NAGRA Receives Industry Recognition for Content Protection Innovation at IBC 2023
Swissbit introduces iShield Archive memory card that protects sensitive information
pCloud Celebrates a Decade of Innovation and Security in Online Storage: A Decade of Data Management Excellence
ViewQwest strengthens commitment to Information Security Management standards with ISO 27001:2013 certification
Microsoft Cyber Signals: Sporting Events and Venues Draw Cyberthreats at Increasing Rates
Kaspersky unveils latest APT trends for Q2
Cobalt Iron Introduces Compass Migrator for Automating Data Migration From Legacy Backup Environments
Swissbit and lern.link secure Moodle with FIDO2 authentication
Tivù Srl Extends Service Lineup to Bring Customers NAGRA Secured DAZN Sports Content
The NEOM McLaren Formula E Team Names Cybersecurity Leader Trend Micro Official Partner
SeeMetrics Launches Cybersecurity Performance Boards
SeeMetrics, the leading Cybersecurity Performance Management (CPM) platform that’s revolutionizing how security leaders measure, track, and improve security performance, today announced the launch of its new Security Performance Boards. Organized by security domains, the new Security Performance Boards are a collection of out-of-the box metrics that empower security leaders to measure the performance of their technologies, processes, and people in real time. SeeMetrics is the first ever data platform that drives cybersecurity performance assessment directly from the operational stack and “inside the perimeter”. With SeeMetrics’ Security Performance Boards, cybersecurity executives and operational teams gain a centralized and business-aligned view of measurements, metrics, and Key Performance Indicators (KPIs), which shows trends, risks, and historical context. The SeeMetrics boards help to build a proactive and preventative approach to detecting emerging risks and gaps. Among SeeMetrics’ Security Performance Boards are Vulnerability Management, Endpoint Protection, Identity Management, Mail Security, Security Awareness, and Incident Response. Today, the vast majority of CISOs are required to prove the value of their security programs and tool stack. They are expected to quickly answer questions around performance, progress, and budget. Adding to the complexity is the increasing size of their security stack -- the average global organization has more than 29 security solutions in place, constituting a mostly unmanageable situation due to the massive amounts of data generated nonstop. Whereas other C-suite leaders such as those of finance, sales, and marketing are already using integrated data platforms such as CRM and ERP, most CISOs, CIOs and security leaders have yet to adopt a centralized tool that streamlines data points from dozens of operational security tools into an executive view. This means they are left without the ability to instantly know the state of their operations, what is trending, what has changed, which capabilities are currently missing, overlapping or underperforming, and how that impacts the overall performance. SeeMetrics’ new Boards provide a bird’s eye view of overall capabilities and security tools and also come with explorable depth: behind every Board is drill-down data that is trackable back to its source. The Boards make cybersecurity goals and progress quantifiable and more visible to immediate decision makers, along with helping security leaders to communicate in a relatable language on progress and trends to different stakeholders such as executives and board members. “SeeMetrics’ new Security Performance Boards proactively provide insights to CISOs seeking to answer common questions such as ‘How are my policies trending?,’ ‘How well are we performing compared to last quarter?’ or ‘How is our MTTR trending in the US versus Europe?’”, says Shirley Salzman, CEO and Co-Founder of SeeMetrics. “With data driven directly from the enterprise's security stack, SeeMetrics’ Boards allow security leaders to communicate performance based on clearly-defined KPIs and in the context of historical trends, relieving security leaders who, so far, have had to base their evaluations on either external assessments or offline data. The Security Performance Boards aim not only to streamline data for management purposes but also to assist security leaders to close a long-standing communication gap between themselves, their operations teams, and business managers.” “Security measurements are essential to helping us understand how well our tools, and therefore how our security programs, are performing,” says Sounil Yu, Author of Cyber Defense Matrix and advisor to SeeMetrics. “SeeMetrics’ introduction of Security Performance Boards is an exciting milestone in the evolution of cybersecurity metrics, giving us security leaders a practical, tangible, and insightful way to really understand with confidence how our stack is performing in real time and on a continuous basis.”
Phylum Research: Open-Source Software Ecosystems Under Fire
Software developers have become high-value targets for malware attacks, and open-source software ecosystems are the new "watering hole" where hackers find their victims. That's the key takeaway from a new research report from Phylum.io that analyzes roughly 179 million open-source software files across 2.5M package publications in the top open-source ecosystems: NPM, PyPI, RubyGems, Nuget, Golang, Cargo, and Maven. The Phylum report, which will be released tomorrow, shows that 324,301 spam packages were successfully published across ecosystems; of those, 613 packages targeted specific groups or organizations, and an alarming 14,535 packages executed suspicious code during the installation. Further, attacks are becoming more sophisticated, with many luring unsuspecting developers to download malicious packages with file names like chatgpt, ai, and llm. Similar to phishing schemes, attackers are getting smarter about what developers are looking for in these open-source ecosystems and providing realistic-looking packages that seem harmless but have the power to unleash malware and even respawn old malware attacks. Late in Q2 2023, Phylum also identified a campaign that once again upped the sophistication over what has been previously seen. Here is a link to the full report: https://blog.phylum.io/p/2f7e99f3-4959-4e69-a7b7-cf7131a69725/.
Trend Introduces Optimized Security for Endpoints, Servers, and Cloud Workloads to Cybersecurity Platform
Trend Micro (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced Trend Vision One™ – Endpoint Security, the latest offering in its next-generation cybersecurity platform, which unifies prevention, detection, and response for user endpoints, servers, cloud workloads, and data centers. This comprehensive solution aims to support customers throughout their IT modernization. To learn more about Trend Vision One – Endpoint Security, please visit: https://www.trendmicro.com/en_hk/business/products/endpoint-security.html Kevin Simzer, COO at Trend Micro: "Surging IT complexity is placing unprecedented demand on teams and providing determined adversaries with more opportunity to infiltrate an ever-expanding attack surface. In response to this challenge, our customers want to simplify security without compromising effectiveness. Trend Vision One – Endpoint Security is a direct answer to this need, helping IT and security organizations stop threats faster and take control of risk." By leveraging the consolidated power of Trend Vision One™, customers gain access to powerful attack surface risk management, cross-layer protection, and leading XDR capabilities to streamline and harmonize security operations while simultaneously enhancing protection, scalability, and performance. This approach enables security teams to holistically manage the attack surface, including and extending beyond the endpoint to achieve faster, more accurate threat defense and risk mitigation. Trend Vision One – Endpoint Security is built on market-leading capabilities. With a consistent history of endpoint security success, Trend has earned Leader recognition in every Gartner Magic Quadrant™ for Endpoint Protection Platforms since 2002*1. Trend has also ranked as the top provider for Cloud Workload Security Market Share (IDC) for an impressive five consecutive years. By bringing industry-leading and context-rich visibility for user endpoints, servers, and cloud workloads to the platform, security organizations can significantly streamline operations: Consolidate products, enhance visibility, and improve correlation: According to Gartner*2, "A recent Gartner survey found that 75% of organizations are pursuing security vendor consolidation in 2022, up from 29% in 2020." Minimize the cost and complexity associated with cybersecurity tool spread by consolidating point products and integrating user endpoint, server, and cloud workload security — reducing IT operation inefficiency and alert fatigue and closing exploitable security gaps while benefiting from high-fidelity detection and response alerting. Optimize and customize hybrid IT protection: Leverage specialized security features designed and optimized for physical servers, virtual machines, and cloud workloads. Improve the IT and SecOps workflow: Access prevention, detection, and response capabilities at your fingertips — including ransomware rollback, predictive machine learning, device control, host-based intrusion prevention, application control, file integrity monitoring, log inspection, and generative AI support — to accelerate and connect SecOps and IT Ops goals. Reduce risk and pre-empt attacks: Proactively quantify and reduce endpoint and cross-layer risk with complete attack surface risk management (ASRM) with native network, cloud, and email data ingestion. Trend Vision One provides security for every layer of an organization's diverse IT infrastructure, including endpoint, servers, email, cloud services, networks, 5G, and OT (operational technology). With centralized visibility and policy management for all endpoint types, this latest development provides comprehensive protection, detection, and response (EDR) for Windows, Mac, and Linux operating systems, whether on-premises or in the cloud, from within a single, user-friendly console. Jason Cradit, CIO, CTO at Summit Carbon Solutions: "With the company's environment being 100% in the cloud, having a solid understanding of the cloud was incredibly important. We needed a partner that could grow with us in a multi-cloud environment and move as fast as we needed them to while also providing us with a sense of peace that we are secure. Trend Vision One enables us to see and track a threat from potential to attack." Trend Vision One is now available on AWS Marketplace. Designed to seamlessly integrate into AWS environments, Trend Vision One offers a cybersecurity platform with a focus on empowering organizations to safeguard their cloud workloads. The platform provides advanced threat detection capabilities and in-depth insights, ensuring a resilient defense against evolving digital threats. For more detail, please visit AWS Marketplace: https://aws.amazon.com/marketplace/pp/prodview-u2in6sa3igl7c?sr=0-10&ref_=beagle&applicationId=AWSMPContessa GARTNER and MAGIC QUADRANT are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. ### *1 Gartner, Magic Quadrant for Endpoint Protection Platforms (Peter Firstbrook et al., December 31 2022) *2 Gartner, Emerging Tech: The Impact of Emerging Trends on Security Solution Demand (Rustam Malik, October 7 2022)
Customers Rank Trend Vision One as Leading XDR Platform
Trend Micro (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced another major customer endorsement for its leading Trend Vision One platform. Customers ranked its Trend Vision One XDR Platform second out of 59 XDR vendors on the latest Summer 2023 G2 Grid. To find out more about the G2 Grid for XDR (Summer), visit: https://www.g2.com/categories/extended-detection-and-response-xdr-platforms "Global organizations are increasingly turning to XDR to detect and respond to threats across their IT environment, but not all solutions are created equal," said Kevin Simzer, COO at Trend. "As the G2 Grid once again illustrates, we're consistently staying ahead of the market by anticipating and proactively meeting needs across the industry." G2 is one of the world's largest software review platforms and a trusted, impartial source of information which prospective buyers often consult in the early stages of their journey. In addition to being ranked a leader in terms of market presence and customer satisfaction, Trend Vision One also received several "badges" for the Summer 2023 G2 Grid, including: Leader: Mid-Market Leader: Enterprise Best Results: Enterprise Best Usability: Enterprise Best Relationship: Summer 2023 Momentum Leader Leader: Summer 2023 High Performer: Small Business Trend Vision One was recently enhanced with the addition of Companion, a new generative AI assistant designed to streamline processes and empower analysts to make better informed decisions on threat response and containment.
Trend Named a Leader in Network Analysis and Visibility
Trend Micro (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced that it has been named a leader in network analysis and visibility (NAV) solutions in a new Forrester evaluation of 13 top solution providers, including Trend Micro. The report analyzed three core products in the evaluation of Trend Micro's offerings. Zero Trust is the direction of travel for federal government and the wider market, but organizations cannot achieve true zero trust without comprehensive insight into and control over their networks. The Trend Vision One platform is built to be as intuitive as possible for analysts without compromising on capability. Forrester describes NAV solutions as used to monitor network traffic, detect threats, discover apps and assets and gain insight into packet payloads. Integrating with analytics, SOAR, XDR and other tools, they help to provide a foundation of visibility and analytics to drive Zero Trust, the report explains. Its analysis of Trend's capabilities in this area covers three offerings: Trend Vision One, Deep Discovery and TippingPoint. The Forrester report described Trend's as "...a product portfolio rich with native threat intelligence" that "stands out from the competition" and notes that Trend Micro's rich correlation data set enables "rapid, high-fidelity convictions at the analyst's fingertips." Trend's position as a Leader was accompanied by the highest possible marks in 12 criteria, including: augmented threat analysis, APIs and other integrations, vision, and innovation. According to the Forrester report: Trend Micro has a UI that is "intuitive and easy to understand" "Threat detection relies heavily on the ingestion of telemetry from multiple sources" "Customers with AWS cloud environments will benefit from the tight integration across multi-cloud and multi-tenant properties." "Trend Micro's NAV offering is well suited for medium-size to large enterprises that have other Trend Micro products in place or are looking for a platform offering that includes XDR." "Trend's vision is driven by combining all telemetry data, from the endpoint to the cloud, into a single cohesive view, regardless of which vendor provides the data," says the Forrester report. "Trend's NAV strategy builds on its capabilities in intrusion prevention, Zero Trust edge, and the endpoint, offering a single vendor technology stack to customers. Trend Micro is unique in that it views all other technologies as possible attack vectors and has a heavy focus on stopping emerging attack techniques."
Nexusguard Research Reveals Worldwide Distributed Denial of Service Attacks More Than Doubled in 2022
In 2022, the total number of distributed denial of service (DDoS) attacks worldwide increased by 115.1% over the amount observed in 2021, according to new research from Nexusguard released in its DDoS Statistical Report for 2022. The data also showed that cyber attackers continued to alter their threat vectors by targeting the application platforms, online databases, and cloud-based storage systems within Internet Service Providers (ISPs). This resulted in a significantly greater impact globally as organizations continue to move more of their workloads to the cloud. While the overall number of DDoS attacks did more than double, the maximum size of 361.9 gigabits per second (Gbps) represented a 48.2% decrease over those measured in 2021. Average attack size also shrank by 22.4%. The majority of DDoS threats (85.6%) in 2022 were single-vector attacks, which is almost identical to the percentage seen in 2021. UDP- (user datagram protocol) based and TCP- (transmission control protocol) based attacks were the most popular attacks by type, accounting for 72.5% and 23.0% respectively. Other key findings include: The top three DDoS attack vectors were NTP (network time protocol) amplification, memcached, and UDP attacks. UDP based attacks increased 121.3% year-over-year (YoY). TCP based and other attacks also grew significantly. Amplification attacks grew by 414.6% YoY. Application attacks saw enormous growth, increasing by 718.1% YoY. “Although DDoS attack size dropped in 2022, we saw a significant jump in the overall number of attacks, making the need for greater awareness and vigilance more essential today,” said Juniman Kasman, chief technology officer of Nexusguard. “Cyber attackers also continue to target critical infrastructure within ASN-level Communications Service Providers (CSPs), especially ISPs, which results in an incredibly far-reaching effect as the organizations relying on those providers are also negatively impacted.” With DDoS activities on the rise in Latin America, Nexusguard will launch a new DDoS scrubbing center in São Paulo, Brazil in July. The new center will provide comprehensive protection for local network operators and enterprises against DDoS attacks, mitigating the growing threat of cyber attacks in the region. The scrubbing center will also power Nexusguard Bastions, a managed DDoS protection service designed for businesses dealing with the impacts triggered by cyber attacks or seeking to add advanced cybersecurity capabilities to their product portfolio. Read Nexusguard’s DDoS Statistical Report for 2022 which provides comprehensive research around the shift in the global DDoS threat landscape. This annual report by Nexusguard examined the increases in DDoS attacks between 2021 and 2022, including single-target network layer attacks and multi-thread application attacks.
New Security Features for NetApp BlueXP Offer Cohesive Data Protection Through a Single Point of Control
NetApp® (NASDAQ: NTAP), a global, cloud-led, data-centric software company, today announced new capabilities in NetApp BlueXP, further strengthening NetApp's position as the leading option for secure data storage. In today's technology landscape, data has never been more valuable or more vulnerable. Data powers operations, fuels innovation, and creates exceptional customer experiences. As such, the impact of ever-increasing cyberthreats such as ransomware attacks and potential data loss or corruption can be devastating. Data infrastructures today often span both on-premises and multiple cloud environments, complicating data protection, security, and compliance. Skills shortages and budget constraints further add to these challenges. Companies need greater simplicity in data management and increased security to manage their data estates and avoid catastrophic losses. The new capabilities available through BlueXP build on its powerful, unified experience and deliver data service capabilities that can discover, manage, and protect data across the multicloud infrastructure, leveraging AI/ML operations for optimum business results. The new feature updates and innovations include simplified backup and recovery, data protection across more environments, and deployment in the most highly secured environments including government sites, with consistent operations that ensure the same experience everywhere for every application. "What BlueXP offers is truly best of breed as it enables a differentiated approach to the hybrid multicloud challenge," said Ronen Schwartz, Senior Vice President and GM, Cloud Storage at NetApp. "Our commitment is to continually enable AIOps in ever-expanding ways driving simplification of complex storage and data management operations, all while simultaneously enhancing the cyber resilience posture that our customers attain through BlueXP. While this approach already supports the world's most secure government environments, it mirrors what our commercial customers are demanding in today's modern data world." The new NetApp BlueXP capabilities include: Cohesive data protection strategies across systems, locations, and workloads from a single point of control: NetApp BlueXP backup and recovery now provides a single control plane that simplifies customized backup strategies on a workload-by-workload basis. Regardless of environment, any variant of the full spectrum of 3-2-1 backup strategies can be easily applied to workloads as they require, eliminating the need for multiple tools and specially trained resources. NetApp BlueXP backup and recovery capabilities are being extended to a broader range of workloads with support for application-consistent database deployments in major clouds using either NetApp software-defined or hyperscaler-native storage offerings such as Oracle databases on Amazon FSx for NetApp ONTAP. Deployment in the most secure environments: New NetApp BlueXP private and restricted modes of deployment allow for BlueXP and associated storage and data services to be deployed in highly secure, compliance-sensitive environments which might include government clouds, or even "dark site" implementations requiring full isolation from internet connectivity. Cloud Insights Federal Edition is now available for deployment in environments and workloads requiring FedRAMP high impact level protections. Cloud Volumes ONTAP (CVO) is now available in the AWS Marketplace for the U.S. Intelligence Community (IC) – a marketplace that support the unique needs of the U.S. Intelligence Community by providing improved security, increased mission impact, and cost savings. "BlueXP's enhanced workload coverage and security features will dramatically increase our customers' capability to tackle business critical issues like addressing cloud complexity, boosting security and optimizing cost," said Matt Swinbourne, CTO, Cloud Architecture, NetApp Asia Pacific. "Today's solution launch will accelerate NetApp's advancement in the hybrid multicloud and Flash storage markets in APAC." NetApp BlueXP is the central method to manage NetApp ONTAP, NetApp's industry-leading data management software, both in the cloud and on-premises. Today's NetApp BlueXP announcement includes over a dozen feature updates and innovations. Learn more about BlueXP and sign up for a free trial at bluexp.netapp.com
Cobalt Iron Patents Its Proactive Technology for Automated Remediation of Cyber and Storage Events
Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced that it has received a patent on its proactive technology for automated remediation of cyber and storage events. U.S. Patent 11636207, issued on April 25, describes new techniques that will be implemented in Cobalt Iron Compass®, an enterprise SaaS backup platform. This patented technology is unique in that it enables automated health remediation of various failures and conditions affecting storage devices and backup operations. As a result, backup data and operations will become more resilient to storage device failures and cyber threats, thereby improving availability for storage and backup administrators and other IT professionals who are responsible for the health and security of storage and backup resources and operations. This patent is associated with U.S. Patent 11308209, Cobalt Iron's technology for optimization of backup infrastructure and operations for health remediation, issued in April 2022. By applying new optimization techniques, that patent enabled Compass to restore the health of backup operations automatically when they are affected by various failures and conditions. While this new patent is similar, it also incorporates health issues specific to storage devices that will automatically trigger remediation actions. Various conditions such as failing storage devices, cyber attacks, weather, fire, and floods can have serious impacts on backup operations. Unfortunately, existing backup products do little to assess — or even detect — the impact of these conditions on a data protection environment. Analysis of the possible impacts of failures or threats between interrelated components, operations, and environmental conditions, as well as automated remediation of cyber and storage events, are virtually non-existent in the data protection industry. Moreover, there is little assistance with understanding the possible impact of such conditions on backup operations, especially when those conditions occur remotely. Additionally, existing technologies are almost completely lacking in awareness of interdependencies between various components of a backup environment. Users are left to monitor and recognize these interdependencies manually, attempting to understand and determine how various conditions might impact their infrastructure and operations. These steps are seldom taken except in the case of failures or cyber threats when the damage is already done and it's often too late for remediation. This reactive approach to dealing with cyber and storage events usually results in failed operations and critical situations. To address these concerns, Cobalt Iron's latest patent will enable such tasks as the discovery of interdependencies between various components of a backup environment (such as storage devices at multiple locations including the cloud), monitoring of failures and threat conditions, impact analysis to interrelated components, and automated health remediation actions. Specifically, the techniques disclosed in this patent will: Determine the interdependencies between various hardware and software components of a backup environment. Monitor for conditions in local or remote storage repositories that may affect local backups. These conditions include storage device warnings or failure, indications of a cyber attack, security alert conditions, and environmental conditions such as severe weather, fire, or flood. Identify data that might be affected by the device's health issues. Dynamically reconfigure backup operations and the backup architecture to direct backup data to a different target storage repository (remote or in a cloud) that is unaffected by the conditions. Automatically extend retention periods for backup data or backup media associated with data possibly affected by device health issues. Automatically initiate additional backup or replication operations for data possibly affected by device health issues. Automatically initiate data integrity checking on data possibly affected by device health issues. For example, these techniques could detect that a backup storage device at a particular location is experiencing device failures, cyber threats, or is subject to environmental conditions. After automatically analyzing the impacts of the condition, the techniques would then take actions to remediate the situation, including reconfiguring backups to use other storage devices at additional locations (including the cloud), extending retention periods of backup data or backup media, or performing backup operations. "Businesses struggle to monitor cyber and IT infrastructure events and to understand their impact on operations such as backup," said James Kost, senior systems engineer at Cobalt Iron. "The techniques disclosed in this latest Cobalt Iron patent identify data impacted by various conditions such as cyber attacks or storage device failures and take remediation actions to validate and further protect that data. This patent continues to build on Cobalt Iron's technology leadership in automated optimization of IT operations."
IT-OT Security Convergence Key to Optimizing Risk Management
Trend Micro (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced a new study revealing that enterprise Security Operation Centers (SOCs) are expanding their capabilities to the OT domain, but major visibility and skills-related challenges are causing roadblocks. To read a full copy of the SANS Institute report, Breaking IT/OT Silos With ICS/OT Visibility, please visit: https://resources.trendmicro.com/SANS-ICS-OT-Visibility-Survey.html Bill Malik, vice president of infrastructure strategies at Trend Micro, "IT-OT convergence is already driving digital transformation for many industrial organizations, but to effectively manage risk in these environments, IT and OT security operations (SecOps) must also converge. OT security programs may be lagging, but there's a fantastic opportunity to close the visibility and skills gap by consolidating onto a single SecOps platform like Trend Vision One." The study finds that half of the organizations now have an enterprise SOC that includes some level of ICS/OT visibility. However, even where respondents have a more "expansive" SOC, only half (53%) of their OT environments provided data for detection purposes. This shortfall is also implicit in another finding: cyber event detection (63%) is the top capability that respondents want to integrate between IT and OT silos, followed by asset inventory (57%) and identity and access management (57%). Being able to detect events across IT and OT environments is the most critical to identifying root causes and preempting future threats that could potentially disrupt operations. The report highlights endpoint detection and response (EDR) and internal network security monitoring (NSM) as crucial tools to help provide that root cause data. However, deployment of EDR on engineering and operator assets stands at less than a third (30%) of responding organizations. NSM is rarely (<10%) deployed at a physical process and basic control level deep in OT environments. Aside from visibility gaps, the study reveals major people and process challenges to expanding SecOps across IT and ICS/OT environments. Four out of the five top barriers highlighted by respondents are related to staff: Training IT staff in OT security (54%) Communication silos between relevant departments (39%) Hiring and retaining staff who understand cybersecurity (38%) Training OT staff in IT (38%) Insufficient risk visibility across IT and OT domains (38%) Legacy technology is also cited as a top challenge for expanding OT SecOps visibility. The limitations of legacy devices and networks (45%) and IT technologies not designed for OT environments (37%) are named among the top three challenges here, alongside a lack of OT knowledge among IT staff (40%). Going forward, respondents are doubling down on efforts to converge IT-OT SecOps and drive greater visibility into OT threats. Two-thirds (67%) plan to expand their SOC, and for those who have already deployed EDR, 76% are planning to expand these deployments in ICS/OT over the coming 24 months. Additionally, 70% of those who have already added NSM capabilities plan to expand these deployments in the same time frame. ### *Trend Micro commissioned the SANS Institute to interview 350 SANS community members who are ICS/OT professionals working in critical infrastructure sectors across the US, Europe, and Asia.
Trend Micro Ranked #1 in Worldwide Cloud Workload Security Market Share for 5th Consecutive Year
Trend Micro (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced that it remains by far the largest vendor in the cloud workload security market, with a share more than twice that of its nearest competitor. The data appears in the IDC Worldwide Cloud Workload Security Market Shares, 2022: A Shifting Landscape (doc #US50197823, May 2023). IDC's report highlights surging demand for cloud workload security. The overall size of the market increased by nearly 27% annually to reach $2.6bn worldwide. Trend Micro's cloud-specific revenue is predicted as greater than that of the second and third largest vendors combined. "Trend was early to spot the transformational potential in cloud and the need to secure this growing attack surface," said Kevin Simzer, COO at Trend. "With a 16% market share today, there's no vendor out there that comes close to the depth of our threat intelligence and geographic diversity of our customer base. Our focus now is to give our customers what they're increasingly demanding: a broad set of powerful cloud security capabilities delivered seamlessly to protect data no matter where it is." Yet as organizations migrate more of their mission-critical applications and workloads to cloud environments, they risk increased exposure to business disruption and data theft. The growing popularity of containers, and the accompanying move from monolithic to microservice architectures, is also highlighted by IDC as a fast-emerging risk factor. In the context of this increasing complexity, Trend remains committed to its mission to offer powerful protection, detection and response for data in every environment that can be managed from a centralized platform. Trend also recognizes that cloud does not operate in a vacuum. That's why the cloud-native Vision One platform was built to help SecOps teams prioritize threat signals, increase productivity, and take rapid action to contain threats across email, endpoint, network, server and cloud infrastructure. To read an excerpt of the IDC, Worldwide Cloud Workload Security Market Shares, 2022: A Shifting Landscape, report please visit: https://resources.trendmicro.com/IDC-Cloud-Workload-Security-Overview.html
Trend Micro Unleashes Trend Vision One Platform with Next-Gen XDR and AI Capabilities
Trend Micro (TYO: 4704; TSE: 4704), a global cybersecurity leader, has unveiled the next generation of cybersecurity platform, setting a new standard for strengthening security posture and threat defense. The new Trend Vision One™ platform release marks a significant leap forward in enterprise cybersecurity, encompassing robust attack surface risk management, cross-layer protection across hybrid environments, and next generation XDR, now amplified by powerful generative AI technology. Unparalleled XDR delivering the broadest coverage across security layers and superior support for hybrid IT environments The platform's advanced extended detection and response (XDR) capabilities include the broadest set of native security sensors to deliver the most comprehensive and cross-domain threat protection. By consolidating data across internal and third-party sources, utilizing advanced AI and machine learning analytics, and correlated detection models, the platform brings the next generation of XDR to market. "Trend offers us full security coverage as the first vendor on the market offering extended detection and response (XDR) across email, network, server, cloud, and IoT," said Matthieu Vanoost, Security Manager, Decathlon. "Trend proved itself to be a strategic partner that could meet Decathlon's needs. "Centralization and automation are at the heart of Decathlon's cybersecurity strategy, and this is why we partnered with Trend to ensure a streamlined security approach through our digital expansion." With unmatched visibility and insights into events, enterprises achieve more proactive defense, earlier detection, and faster incident response through capabilities including: Cross-layer, hybrid environment support: Trend Vision One protects every layer of an organization's diverse IT infrastructure including endpoints, servers, email, cloud services, networks, 5G, and OT (operational technology). Trend has the unique advantage of being able to leverage its breadth and depth of capabilities across cloud security, network security, and email and endpoint security natively in the platform. The platform also supports hybrid environments; empowering organizations to protect their assets across all environments — cloud, hybrid, or on-premises — without compromising security or the ability to extend to XDR. Third-Party Ecosystem Integrations: Trend Vision One has tripled its integration ecosystem across third-party and partner networks over the last 12 months. Community-driven integration efforts enable enterprises to leverage integration to propel security organizations forward with consolidated visibility and analysis and streamlined workflow automation and orchestration. Global Threat Intelligence: Underpinning the platform, is the company's leading global threat intelligence. With 16 research centers around the world; hundreds of threat researchers; and the Trend Micro™ Zero Day Initiative™ – the number one bug bounty program in the world — global and local intelligence feed the platform to help customers stay one-step ahead of adversaries. Trend intelligence unlocks deep breach activity and vulnerability intelligence with real-time threat insights, threat actor profiling, and end-to-end visibility into campaigns to rapidly understand and thwart attack attempts. Expert Managed Services: Delivered together with the platform, Trend brings greater simplicity and support to security operations with the broadest vendor-delivered managed detection and response (MDR) service on the market, augmenting internal teams with advanced threat detection, proactive threat hunting, rapid incident response, expert guidance, and continuous 24/7 monitoring and support. By consolidating data across internal and third-party sources and utilizing advanced AI, machine learning analytics and correlated detection models, the platform brings the next generation of XDR to market defending against the full range of adversarial tactics and techniques, including extortion, DDoS, ransomware and more. To learn more about Trend Vision One XDR capabilities, visit: https://www.trendmicro.com/en_hk/research/23/f/fight-cyber-extortion.html Platform Supercharged by Generative AI Trend brings transformative generative AI capabilities into its platform with the introduction of Companion, an AI-powered cybersecurity assistant. Companion amplifies security operations, boosts productivity and efficiency, and accelerates threat detection, response, and cyber risk management for analysts of all skill levels. This marks the initial phase of a multi-quarter rollout of AI and LLM capabilities embedded within Trend Vision One. Enhanced Accessibility and Efficiency: Companion empowers new analysts to contribute more quickly while enabling senior analysts to swiftly comprehend complex scenarios, facilitating better-informed decisions. This helps organizations and security leaders bridge the skills gap and manage their operations more effectively. Improved Hunting with Speed, Confidence, and Accuracy: Transforming plain-language search queries into formal search syntax, Companion enables rapid generation and execution of queries, unveiling relevant information for proactive threat response actions and minimizing adversarial movement. Accelerated Workflows and Reduced Friction: Gain plain-language explanations of cross-layer event alerts, attacker scripts, and command lines, access deep analysis and contextual AI-driven mitigation recommendations, and automate email, help-desk ticketing, and incident reporting, streamlining processes and enhancing efficiency. Amplified Impact via Platform Power: With cross-layer native sensors, market-leading threat intelligence, and robust integration capabilities, Companion extends its reach throughout the customer environment, guiding and prioritizing top risks, threats, and vulnerabilities, including newly discovered zero days, with precision. By working in harmony with Trend Vision One, Companion eliminates the risks associated with task-switching and alert fatigue. Trend's generative AI and LLM capabilities prioritize security and compliance in line with the requirements of this emerging technology. Stringent measures are in place to ensure visibility into how each model handles corporate data. Furthermore, additional controls and isolation mechanisms are implemented to prevent the mixing of Trend LLM with instances and training data from other vendors. "Delivering on the promise of XDR requires replacing complexity with simplicity, replacing bundles of products with integrated platforms," said Frank Dickson, Group Vice President, Security & Trust, IDC. "Trend's approach offers tangible benefits for security professionals by tightly integrating its products through greater consolidation, resulting in increased productivity and effectiveness of security professionals. And its support for hybrid environments means that for those in the real world that still have on-premises IT environment as well as cloud deployments that they will realize the benefits of XDR whenever they are." To learn more about Trend Vision One AI capabilities, visit: https://www.trendmicro.com/en_hk/research/23/f/companion-ai-assistant-trend-vision-one.html Proactive Attack Surface Risk Management (ASRM) Grounded in Zero Trust Principles Trend Vision One empowers organizations to build resilient cyber programs and proactively manage risk, thwarting potential events and breaches with cutting-edge attack surface risk management. Leveraging continuous attack surface discovery and real-time risk assessment, businesses can swiftly identify and remediate critical risk, including vulnerabilities and exposures, based on likelihood and impact of attack. The core components of Trend Vision One™ – Attack Surface Risk Management (ASRM) include: Cyber Asset Attack Surface Management (CAASM): ASRM maximizes existing investments and security infrastructure by leveraging data sources already deployed in the environment to provide deep visibility and insight into an organization's cyber asset landscape, ensuring proactive monitoring, risk assessment, and vulnerability management to prioritize and safeguard critical assets. External Attack Surface Management (EASM): Risk management cannot be effective in silos. EASM is integrated into the broader ASRM solution to enable defenders to gain a comprehensive outside-in view of the digital estate to identify potential threats and proactively mitigate risk originating from outside the network perimeter. Cyber Risk Quantification (CRQ): Security leaders can confidently communicate cyber risks, security posture, and resilience planning to the board, executive management, and compliance teams with proprietary and transparent cyber risk quantification reporting. Real-time, contextualized risk data ingests high-fidelity attack data, vulnerability and exposure insights, and security configuration and control status to quantify and benchmark performance, improve situational awareness, and prioritize critical actions. With continuous internal and internet-facing asset discovery, real-time visibility, and assessment Trend Vision One accelerates the journey towards "never trust, always verify" zero trust architectures — a highly desired but challenging-to-implement security framework. For the first time, organizations can now manage granular security controls, policy enforcement and policy decision points from a single platform to monitor, manage, and automatically execute dynamic data-driven security controls based on ASRM insights and integrated attack path management to reduce complexity and orchestrate least privilege access with little manual effort. With a clear path toward operationalizing zero trust, organizations can more effectively minimize their attack surface, slow attackers down, and protect against malicious and non-malicious insider threats, ensuring compliance and data protection. To learn more about Trend Vision One ASRM capabilities, visit: https://www.trendmicro.com/en_hk/research/23/f/attack-surface-management.html Empowering Partner Delivered Security Services Trend's partner ecosystem is an extremely important part of the global business strategy. This was underscored by CEO of Hitachi Systems, Anuj Gupta, who shared, "Hitachi Systems and Trend have a strong partnership and we are thrilled to be chosen to participate in their Partner Program for MSSPs. Trend's technology capabilities make it seamless to service our customers with their leading cybersecurity platform. We're able to efficiently run our operations, improve security outcomes and deliver valuable security services. This is a big leap forward for managed security service providers like us to deliver modern security operations services." Trend Vision One positions Trend and its MSSP partners to provide the most powerful solution on the market, addressing critical industry needs including: Ability for MSSP partners to deliver a wide range of cyber services, including ASRM and XDR use cases Extremely broad set of integrations into the IT environment Strong multi-customer management functionality Reduction in MTTR (mean time to respond, repair, resolve, recover) across the board To learn more about Trend Vision One, visit: https://www.trendmicro.com/en_hk/business/products/one-platform.html
Blueshift Memory and Crypta Labs to develop quantum-resilient cybersecurity memory module
Blueshift Memory, designer of a novel proprietary high-speed memory architecture, has announced that it has signed an agreement with Crypta Labs, developer of a quantum random number generator (QRNG) for resilient encryption, to create a cybersecurity memory solution that will be capable of countering threats from quantum computing. “Our innovative non-Von Neumann computer architecture already offers a high level of intrinsic cybersecurity,” said Peter Marosan, founder and CTO of Blueshift Memory. “The solution we are now developing with Crypta Labs adds quantum-resilient protection, meaning that data is encrypted within the memory and can only be read by the CXL-connected CPU. We believe that this joint development will yield the one of the first technologies to create a bridge between quantum computing and silicon computer memory technology.” Crypta Labs has developed a discrete Quantum Optics Module (QOM) and embedded software that together constitute a first-of-its-kind QRNG solution. Blueshift Memory will integrate the QOM into its Cambridge Architecture™ FPGA module to create a cybersecurity memory solution that is resilient to threats, even those from quantum computing. “The basis for all encryption starts with a random number, and this is increasingly under attack since many so-called random numbers are in fact created by a pseudo-random generator,” said Dr Jose Garcia Coello, Chief Science Officer at Crypta Labs. “By using photons as a source of entropy, we have developed a fast, reliable method to generate true random numbers from that entropy using a quantum optics module. Blueshift Memory has a disruptive technology for highly efficient handling of large data sets and time-critical data like AI, and we are very excited to be working with them to add quantum-resilient cybersecurity to their solution.” In 2022 Blueshift Memory was awarded a prestigious Smart grant by Innovate UK to develop a computer vision AI module based on the Cambridge Architecture and integrating a customized Codasip RISC-V core, which dramatically increases memory bandwidth and improves efficiency. It has also been Highly Commended in the ‘One to Watch’ category at the recent Cambridge Independent Science and Technology Awards.
SquareX Unveils USD 25,000 Bug Bounty Program, Inviting Global Hackers to Push the Limits, Test, and Strengthen its Security Product
SquareX, led by serial cybersecurity entrepreneur Vivek Ramachandran, is developing a browser-based cyber security product to safeguard consumers online. In May 2023, SquareX secured a seed round of USD 6M from Sequoia Capital South East Asia and is now preparing to launch the product globally. In recent years, Americans have suffered significant financial losses due to online scams and hacks. As technology continues to advance and the digital landscape expands, cybercrime is expected to rise both in the United States and worldwide. However, the traditional cybersecurity products dominating the market, such as antivirus software, anti-malware tools, and VPN solutions, have seen minimal innovation in addressing the evolving threats. Moreover, they often hinder consumer productivity by blocking access to files, websites and resources, causing fear and prompting users to uninstall them, leaving users even more vulnerable to attacks. Recognizing the need for a fresh and effective approach to restore consumer confidence in online safety, SquareX is committed to challenging the status quo of traditional cybersecurity products by engineering a solution from the ground-up, purpose-built to tackle the current generation of threats. Unlike traditional security companies, which wait for hackers to find and report security bugs to them, SquareX is taking an unconventional step by announcing a Bug Bounty program before the product's official launch. This program invites hackers, security researchers, and the wider community to test and uncover potential security vulnerabilities, demonstrating SquareX's dedication to real-world battle testing. The Bug Bounty program will span over six weeks, from Thursday, 15 June 2023 to Thursday, 27 July 2023. During this period, bug bounty hunters are encouraged to help, battle-test and harden the product. As an incentive, SquareX is offering rewards totalling up to $25,000 for successfully discovered and reported vulnerabilities. "SquareX has a strong culture of research and hacking, with multiple team members having previously discovered security vulnerabilities and having disclosed them at top security conferences" stated Vivek Ramachandran, Founder of SquareX. "We invite the global hacker community to participate in this Bug Bounty program, and help us discover vulnerabilities. I hope in doing so, we will be able to launch a world-class cybersecurity product that consumers can use and be fearless online." By opening its product to be rigorously tested by hackers worldwide, SquareX aims to establish trust, a pivotal factor in winning customer confidence over to embrace their solution. Hopefully, this will encourage other consumer focussed companies to follow suit.
Cobalt Iron Earns Patent on Adaptive, Policy-Driven Data Cyber Inspection Technology
Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced it has received a patent on its adaptive, policy-driven data cyber inspection technology. U.S. patent 11663362, granted on May 30, introduces new policy-based approaches for effectively validating data integrity using multiple cyber inspection tools. The technology will be available as part of the company's Compass® enterprise SaaS backup platform. In particular, two novel factors qualify this technology for a patent: It introduces policy-based control to cyber inspection that responds to various times or events in the life cycle of a data object. It includes policy-driven cyber inspection that leverages multiple cyber inspection tools and multiple cyber inspection levels: at different times or events in the life cycle of a data object for different types of data or for different types of cyber events While cyber threats and attacks continue to accelerate, operational responses to these attacks remain reactive, disjointed, and manual. During cyber attacks, companies are typically panicked and scrambling to understand the scope of data damage and what they can do to validate the integrity of their data. The newly patented capabilities will allow CIOs, security officers, and other data custodians to proactively monitor and validate data using whatever cyber inspection tools are most appropriate and effective for given data or cyber threats. They also allow businesses to establish cyber inspection security policies that ensure their data is being monitored and validated consistently across the enterprise — as opposed to the manual, reactive, haphazard approaches employed today. These cyber inspection security policies provide data security consistency and can prove data custody discipline to the business. The techniques disclosed in this patent are: Monitor for various times and events in the life cycle of data objects, such as creation, modification, backup, recovery, security audit, and cyber attack. Apply an inspection-class policy to determine what cyber inspection and level of inspection to perform on a data object upon occurrence of a specific time or event. Perform an inspection-class operation and a level of cyber inspection on the data object. Restore a copy of a data object within a security zone upon occurrence of a specific time or event involving the data object. Perform a data protection operation on a data object upon occurrence of a specific time or event involving the data object. For example, these techniques could detect indications of a cyber attack and perform specific types and levels of virus-scanning against specific data objects or types of data. They might also perform specific types and levels of cyber scans for specific types of attacks. In another example, this patent allows businesses to establish cyber security policies for using different data-inspection tools — such as virus or malware scans — for different data objects or data types or for different types of attacks. In this manner, Compass will automatically use the most current, best-of-breed inspection tools in the most effective way for given data and for a given event, all directed by consistent policy. "In the data protection landscape, using the optimal inspection techniques responsive to particular events is critical to today's enterprises. A single vendor and simple policy miss the mark," said Richard Spurlock, founder and CEO, Cobalt Iron. "With this patent, Cobalt Iron positions companies to leverage best-in-class inspection tools proactively, with policy-driven optimization and governance."
Cobalt Iron Outperforms in GigaOm’s Latest Radar for Hybrid Cloud Data Protection: Large Enterprises
Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced that it has been named an Outperformer on technology analysis firm GigaOm's Radar for Hybrid Cloud Data Protection: Large Enterprises. This Radar focuses on hybrid cloud data protection solutions suited for large enterprises and cloud and managed service providers. GigaOm evaluated key vendors and placed Cobalt Iron high among them on the strength of the Compass® enterprise SaaS backup platform. "Cobalt Iron impressed us this year with its Compass Cirrus Cloud Backup-as-a-Service solution," said Max Mortillaro, analyst for GigaOm. "This cloud-hosted BaaS offering delivers elastic scalability and feature parity with Cobalt Iron Compass under a pay-as-you-grow model." "Overall, the company is consistently executing against its roadmap and now offers flexible deployment and consumption options across its portfolio, delivering a comprehensive set of enterprise-grade data protection capabilities to its customers," added Arjan Timmerman, also an analyst for GigaOm. Every year GigaOm issues a series of documents to help IT organizations assess competing solutions in the context of well-defined features and criteria, such as scalability, performance, and total cost of ownership. The GigaOm Radar weighs each vendor's execution, roadmap, and ability to innovate, and plots solutions on a "radar"-like graph. The closer to the center a solution sits, the better its execution and value, with top performers occupying the inner Leader circle. Cobalt Iron is not only in the Leader circle for the second year in a row, but this year the company also achieved Outperformer status, which indicates the fastest possible pace of innovation and rate of progression. The report states, "Cobalt Iron provides strong cyber resiliency features at both the predictive and remediation levels. The company puts a strong emphasis on its Zero Access™ architecture, which makes the data backed up into Compass inaccessible, read-only, and immutable; data can only be deleted based on strictly controlled and monitored data retention policies. Cyberattack detection includes monitoring multiple anomalies and abnormal behaviors, including baselining the normal environmental behavior and observing deviations, with additional 'cyber inspection' features to be delivered by the end of 2023. The capabilities are regularly improved and made available to customers. Finally, Cobalt Iron also proposes a logical air gap solution and options for physical air-gapped copies of backups." Cobalt Iron received "Exceptional" marks, indicating outstanding focus and execution in the key criteria of analytics, cyber resiliency, and backup as a service. The company also got Exceptional marks across all of GigaOm's evaluation metrics: solution lifespan, scalability, flexibility, efficiency, security, manageability and ease of use, and ecosystem. "GigaOm does such a thorough and thoughtful evaluation every year that its Radar report is a valuable reference resource for companies investigating technologies," said Greg Tevis, vice president of global strategy at Cobalt Iron. "The fact that Cobalt Iron Compass is not only in the Leader circle once again but has advanced to an Outperformer this year should instill the utmost confidence in anyone who's considering Compass to protect their critical enterprise data."
Trend Micro Predicts Cloud Security Will Be Consumed by the SOC by 2026
Trend Micro (TYO: 4704; TSE: 4704), a global cybersecurity leader, predicts the security operation center (SOC) within organizations will absorb cloud security by 2026. Security leaders are recognizing that cloud and the way cloud security teams work today are becoming increasingly critical to business and IT operations. As a result, cloud security and the foundational practices of their teams will be absorbed into the SOC to increase efficiencies in the coming years. "Valuable innovations always cross the threshold and are absorbed into standard operations -- happened with virtualization, and it will happen again with cloud," said Mike Milner, VP of cloud technology at Trend Micro. "The organizations and individuals that lean into this will lead the way." Leaders who have successfully navigated cloud security are well placed to navigate a similar move to the modern SOC landscape. Software is consuming everything, creating system infrastructure that is increasingly defined as code and reliant on large volumes of data with automation as the cornerstone for delivering value at increasing speeds. All these principles are foundational to teams building and securing in the cloud, but SOC and IT infrastructure teams' tooling, like cross-detection and response (XDR), also leverage these concepts and can benefit from absorbing the scale, skills, and expertise of cloud teams. Trend's prediction is that viable SOC tools will grow to include cloud protection capabilities. With the increased inclusion of cloud detection and response (CDR) within XDR platforms, the SOC function will have an increased scope that will also impact leadership qualifications. Global organizations are set to spend $600 billion on public cloud services this year as the technology increasingly becomes an integral part of standard IT operations. Recent estimates suggest 87% of enterprises have already embraced multi-cloud and 72% are running hybrid cloud environments. Organizations wanting to leverage the combined strengths of their organizations might look to security partners with expertise in both cloud security and SOC tooling to smooth the transition in addition to these thoughts. Recommendations for organizations: Give CIOs more freedom to experiment with handling cloud and cloud security teams Look seriously at a cloud security leader as the next CISO Encourage or deliberately connect the leadership of the two teams – via joint executive briefings or having both reports into the CIO Consider rotational programs for security and engineering teams Recommendations for aspiring CISOs: Gain experience in cloud transformation Pick a cybersecurity partner with experience adopting and integrating technologies between cloud security and SOC tools Maintain cloud practitioner certifications from partners such as (AWS, Microsoft Azure, Google Cloud Platform, etc.) Leverage learnings from the cloud like immutability, building from code, and automation to improve security posture and respond quickly
Sit Back, Relax, and Leave Your Worries with Arlo this Summer
With summer arriving and everyone gearing up for a fun-filled vacation with friends and family, security may not be at the top of your mind. But leaving your home unattended for days or weeks on end makes it an easy target for burglars. Worry not! Arlo's industry-leading portfolio of smart home security solutions will help keep an eye on your home, allowing you to enjoy your vacation with utmost peace of mind. Arlo Essential Indoor Security Camera Enjoy your vacation to the fullest while keeping an eye on what goes on in your house with Arlo Essential Indoor Security Camera. It records 1080p HD video with a 130-degree diagonal field-of-view by connecting directly to the Wi-Fi, and allows for two-way communication with its full-duplex audio feature. Even in the dark, the Arlo Essential Indoor Camera captures video with Night Vision that turns on automatically, giving you visuals of all rooms in your house 24/7. If anyone enters your abode, you will receive a phone alert immediately with the camera's motion and audio detection function. This multi-functional camera even allows you to activate the privacy shield on the camera to cover the lens whenever you want. Arlo Essential Indoor Security Camera: SGD129 (RP: SGD149) Arlo Pro 4 Wireless Security Camera For advanced outdoor and indoor surveillance, the Arlo Pro 4 Wireless Security Camera is the perfect option. Featuring cutting-edge capabilities such as 2K HDR video quality, a 160-degree field of view, and two-way audio, this versatile security camera will give you absolute peace of mind while you are on vacation. Movements might be harder to pick up in the dark, but the camera's unique integrated spotlight with colour Night Vision gives you crystal clear visuals even at night. The built-in smart siren will alert you to intruders and allow you to fend them off easily. The Pro 4 is simple to set up – with direct connection to Wi-Fi, you can set it up as a standalone security solution or a complimentary camera to an existing Arlo ecosystem. Arlo Pro 4 Wireless Security Camera: SGD329 (RP: SGD409) For more information on Arlo products, please visit https://kaira.arlostore.sg/