November 17, 2022

Cyera partners with Wiz to accelerate cloud security

Cyera integrate with Wiz to provide prioritized attack surface minimization and automated remediation based on sensitive data exposure. Cyera leverages its Data Security Graph to help security teams quickly understand the blast radius that an active security threat or vulnerability represents, and how to respond to remediate the issue. “Wiz introduced a new approach to …

Cyera partners with Wiz to accelerate cloud security Read More »

Climb Channel Solutions collaborates with Beyond Identity to improve zero trust strategy for enterprises

Climb Channel Solutions partners with Beyond Identity to bring a passwordless multi-factor authentication (MFA) solution to its network of value-added resellers. As a leading distributor of cybersecurity solutions, Climb continues to represent proven technologies that have a dramatic impact on an organization’s cybersecurity preparedness. With Beyond Identity, Climb is adding ransomware and account takeover attack …

Climb Channel Solutions collaborates with Beyond Identity to improve zero trust strategy for enterprises Read More »

Resecurity and HAMI Security partner to protect private and public sectors in the Kingdom of Saudi Arabia

Resecurity and HAMI Security partnership will allow HAMI Security to offer a cyber threat intelligence (CTI), dark web monitoring (DWM), digital risk management (DRM), fraud prevention (FP) and identity protection (IDP) products to consumer and enterprise organizations. The comprehensive portfolio of solutions will accelerate specialized offerings for MSSPs/ISPs and large enterprise customers looking to streamline …

Resecurity and HAMI Security partner to protect private and public sectors in the Kingdom of Saudi Arabia Read More »

SecuriThings and Axis join forces to improve customers’ end-to-end visibility and control

SecuriThings has strengthened its partnership with Axis Communications (Axis) to simplify and improve the operational management of physical security infrastructure. By introducing a deeper integration between Axis devices and the SecuriThings Horizon solution, the partnership helps customers gain end-to-end visibility and control — not only of their physical security devices, but also of these devices’ …

SecuriThings and Axis join forces to improve customers’ end-to-end visibility and control Read More »

Leveraging Content Management Software to Facilitate a Cloud-First Approach

By Milan Shetti, CEO Rocket Software In today’s fast-paced digital business world, organizations have become highly adaptive and agile to keep up with the ever-evolving demands of consumers and the market. This has pushed many organizations to accelerate their digital transformation efforts in order to remain competitive and better serve their constituents — and there …

Leveraging Content Management Software to Facilitate a Cloud-First Approach Read More »

Akeyless raises $65 million to expand and enhance its platform

Akeyless has raised $65 million in series B funding, bringing the total funding to date to $80 million. The round was led by NGP Capital, with participation from existing investors Team8 Capital and Jerusalem Venture Partners (JVP). In addition, the company announced that Mike Christenson, the former COO & President of New Relic and CA …

Akeyless raises $65 million to expand and enhance its platform Read More »

Alibaba Cloud Granting Significant Contribution Partner Award to Elastic at Apsara 2022

At this conference, the two parties jointly launched the latest Alibaba Cloud Elasticsearch serverless version, providing end-to-end data access, data management, data application, and visualization module component capabilities around the Elastic Stack ecological components, as well as scenario-based upper-layer application capabilities. The launch of this version can avoid the complexity of large-scale cluster operation and …

Alibaba Cloud Granting Significant Contribution Partner Award to Elastic at Apsara 2022 Read More »

Palo Alto Networks to Buy Cider Security for at Least $195M

Next-Generation Technologies & Secure Development , Secure Software Development Lifecycle (SSDLC) Management Palo Alto’s First Big M&A Since Early 2021 Will Help Secure Engineering Processes Michael Novinson (MichaelNovinson) • November 17, 2022     Update – Nov. 17, 2022: This story has been updated with information and quotes from the press release announcing the acquisition. …

Palo Alto Networks to Buy Cider Security for at Least $195M Read More »

Australia Unveils Plan to Counter Global Cybercrime Problem

Fraud Management & Cybercrime , Legislation & Litigation , Ransomware Key Initiatives Include New Task Force and Ban on Ransomware Payments to Criminals Mihir Bagwe (MihirBagwe) • November 17, 2022     Source: Shutterstock Following a spate of cyberattacks and data breaches affecting millions of Australians, the government‘s cybersecurity minister this week announced the formation …

Australia Unveils Plan to Counter Global Cybercrime Problem Read More »

More SRE Lessons for SOC: Simplicity Helps Security

As we discussed in our blogs, “Achieving Autonomic Security Operations: Reducing toil”, “Achieving Autonomic Security Operations: Automation as a Force Multiplier,” “Achieving Autonomic Security Operations: Why metrics matter (but not how you think)”, and the latest “More SRE Lessons for SOC: Release Engineering Ideas” your Security Operations Center (SOC) can learn a lot from what …

More SRE Lessons for SOC: Simplicity Helps Security Read More »

Sabre Launches Partnership with Girls Who Code

Sabre Corporation today announced a partnership with Girls Who Code (GWC), an international non-profit organization dedicated to closing the gender gap in technology and changing the image of what a programmer looks like and does.  Sabre’s sponsorship will help empower a generation of change-makers by supporting Girls Who Code after school clubs for 3rd to 12th …

Sabre Launches Partnership with Girls Who Code Read More »

Watchdog: Agency overseeing cybersecurity for offshore energy falling short

Written by Christian Vasquez Nov 17, 2022 | CYBERSCOOP The federal enforcement office that oversees more than 1,600 offshore oil and gas facilities has done little to address growing cybersecurity risks, according to a watchdog report released on Thursday. The Government Accountability Office said that the Department of Interior’s Bureau of Safety and Environmental Enforcement …

Watchdog: Agency overseeing cybersecurity for offshore energy falling short Read More »

Analysts Welcome NSA’s Advice for Developers to Adopt Memory-Safe Languages

Security analysts welcomed a recommendation from the US National Security Agency (NSA) last week for software developers to consider adopting languages such as C#, Go, Java, Ruby, Rust, and Swift to reduce memory-related vulnerabilities in code. The NSA described these as “memory safe” languages that manage memory automatically as part of the computer language. They …

Analysts Welcome NSA’s Advice for Developers to Adopt Memory-Safe Languages Read More »

Security firms hijack New York trees to monitor private workforce

Private security firms in New York City have co-opted public resources – specifically trees – to track their guards as they make their rounds. According to Gothamist, a New York-focused news site, security contractors have been drilling into trees on public city streets to install signaling hardware to ensure that guards are following their patrol …

Security firms hijack New York trees to monitor private workforce Read More »

Biden set to approve expansive authorities for Pentagon to carry out cyber operations

Written by Suzanne Smalley Nov 17, 2022 | CYBERSCOOP The Defense Department has largely won out in a long-running bureaucratic battle with the State Department over retaining its expansive powers to launch cyber operations without significant input from other government agencies, according to two sources familiar with the matter. While the exact details of which …

Biden set to approve expansive authorities for Pentagon to carry out cyber operations Read More »

Two public schools in Michigan hit by a ransomware attack

Public schools in two Michigan counties were forced to halt their activities, including the lessons, after a ransomware attack.   Public schools in Jackson and Hillsdale counties, Michigan, reopen after a closure of two days caused by a ransomware attack that hit its systems. The public schools started experiencing a systems outage affecting critical operating …

Two public schools in Michigan hit by a ransomware attack Read More »

MITRE ResilienCyCon: You Will Be Breached So Be Ready

Speakers at last week’s MITRE ResilienCyCon conference had a surprisingly candid message for attendees: You will likely be breached at some point so focus on the controls and response capabilities your organization needs to survive a cyber attack. The conference’s focus on cyber resiliency doesn’t mean that organizations should abandon core security defenses like EDR, …

MITRE ResilienCyCon: You Will Be Breached So Be Ready Read More »

Sample Patch Management Policy Template

[How to use this template:] [Comments intended to guide understanding and use of this template will be enclosed in brackets “[…]” and the ‘company’ will be listed as [eSecurity Planet] throughout the document. When converting this template to a working policy, eliminate the bracketed sections and replace “[eSecurity Planet]” with “YourCompanyName.” This policy will reflect …

Sample Patch Management Policy Template Read More »

KOSA Would Let the Government Control What Young People See Online

The latest version of the Kids Online Safety Act (KOSA) is focused on removing online information that people need to see—people of all ages. Letting governments—state or federal—decide what information anyone needs to see is a dangerous endeavor. On top of that, this bill, supposedly designed to protect our privacy, actually requires tech companies to …

KOSA Would Let the Government Control What Young People See Online Read More »