Dtex Systems, Freshfields Bruckhaus Deringer LLP Provide Insider Threat Risk Advice at Cyber Security Connect UK

Dtex Systems, Freshfields Bruckhaus Deringer LLP Provide Insider Threat Risk Advice at Cyber Security Connect UK

Dtex Systems today announced that Freshfields Bruckhaus Deringer LLP CISO Mark Walmsley and Dtex EMEA VP Mark Coates will share the stage at Cyber Security Connect UK to discuss the insider threat. CISOs and other security and risk professionals who attend the session will receive a real-world look at how highly-regulated organizations identify, detect and reduce insider risk.

Freshfields is one of the globe’s largest law firms. Known for supporting the world’s leading national and multinational organizations on ground-breaking and business-critical mandates, the company has become adept at protecting sensitive information, detecting all forms of threats, and compliance with global regulations. Walmsley is a recognized insider threat authority and champion of the evolving role of the CISO. He makes regular appearances at trade shows and within industry media, providing the security community with actionable advice and insights.

Dtex Systems provides public and private sector organizations, including the world’s largest banks, government agencies and law firms, with advanced user behavior intelligence that scales across vast user groups to detect insider threats. With the only privacy patent awarded in its field, Dtex responds to privacy regulations such as the GDPR. Coates is an award winning cybersecurity leader, noted for his expertise in the insider threat field and knowledge of the pressures that privacy regulations add to the challenge.

Session Details Title: Are You Protected Against Threats from Within? Detecting Insider Threats with Dtex, Freshfields
When: Thursday, November 8, 20183:30 PM – 4 PM
Where: Cyber Security Connect UK, The Meridien Beach Plaza, Monaco
Details: https://www.cybersecurityconnectuk.com/Program/Workshops-and-Round-Tables
Register: https://www.cybersecurityconnectuk.com/

Learn more about Dtex: www.dtexsystems.com
Follow Dtex on Twitter: https://twitter.com/DtexSystems
Join Dtex on LinkedIn: https://www.linkedin.com/company/dtex-systems
Like Dtex on Facebook: https://www.facebook.com/Dtex-Systems-297181017056254

About Freshfields Bruckhaus Deringer LLP
Freshfields Bruckhaus Deringer LLP is a global law firm with a long-standing track record of successfully supporting the world’s leading national and multinational corporations, financial institutions and governments on ground-breaking and business-critical mandates. Our 2,800 plus lawyers deliver results worldwide through our own offices and alongside leading local firms.  Our commitment, local and multi-national expertise and business know-how means our clients rely on us when it matters most.

About Dtex Systems
Dtex Systems arms enterprises across the globe with revolutionary technology to protect against user threats, data breaches, and outsider infiltration. As the only solution combining unparalleled endpoint visibility with advanced analytics, Dtex is able to pinpoint threats with greater accuracy than traditional security methods without adversely impacting user productivity. To learn more, visit www.dtexsystems.com

Logo – https://mma.prnewswire.com/media/680256/Dtex_Systems_Logo.jpg

SOURCE Dtex Systems
Related Links

SOURCE URL: http://www.prnewswire.co.uk/news-releases/dtex-systems-freshfields-bruckhaus-deringer-llp-provide-insider-threat-risk-advice-at-cyber-security-700009802.html

Contrast Security Joins the Cybersecurity Tech Accord To Promote a Safer Online World

Contrast Security Joins the Cybersecurity Tech Accord To Promote a Safer Online World

Contrast Security is committed to protecting and empowering civilians online and to improve the security, stability and resilience of cyberspace

Contrast Security, the pioneer in self-protecting software, today announced it has joined more than 60 global companies in a commitment to defend all customers from malicious attacks by cybercriminals. Contrast Security is one of the youngest security firms to join the Cybersecurity Tech Accord, which promotes a safer online world by fostering collaboration among global technology companies committed to protecting their customers and users and helping them defend against malicious threats and breaches.

Web application and application program interface (API) vulnerabilities are the leading cause of enterprise breaches today. To prevent these kinds of attacks, Contrast Security provides a new and innovative approach of self-protecting software that enables development and security teams to pinpoint vulnerabilities before deployment and to protect applications while in production.

“Digital transformation has expanded and accelerated software development to the point where most organizations struggle to perform even basic application security blocking and tackling across their application and API portfolio,” said Jeff Williams, Co-Founder and CTO, Contrast Security. “We are proud to join some of the largest enterprises in the Cybersecurity Tech Accord and make this commitment to protecting customers and users from malicious threats. We’ve already taken steps as a company to ensure that every developer in the world has free access to industry-leading security testing and protection tools for their code with Contrast Community Edition.”

Contrast Community Edition is a completely free, full-featured, DevSecOps solution that allows development, security and operations teams to deliver secure software on time to meet growing business requirements. The solution is designed to help small teams building Java applications and APIs protect against the most common security flaws, including the top 10 vulnerabilities outlined in the Open Web Application Security Project (OWASP). The solution enables organizations to assess open source libraries and frameworks as well as custom code for security vulnerabilities, and to stop attacks by preventing vulnerabilities from being exploited in production applications.

“By making this pledge to the Cybersecurity Tech Accord, we are excited to join forces with industry leaders to hone in on the dialogue, discovery and decisive action to create a secure and stable digital world,” said Alan Naumann, Chairman and CEO, Contrast Security. “We will continue to provide our customers with a fast, accurate, easy and scalable way to eliminate serious risks facing enterprises today.”

“The world as we know it is consumed by ongoing cyber threats and we should do whatever we can to protect it,” said Ron Gula, President and Co-Founder, Gula Tech Adventures. “As an industry, it is increasingly important that businesses join forces to fight cybercriminals and prevent future attacks from causing any more damage to consumers. With Contrast joining the Tech Accord initiative, security will be put at the forefront of developers to help us secure the internet.”

Through a shared commitment and collective action, signatories of The Cybersecurity Tech Accord aim to more effectively:

  • Provide their customers, users and the developer ecosystem with information and tools that enable them to understand current and future threats and better protect themselves.
  • Protect their customers and users everywhere by designing, developing and delivering products and services that prioritize security, privacy, integrity and reliability, and in turn reduce the likelihood, frequency, exploitability and severity of vulnerabilities.
  • Work with each other and likeminded groups to enhance cybersecurity best practices, such as improving technical collaboration, coordinated vulnerability disclosure and threat sharing, as well as ensuring flexible responses for the wider global technology ecosystem.
  • Oppose efforts to attack citizens and enterprises by protecting against exploitation of technology products and services during their development, design, distribution and use.

The Tech Accord signatories include leading organizations such as Atlassian, Cloudflare, DocuSign, Facebook, HP Inc., Intuit, LinkedIn, Microsoft, Salesforce, SAP, Tenable, VMware, among others.

About Contrast Security:
Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast’s patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development, to operations, to production. More information can be found at www.contrastsecurity.com or by following Contrast on Twitter at @ContrastSec.

For more information:
Jacklyn Kellick
LEWIS Communications for Contrast Security

SOURCE Contrast Security
Related Links

SOURCE URL: https://www.prnewswire.com/news-releases/contrast-security-joins-the-cybersecurity-tech-accord-to-promote-a-safer-online-world-300745518.html

Resecurity Named Leader in Forensics in Cyber Defense 2018 Global Awards

Resecurity Named Leader in Forensics in Cyber Defense 2018 Global Awards

The Cyber Defense 2018 Global Award for “Hot Company Forensics” has been won by international cybersecurity company Resecurity in recognition of one of its core products – Context™, combining a platform for digital forensics, intelligence analysis and cybercrime investigations.

Cyber Defense Magazine scoured the world to reach out to almost 3,000 InfoSec players from the USA to Israel to Japanand to Germany, before narrowing the list down to a small group of finalists, announcing the winners at the major IP Expo Europe conference in London on October 3.

“Cyber Defense Magazine spent six months searching the globe to find the most innovative and cutting-edge cyber security companies for our Cyber Defense 2018 Global Awards,” said Gary S. Miliefsky, Publisher, Cyber Defense Magazine. “Resecurity, Inc. won this award for ‘Hot Company Forensics’ because it is an innovator on a mission to help stop breaches and get one step ahead of the next threat, proactively.”

The “Hot Company Forensics” award went to Resecurity for its development of innovative technologies for digital forensics and cybercrime investigation. Leveraging its strong partnerships with law enforcement agencies internationally, Resecurity has developed a next-generation digital forensics platform – Context™ – now being utilized by leading Fortune 500 corporations and governments.

In order to enable commercial organizations to take full advantage of next-generation forensics tools, Resecurity developed Context™ in close consultation with law enforcement agencies and security professionals. Context™ is delivered on a platform-as-a-service model (PaaS) model in order to simplify forensics procedures in the enterprise environment, providing companies with comprehensive forensics reports and valuable analytical information. The Context™ platform supports numerous file formats and platforms, including desktop, mobile platforms and cloud-based environments. It can be used for file, network and malware forensics, along with actor-focused investigations.

Combining forensics analysis with data enrichment technologies in this way enables Resecurity to provide the end forensics results with additional meaningful intelligence from repositories ranging from IP reputation, indicators of compromise (IOCs) and breached data to historical Dark Web records. Resecurity’s Context™ now has a growing meta database of over 600 million Dark Web records, 8 billion Compromised Credentials, 12 million threat actors and over 30 million IOCs extracted from various Dark Web sources and analyzed security incidents (targeted cyberattacks, cyberespionage campaigns, malicious activity).

According to Resecurity chief executive, Charles Yoo: “Resecurity is an intelligence-driven company with a great team of experts, who understand the vital role of data in digital forensics and computer crimes investigations in practice. Our mission was to build a scalable next-generation digital forensics platform which will help law enforcement, fraud and risk managers, investigators, DFIR experts and intelligence analysts to accelerate the pre- and post-analysis lifecycle – making their work more effective and scalable and, crucially, more cost and time-efficient. We are proud to win the ‘Hot Company Forensics’ category in the Cyber Defense 2018 Global Awards and will keep doing a great job for the worldwide security and intelligence community.”

About Cyber Defense Global Awards 2018

This is Cyber Defense Magazine’s sixth year of honoring cyber defense and information security innovators. The judges are CISSP, FMDHS, CEH, certified security professionals who voted based on their independent review of the company’s submitted materials on the website of each submission including but not limited to data sheets, white papers, product literature and other market variables. CDM has a flexible philosophy to find more innovative players with new and unique technologies, rather than the one with the most customers or money in the bank.

About Resecurity®
Resecurity Inc., an international cybersecurity company, is focused on next-generation endpoint protection and intelligence-driven cybersecurity solutions. Resecurity combines robust protection stack to identify security anomalies with investigation and remediation capabilities. The company also provides security research services to leading Fortune 500 corporations and governments. Resecurity protects the enterprise ecosystem against cyber threats using a robust technology stack and built-in contextual awareness. Powered by the Resecurity Context™, the solution provides in-depth analysis of the identified cyber threats and associated threat actors in real time. Resecurity’s key mission is to help enterprises of different sizes to be able to mitigate possible risks in a timely and effective manner using cutting-edge cybersecurity solutions.

Resecurity: Revolutionizing Cybersecurity.
You can gain full access to Resecurity products by starting your free trial.

Learn more: https://www.resecurity.com

Resecurity, Inc. 
Tony Glover
(800) 781-5698 

SOURCE Resecurity Inc.
Related Links

SOURCE URL : https://www.prnewswire.com/news-releases/resecurity-named-leader-in-forensics-in-cyber-defense-2018-global-awards-300727402.html

NEXT Biometrics and MTRIX Demonstrate Advantages Of New Biometric Software Development Platform at ITSA Trade Show

NEXT Biometrics and MTRIX Demonstrate Advantages Of New Biometric Software Development Platform at ITSA Trade Show

NEXT Biometrics (Oslo Bors: NEXT), a global leader in fingerprint sensor technology, and MTRIX GmbH, a leading German distributor of authentication solutions, are demonstrating NEXT’s advanced biometric software development platform here this week at the IT Security Expo and Congress (ITSA). The NEXT One Touch Power Software Development Kit (SDK) works with a broad set of platforms and tools for developing leading-edge authentication systems and is already generating positive reactions from industry partners. MTRIX is the exclusive distributor of NEXT Biometrics’ products in GermanyAustria and Switzerland.

The NEXT One Touch Power SDK is available now and supports development of customer solutions on software platforms including Windows, Android, Linux and embedded Linux. The SDK is also designed to aid customers in developing solutions for both proprietary and ISO 19794-2 compliant template formats. It supports one-to-one verification as well as ultra-fast, one-to-many identification schemes.

“One of our goals at NEXT Biometrics is to ensure we’re providing our customers with whatever assistance they need to make implementation of our advanced Active Thermal™ fingerprint sensor solutions as simple and easy as possible,” said Alain Faburel, NEXT Biometrics’ chief sales and marketing officer. “The NEXT One Touch Power SDK we’re jointly demonstrating this week with MTRIX is a tool we’re providing for our customers that allows them to quickly and easily create biometric products that emphasize their skills, creativity and technical prowess.”

Target customers for the SDK include companies developing biometric solutions that incorporate NEXT’s proven and broadly deployed fingerprint scanners and modules for the enterprise, PC and network security implementations and point-of-sale devices.

“We’re very pleased to be working with NEXT and their industry-leading biometric sensor technology,” said Malte Kahrs, MTRIX CEO. “To now provide our joint customers with yet another tool to aid development of leading-edge biometric solutions is a real advantage.”

ITSA is Europe’s largest expo for IT security and a leading IT security event globally. Since 2009, ITSA has served as a “must-attend” event for C-level executives, IT security officers, developers and services providers focused on cloud computing, mobile security and cybersecurity, as well as, data and network security. The expo runs from Oct. 9-11. The NEXT One Touch Power SDK will be on display in the MTRIX booth located in Hall 10, Booth 10.0-212.

About NEXT Biometrics

NEXT provides advanced fingerprint sensor technology that delivers uncompromised security and accuracy for the best possible user experience in the smart card, government ID, access control and notebook markets. The company’s patented NEXT Active Thermal™ principle allows the development of large, high quality fingerprint sensors in both rigid and flexible formats. NEXT Biometrics Group ASA (www.nextbiometrics.com) is headquartered in Oslo, with sales, support and development operations in Seattle, Silicon Valley, TaipeiPrague, Bengaluru and Shanghai.

About MTRIX:
MTRIX is the leading specialist in strong authentication within the German-speaking region. The company supports its customers with selecting, implementing and operating multi-factor authentication solutions. Founded in 2006, MTRIX has established a wide portfolio within the past 11 years and represents various market leaders. MTRIX counts companies of every size and industry among its widespread list of customers – from SME’s to corporate groups, from banks and insurance companies to automotive suppliers, medical centers, education institutes and public administrations to IT service providers and system integrators.

Media contact:
Tom Beermann

Investor contact:
Knut Stalen

This information was brought to you by Cision http://news.cision.com


The following files are available for download:


SOURCE NEXT Biometrics
Related Links

SOURCE URL : https://www.prnewswire.com/news-releases/next-biometrics-and-mtrix-demonstrate-advantages-of-new-biometric-software-development-platform-at-itsa-trade-show-300727473.html

AT&T, Lockton Affinity and CNA Team Up to Arm Small and Midsize Businesses with Cybersecurity Insurance

AT&T, Lockton Affinity and CNA Team Up to Arm Small and Midsize Businesses with Cybersecurity Insurance

Strategic alliance introduces affordable cybersecurity technologies, services and insurance protections to small and midsize businesses

AT&T* and its new wholly-owned subsidiary, AT&T Insurance Agency, LLC, have joined forces with insurance industry leaders Lockton Affinity and CNA to make available broad cyber insurance policies. Customers of AT&T Managed Cybersecurity Solutions will have access to policies, underwritten by CNA, with Lockton Affinity serving as the insurance broker.

In recent years, small and mid-sized organizations have begun adopting cyber threat prevention and detection solutions. But with cyber threats growing in volume and sophistication, these companies are increasingly targets of ransomware, phishing and botnet attacks, and malware campaigns, yet lack access to affordable response and recovery solutions.

This strategic alliance¹ gives AT&T Business customers access to a full range of cyber risk management solutions to help them holistically measure, mitigate, monitor and transfer cyber risk, including options for broad cyber insurance through CNA.

Recovering from cyberattack disruptions in business continuity and reputational damage has been a challenge for businesses of all sizes, with small and mid-sized businesses lacking necessary resources needed to recover. Recent studies have indicated that as few as 3% of small businesses have cybersecurity insurance.

“Even the largest enterprises struggle with how to resource multi-layered cybersecurity needs,” said Danessa Lambdin, vice president of Cybersecurity Solutions for AT&T Business.  “Without a dedicated team, financial resources, or both, small and mid-sized businesses are prioritizing threat prevention and detection activities at the expense of response and recovery.

“AT&T Managed Cybersecurity Solutions provide superior cyber protection, which is recognized by insurance industry leaders. By offering our customers a combination of cybersecurity technologies and access to broad cyber insurance through CNA, we’re providing them with more options to help protect themselves and recover from cyber-attacks.”

“One-size-fits-all simply doesn’t work across all business sizes and types, and this is especially true with cyber insurance solutions. By offering this policy with small and mid-sized business needs in mind, CNA is able to provide the coverage they need at a price that recognizes the managed cybersecurity controls they have proactively implemented,” says Brian Robb, director and industry leader, Cyber, CNA.

Brokered through Lockton Affinity and underwritten by CNA for AT&T Cybersecurity Solutions customers, this policy, called CNA Epack Extra, may cover from $250,000 up to $10 million of qualifying expenses, such as certain costs associated with Business Interruption and Extra Expense, Network Security Liability, Privacy Injury Liability, Data Restoration, Network Extortion Expense, Privacy Regulatory Civil Fines, Sanctions or Penalties, and Privacy Event Expenses.²

When small- to mid-sized businesses purchase threat detection and response tools from AT&T, they will be eligible to apply for this coverage through Lockton Affinity. The resulting CNA insurance policy is designed for small and mid-sized businesses across the key cybersecurity disciplines: prevention, detection, response and recovery.

“With the number of small and mid-size businesses in the U.S. numbering in the tens of millions, the gap in broad solutions needed for them to address cybersecurity recovery was unexpectedly significant,” says Patrick O’Farrell, President of Lockton Affinity. “This cybersecurity policy could be the difference between businesses closing the door for good, and continued success.”

In addition to CNA Epack Extra that is now available to AT&T customers through Lockton Affinity and CNA, AT&T Cybersecurity Solutions provides over 20 managed security services to AT&T customers, including AT&T Cloud Web Security Service, AT&T Secure Email Gateway and AT&T Distributed Denial of Service Defense.

¹ Use of the term “strategic alliance” should not be construed to represent a legally binding partnership. AT&T Insurance Agency, LLC is a wholly owned subsidiary of AT&T Corp, that may refer customers interested in cyber insurance policies to Lockton Affinity for the submission of applications to CNA. 
² Subject to Policy terms and conditions established by CNA.  Not available to all customers in all states.

*About AT&T Communications
We help family, friends and neighbors connect in meaningful ways every day. From the first phone call 140+ years ago to mobile video streaming, we innovate to improve lives. We have the best network according to America’s biggest test.** We’re building FirstNet just for first responders and creating next-generation mobile 5G. With DIRECTV and DIRECTV NOW, we deliver entertainment people love to talk about. Our smart, highly secure solutions serve over 3 million global businesses – nearly all of the Fortune 1000. And worldwide, our spirit of service drives employees to give back to their communities.

AT&T Communications is part of AT&T Inc. (NYSE: T). Learn more at att.com/CommunicationsNews.

AT&T products and services are provided or offered by subsidiaries and affiliates of AT&T Inc. under the AT&T brand and not by AT&T Inc. Additional information about AT&T products and services is available at about.att.com. Follow our news on Twitter at @ATT, on Facebook at facebook.com/att and on YouTube at youtube.com/att.

© 2018 AT&T Intellectual Property. All rights reserved. AT&T, the Globe logo and other marks are trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.

**Based on GWS OneScore Sept. 2018. Excludes crowd sourced studies.

About CNA.  CNA is one of the largest U.S. commercial property and casualty insurance companies. CNA provides a broad range of standard and specialized property and casualty insurance products and services for businesses and professionals in the U.S., CanadaEurope and Asia, backed by 120 years of experience and more than $45 billion of assets. For more information about CNA, visit our website at www.cna.com.

“CNA” is a registered trademark of CNA Financial Corporation. Certain CNA Financial Corporation subsidiaries use the “CNA” service mark in connection with insurance underwriting and claims activities. Copyright © 2018 CNA. All rights reserved.  One or more of the CNA companies provide the products and/or services described. The information is intended to present a general overview for illustrative purposes only. It is not intended to constitute a binding contract. Please remember that only the relevant insurance policy can provide the actual terms, coverages, amounts, conditions and exclusions for an insured. All products and services may not be available in all states and may be subject to change without notice.

Related Links

SOURCE URL : https://www.prnewswire.com/news-releases/att-lockton-affinity-and-cna-team-up-to-arm-small-and-midsize-businesses-with-cybersecurity-insurance-300726689.html

TechNadu Release Interview With Cybersecurity Expert Troy Hunt on Dangers of Reusing Passwords

Troy Hunt indicates reusing passwords is a major threat to personal security.

TechNadu, an online technology news source, has just released a new interview with Troy Hunt, a leading cybersecurity expert. Hunt notes in the interview that reusing passwords on multiple websites can negatively impact daily life and become a big threat to personal cybersecurity.

When asked by a journalist with TechNadu what the biggest threat to personal cybersecurity is right now, Hunt indicated it was reusing passwords. He says in the interview, “I think it’s ourselves. The biggest threat we have as individuals is this reusing of passwords. To put this in perspective, what I see time and time again is that people will sign up for lots of different services with the same password, one of them suffers the data breach, and then they start having all of these other services taken over.”

Hunt indicates this can have a domino effect and that once one site is breached all are in jeopardy. Reusing passwords is something common for most people. The risk though is high. Hunt notes in the interview that he has seen people have a breach with an email account and from there it can affect everything from iCloud accounts, losing photos and files, social media accounts and even financial websites like online banking, credit cards and more.

Hunt is behind the website Have I Been Pwned, which allows people to check to see if their credentials were part of any data breaches. It also offers steps to better security. In addition, as the TechNadu interview indicates, Hunt is a Microsoft Most Valuable Professional for Developer Security, a Pluralsight author, and testified before the U.S. Congress on the impact of data breaches.

The interview with TechNadu included several other questions. They touched on privacy, artificial intelligence, broader issues in cybersecurity, and even the security of iPhones versus Android. Hunt and his family primary use iPhones for a number of reasons. In the TechNadu interview, Hunt noted that he recently shared a tweet in which the chief security officer for the DNC Bob Lord was quoted as saying he wants to make sure everyone rolls over to iPhones because of the security. Hunt noted that Lord reasoned that it’s more consistent in terms of how fast updates are provided and being able to run the newest and best operating systems. Hunt agrees with Lord’s assessment.

Hunt says in the interview, “It’s also a lot harder to get lower-level access to device features which you can do on Android, and you’re also a lot less likely to load an app from an unofficial store. So, this sort of security posture really is world-class, and combined with the other factors as well, I’m much more comfortable running iDevices.”

The interview also touched on privacy and security with the Internet of Things. TechNadu asked Hunt if there any type of smart devices he wouldn’t bring into his home for fear of privacy. Hunt said in the interview, “Most smart devices are used by my children. So, I’ve been involved in data breaches before that have involved IoT and one of those data breaches was connected to teddy bears called Cloud Pets. And I saw all of this data collected from children exposed to the internet. I have an increasingly large number of IoT things in my house, but I’m just really selective about what they are and if I actually need them. There’s a lot of rubbish that you simply don’t need and every connected thing does pose some degree of risk.”

The interview provides a wealth of other cybersecurity information and exclusives. To learn more and read the entire interview visit, TechNadu.com.

About TechNadu

We are not just a team of writers who report about technology innovations on a daily basis. We are an international team of tech enthusiasts and passionate writers who are building a digital bridge between today’s technology and consumers. As such, we cater to an extensive group of readers. Our content provides helpful information for both inexperienced individuals seeking answers to their IT-related problems, as well as fellow tech enthusiasts who want to learn about the latest technologies and products, before anyone else on the Web. For more information, visit TechNadu.

Related Links

Create Strong Password

Best Password Managers


Related Links


SOURCE URL: https://www.prnewswire.com/news-releases/technadu-release-interview-with-cybersecurity-expert-troy-hunt-on-dangers-of-reusing-passwords-300721438.html

SafeRide Technologies Launches CAN Optimizer, Enhancing Cloud Anomaly Detection Capabilities

SafeRide Technologies Launches CAN Optimizer, Enhancing Cloud Anomaly Detection Capabilities

CAN Optimizer uses advanced machine learning algorithms to compress raw CAN bus data, reducing the bandwidth required to upload information to the cloud

SafeRide Technologies, the first automotive cybersecurity company to offer a multi-layer deterministic and heuristic anomaly detection and threat prevention solution, today announced the launch of its CAN Optimizer solution, to be demonstrated this week at the Paris Motor Show.

While uploading raw CAN data to the cloud enables advanced anomaly detection capabilities, the process consumes a significant amount of bandwidth. SafeRide’s CAN Optimizer dramatically decreases the bandwidth needed to do so by providing 98-99% reduction in data size, with a typical lossless compression ratio more than 15 times better than other compression algorithms that are currently on the market. This will greatly benefit OEMs and fleet managers by further helping to uncover unknown cybersecurity vulnerabilities, identifying malfunctions before they happen, and even detecting misuse and abuse of vehicles.

“Our machine learning model has proven to be sufficiently accurate that we only need to send data to the cloud when it does not follow the most probable prediction, which only happens a fraction of the time,” said Yossi Vardi, CEO of SafeRide. “Combined with our vSentry multi-layer cybersecurity solution, CAN Optimizer allows for a whole new level of zero-day vulnerability detection capabilities, as well as fleet operation efficiency optimization. These advancements lead to drastic cost reduction in both data and storage for OEMs and fleet operators.”

SafeRide will showcase its vSentry and CAN Optimizer solution with industry-leading partner, Irdeto, at the Paris Motor Show on October 1-6. Please visit booth J60, Pavillion 7 to learn more and receive a demo.

About SafeRide Technologies

SafeRide Technologies is the provider of vSentry[TM], the industry-leading multi-layer cybersecurity solution for connected and autonomous vehicles that combines state-of-the-art deterministic security solution with a groundbreaking AI profiling and anomaly detection technology to provide future-proof security. SafeRide provides OEMs, fleet operators and automotive suppliers early detection and prevention of cyberattacks, and helps to avoid financial damage, prevent reputation loss, and save lives. For more information, visit http://www.saferide.io.

Media Contact:

Rachel Glaser
GK for SafeRide

SOURCE SafeRide Technologies Ltd.

SOURCE URL : https://www.prnewswire.com/news-releases/saferide-technologies-launches-can-optimizer-enhancing-cloud-anomaly-detection-capabilities-890371209.html

Lastline Recognized by 2018 CyberSecurity Breakthrough Awards for Innovation in Threat Detection

Lastline Recognized by 2018 CyberSecurity Breakthrough Awards for Innovation in Threat Detection

Lastline®, the leader in advanced threat protection, today announced that it has been named the winner of the Threat Detection Innovation Award from CyberSecurity Breakthrough, an independent organization that recognizes the top companies, technologies, and products in the global information security market today.

“The application of artificial intelligence (AI) is by far one of the most exciting developments within the field of cyber security, and Lastline is certainly at the forefront of these developments,” said James Johnson, managing director, CyberSecurity Breakthrough. “By applying AI to network traffic analysis and malware behavior analysis, Lastline is delivering an incredibly high accuracy rate in email and network threat detection, ultimately helping organizations prevent advanced threats from entering the network. We congratulate the Lastline team on their innovation in the threat detection category and we are thrilled to name them a 2018 CyberSecurity Breakthrough Award winner.”

The mission of the CyberSecurity Breakthrough Awards is to honor excellence and recognize the innovation, hard work, and success in a range of information security categories. This year’s program attracted more than 3,000 nominations from over 14 countries throughout the world, making winners part of a select and exclusive group. Entries were judged by an independent panel of experts from within the information security industry, with representation from a cross-section of industries.

“To win the Threat Detection Innovation Award from CyberSecurity Breakthrough is validation that Lastline is delivering break-through technology to the industry,” said Dr. Christopher Kruegel, Lastline Co-founder and CEO. “It acknowledges the innovative network security capabilities we’re providing to our customers, enabling them to respond faster and more effectively to network breaches before damaging data theft can occur.”

When malware strikes, it’s important for security teams to see and understand all the malicious activities taking place across a compromised network. Lastline Network Defender uses AI-powered network traffic analytics to identify anomalous activity, and then uses the company’s extensive repository of malicious behaviors and Indicators of Compromise (IoCs) to distinguish between benign anomalies and malicious network activity. The result is a comprehensive view of the breach – a “dynamic blueprint” – that identifies all affected systems, applications, and data movement. This deterministic approach detects threat activity early in an attack, with minimal false positives, and provides the context security teams need to understand the scope of the threat, respond quickly, remediate completely, and proactively block further spread.

About Lastline
Lastline provides innovative AI-driven network and email security products that detect and defeat cyberattacks. We deliver automated detection, analysis, and response to completely remediate advanced threats before damaging and costly data breaches occur, with fewer resources and at lower cost. Headquartered in Redwood City, California with offices throughout North AmericaEurope and Asia, Lastline’s technology is used by Global 5000 enterprises, is offered directly and through resellers and security service providers, and is integrated into leading third-party security technologies worldwide. www.lastline.com

About CyberSecurity Breakthrough
Part of the Tech Breakthrough Awards organization, the CyberSecurity Breakthrough Awards program is devoted to honoring excellence in information security and cybersecurity technology companies, products, and people. The CyberSecurity Breakthrough Awards provide a platform for public recognition around the achievements of breakthrough information security companies and products in categories including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, Web and Email Security, UTM, Firewall, and more. For more information visit CyberSecurityBreakthrough.com.

SOURCE Lastline
Related Links

SOURCE URL : https://www.prnewswire.com/news-releases/lastline-recognized-by-2018-cybersecurity-breakthrough-awards-for-innovation-in-threat-detection-300719637.html

AT&T and Dedrone Team Up on IoT Solution to Protect Against Malicious Drones

AT&T and Ericsson Team Up on IoT Cybersecurity

AT&T* and Ericsson are joining forces to offer comprehensive testing to help safeguard IoT devices from growing cybersecurity threats.

We’ve seen more than a quadrupling in vulnerability scans of IoT devices at AT&T in the last two years. Only 10% of the organizations we surveyed are fully confident their devices have adequate security measures in place.

That’s why we’ve teamed with Ericsson to make it easier for businesses to get the baseline testing and validation they need to help make their devices more secure. We offer the service through the CTIA’s  recently announced Cybersecurity Certification Program.

Our goal is to identify device vulnerabilities that could threaten the data collected and sent across communication networks. This will help businesses put appropriate cybersecurity defenses in place.

“It’s no secret security is a growing threat for IoT. Our work with Ericsson will help establish a common and readily achievable security program that protects devices, consumers and our networks,” said Cameron Coursey, vice president, IoT Solutions, AT&T.  “CTIA Cybersecurity certification will help our customers better protect themselves.”

“As the number and diversity of IoT devices continue to rapidly grow, assuring the security of these devices is of paramount importance. Ericsson is the only network equipment provider accredited as a CTIA Authorized Test Lab for Cybersecurity Certification and we are pleased to be working with AT&T on this industry-leading initiative,” said Tomas Ageskog, vice president and head of Digital Services, Ericsson North America.

The program covers a wide range of devices — anything from body cameras to connected streetlights, to utility meters, industrial routers and medical devices.

Ericsson’s labs provide the CTIA’s certification. AT&T makes the certification available to businesses through our Professional Services for the IoT program.

AT&T is helping to fuel business transformation through edge-to-edge capabilities.

Get AT&T’s latest Cybersecurity Report.

*About AT&T Communications
We help family, friends and neighbors connect in meaningful ways every day. From the first phone call 140+ years ago to mobile video streaming, we innovate to improve lives. We have the nation’s largest and most reliable network and the nation’s best network for video streaming.** We’re building FirstNet just for first responders and creating next-generation mobile 5G. With DIRECTV and DIRECTV NOW, we deliver entertainment people love to talk about. Our smart, highly secure solutions serve over 3 million global businesses – nearly all of the Fortune 1000. And worldwide, our spirit of service drives employees to give back to their communities.

AT&T Communications is part of AT&T Inc. (NYSE :). Learn more at att.com/CommunicationsNews.

AT&T products and services are provided or offered by subsidiaries and affiliates of AT&T Inc. under the AT&T brand and not by AT&T Inc. Additional information about AT&T products and services is available at about.att.com. Follow our news on Twitter at @ATT, on Facebook at facebook.com/att and on YouTube at youtube.com/att.

© 2018 AT&T Intellectual Property. All rights reserved. AT&T, the Globe logo and other marks are trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.

**Coverage not available everywhere. Based on overall coverage in U.S. licensed/roaming areas. Reliability based on voice and data performance from independent 3rd party data.

Related Links

SOURCE URL : https://www.prnewswire.com/news-releases/att-and-ericsson-team-up-on-iot-cybersecurity-300718627.html

Raytheon to expand cybersecurity customer base in the Middle East

Raytheon to expand cybersecurity customer base in the Middle East

Raytheon Company (NYSE :RTN ) has been awarded a multi-year contract with a new government customer in the Middle East North Africa Region.  Raytheon’s Intelligence, Information and Services business will provide advanced cybersecurity solutions and associated training, knowledge transfer and operational and sustainment support.

“Raytheon has established a solid track record in providing national level cybersecurity solutions,” said Dave Wajsgras, president of Raytheon Intelligence, Information and Services. “We are honored to have been selected as a trusted cybersecurity partner for this important nation in a region of the world that continues to be impacted by evolving cyber threats.”

About Raytheon

Raytheon Company, with 2017 sales of $25 billion and 64,000 employees, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. With a history of innovation spanning 96 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I™ products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Mass. Follow us on Twitter.

Media Contact  
Rachael Duffy  

SOURCE Raytheon Company

Related Links


SOURCE URL : https://www.prnewswire.com/news-releases/raytheon-to-expand-cybersecurity-customer-base-in-the-middle-east-300717577.html