained steady, despite any perceived reduction in attacks.
Other findings included:
- In 30% of cases where data was encrypted, data was also stolen, suggesting this “double dip” method (data encryption and data exfiltration) is becoming commonplace
- 79% of higher education organizations surveyed and 80% of lower education organizations surveyed reported that they were ransomware victims, the highest of any sector.
- 46% of organizations surveyed that had their data encrypted paid the ransom. Larger organisations paid more than 50% of the time
Chester Wisniewski, field CTO Sophos, commented, “Rates of encryption have returned to very high levels after a temporary dip during the pandemic, which is certainly concerning. Ransomware crews have been refining their methodologies of attack and accelerating their attacks to reduce the time for defenders to disrupt their schemes.
“Incident costs rise significantly when ransoms are paid. Most victims will not be able to recover all their files by simply buying the encryption keys; they must rebuild and recover from backups as well. Paying ransoms not only enriches criminals, but it also slows incident response and adds cost to an already devastatingly expensive situation.”
An assessment by AV-TEST found that the Vercara DNS-layer threat detection and response service, UltraDDR detected 87% of malicious executable files in an independent evaluation. UltraDDR also detected over 84% of links to other malicious content.
Carlos Morales, senior vice president of solutions at Vercara, commented, “At Vercara, we’ve been measuring UltraDDR’s efficacy since before we launched the product and have observed that it consistently detects malicious hostnames that other commercial products do not. The results from AV-TEST come as no surprise. Although they are a source of pride, they also provide motivation to continue innovating and applying lessons learned to build on our leading results.”
Zimperium has launched the Zimperium Mobile-First Security Platform. This single platform unifies Zimperium Mobile Threat Defense (MTD) – formerly known as zIPS – and Mobile Application Protection Suite (MAPS), unleashing powerful new features designed for teams who bear security responsibility across the entire mobile security spectrum.
Through a ‘single pane of glass’, customers now have centralized access to and management of Zimperium’s mobile application security and endpoint security solutions, providing them full mobile coverage to dynamically adapt to emerging threats.
Shridhar Mittal, Chief Executive Officer at Zimperium, commented, “Today’s CISOs need to prioritize a mobile-first security strategy to stay ahead of attacks. There are a host of point solutions on the market for securing devices and applications, but none come together to provide an end-to-end platform to unlock the power of a mobile-powered business strategy.
“The Zimperium Mobile-First Security Platform uniquely provides the most comprehensive mobile capabilities for risk reduction, global visibility, threat detection and response for both endpoints and apps.”