Black Box to Showcase Cutting-Edge Connectivity Solutions at BICSI Winter Conference & Exhibition, Jan. 28-Feb. 1
Black Box at ISE 2024: Industry-Leading KVM-Over-IP Solutions for Control Room Connectivity and Collaboration
CIOReview Adds Cobalt Iron to Its List of Top 10 Most Promising Data Security Solution Providers 2023
Trend Micro Achieves AWS Built-In Competency to Simplify and Accelerate Cloud Success
Trend Micro First to Integrate Cloud Risk Management and XDR Across Customers’ Entire Attack Surface
Cobalt Iron Secures Patent on Applying Machine Learning to Cyber Inspection
How to avoid being a victim of professional social network scams
Trend Micro Named a Leader in Endpoint Security
Trend Micro Container Security Evolution Saves SOC Teams Up to Two Weeks of Time Per Incident
OPSWAT Unveils CIP Lab at GovWare in Singapore, Showcasing Cutting-Edge IT/OT Cybersecurity Solutions
SolarWinds Commemorates Cybersecurity Awareness Month by Highlighting Software Industry’s Secure by Design Progress
SolarWinds (NYSE:SWI), a leading provider of simple, powerful, secure observability and IT management software, commemorates Cybersecurity Awareness Month by highlighting the software industry's progress toward becoming more Secure By Design. Informed by years of experience from industry-leading cybersecurity experts, the SolarWinds Secure by Design initiative is a gold-plated cybersecurity approach to software build systems and processes that set a new standard in software supply chain security. SolarWinds developed Secure By Design to address the evolving threat of highly sophisticated and unforeseeable cyberattacks, including those by advanced nation-state threat actors. As a guiding principle for software security and cyber resiliency, Secure By Design provides an effective and novel defense for thwarting advanced supply chain cyber threats. With a focus on creating more secure environments, the SolarWinds Secure By Design guiding principles were designed to make both the company and the software industry at large safer. "Security is an ongoing journey with no finish line but, as we reflect on the past year, it's clear we've made great progress on the journey towards a Secure by Design industry," said Sudhakar Ramakrishna, CEO and President of SolarWinds. "The increasing frequency and sophistication of cyber threats demand a collective response from the cybersecurity community. It is our shared responsibility to come together, collaborate, and innovate to build a more secure future for all." The past year has seen significant advancement of the adoption and implementation of a more Secure By Design approach, including new community approaches to support cyber resiliency, more secure software build systems, improved information sharing about threats across the industry, and a stronger cyber workforce. Building Out a Community Approach to Support Cyber Resiliency This year marks the 20th annual Cybersecurity Awareness Month, in which the President of the United States and Congress dedicate time to work together with the public and private sectors to raise awareness about the importance of cybersecurity. SolarWinds has continually called for transparent and open information sharing across the industry and more robust public-private partnerships to combat increasingly sophisticated nation-state cyberattacks. SolarWinds recently hosted a panel discussion in Washington, D.C., highlighting several key ways to help the industry stay secure. Ramakrishna was joined by Congressman Darrell Issa (R-CA), Congressman Raja Krishnamoorthi (D-IL), and CISA Executive Assistant Director for Cybersecurity Eric Goldstein for a conversation on why stronger public-private partnerships are needed to enhance the security of the nation's cyberinfrastructure. Additionally, SolarWinds will be in attendance at GovWare 2023, joined by more than ten thousand other policymakers, tech innovators, and end-users. This year's theme, "Fostering Trust Through Collaboration in the New Digital Reality," aims to address the significant link between digital trust and achieving success in today's cyberspace. Developing A Resilient Build Environment with The Next-Generation Build System The SolarWinds Next-Generation Build System, a key component of the company's Secure By Design approach, leverages a unique parallel build process where software is developed in multiple secure, duplicate, and ephemeral environments. First unveiled by SolarWinds last year, the Next-Generation Build System was developed to make supply chain attacks more difficult to execute by prioritizing cybersecurity throughout the entire lifecycle management process. As SolarWinds recently announced, the Next-Generation Build System meets or exceeds the Secure Software Development Framework (SSDF) updated last year by The National Institute of Standards and Technology (NIST®). The build system's alignment with SSDF and CISA's Enduring Security Framework has been a continued driver encouraging more organizations to become Secure By Design. The SolarWinds Next-Generation Build System has received multiple industry recognitions this year, including the CSO50 Award for IT Infrastructure Monitoring and Management, the BIG Innovation Fortress Cyber Security Award and recognition from the Cloud Security Awards. Additionally, SolarWinds Chief Information Security Officer and VP of Security Tim Brown, who has spearheaded the ongoing development of the Next-Generation Build System, was named CISO of the Year by the Globee® Cybersecurity Awards. Improving Security Through a Stronger Cyber Workforce This year, the industry has prioritized growing the cybersecurity workforce, a critical mission as more than 3.4 million positions in the field remain unfilled. The White House recently unveiled a first-of-its-kind National Cyber Workforce and Education Strategy to address both immediate and long-term cyber workforce needs. Alongside this announcement, the U.S. National Science Foundation CyberCorps® Scholarship for Service program will provide more than $24 million over the next four years to support the development of a stronger cybersecurity workforce. SolarWinds has long advocated additional resources for skill and vocational training. The company has taken on a leadership role in this regard, encouraging software companies to allocate the equivalent of one trained, full-time employee to support CISA and foster information-sharing between companies and government agencies. This collaboration across sectors is necessary to create unified best practices and develop shared threat intelligence. For more information on the SolarWinds Secure By Design initiative, please visit: https://www.solarwinds.com/trust-center
Trend Micro Recognized as a 2023 Gartner® Peer Insights™ Customers’ Choice for Endpoint Protection
Trend Micro (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced that it has been recognized as Customers' Choice in the 2023 Gartner Voice of the Customer for Endpoint Protection Platforms by customers on Gartner Peer Insights™. To read more about the Gartner® report, Voice of the Customer for Endpoint Protection Platforms, please visit: https://www.trendmicro.com/explore/gartner-voc-endpoint "The Trend Vision One platform takes modern endpoint protection to a new level by enabling customers to manage policies and bridge the gap between threat protection and cyber risk management across endpoints, servers and cloud workloads all from a single location," said Shannon Murphy, Global Security and Risk Strategist at Trend. "We're delighted this approach is resonating with the market. There's no more important validation for us than from the cybersecurity community through the voices of our customers." The Gartner® Peer Insights™ report for Endpoint Protection Platforms (EPPs) is based on 4,210 published reviews over an 18-month period ending 30 June 2023. To be recognized as a Customers' Choice, vendors must meet or exceed both the average Overall Experience and the average User Interest and Adoption. Of 275 customer reviews for Trend Micro, the vast majority (62%) were five-star, with over a third more (35%) four-star reviews. Trend received an overall rating of 4.6 from its customers and a 93% willingness to recommend for its EPP offering as of June 2023. Trend Vision One™ – Endpoint Security goes beyond typical EPP by offering protection, detection and response across hybrid environments: physical servers, virtual machines, cloud and containers. It integrates EDR/XDR across endpoints, datacenters and cloud workloads to drive enhanced detection and response. And it features comprehensive multi-layered capabilities including anti-malware and ransomware protection, device control, host-based intrusion prevention, application control, file integrity monitoring, log inspection, machine learning/AI and more. In addition to this recognition, Trend Micro has been named a Leader in the Gartner Magic Quadrant™ for Endpoint Protection Platform (EPP) report 17 times since the report was published for the first time in 2002. Trend has also been ranked #1 for Cloud Workload Security Market Share (IDC) for five years in a row. Gartner, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Chris Silva, 31 December 2022 The report Magic Quadrant for Endpoint Protection Platforms was published as Magic Quadrant for Enterprise Antivirus in 2005-06, as Magic Quadrant for Enterprise Antivirus, 1H03 in 2003 and as Enterprise Antivirus 2Q02 MQ: Room for Improvement in 2002. Gartner is a registered trademark and service mark, Peer Insights and Magic Quadrant are registered trademarks, of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose
New Report Highlights Key Elements of Cloud Workload Security Landscape
Trend Micro (TYO: 4704; TSE: 4704), a global cybersecurity leader, today revealed its citation by analyst Forrester in a new report which will help IT buyers better understand the landscape of cloud workload security offerings. To access a full copy of the Forrester report, please visit: https://www.forrester.com/report/the-cloud-workload-security-landscape-q3-2023/RES179850 Forrester's report, The Cloud Workload Security Landscape, Q3 2023, lists Trend Micro as one of six vendors that generate $250m or more in annual revenue from their cloud workload security (CWS) portfolio. The report also covers extended use cases that include three areas of focus for Trend: agent-based cloud workload protection; container protection; and cloud security posture management (CSPM). Trend has decades of experience innovating in all three product areas, and will be showcasing further advancements at AWS re:Invent in November. Container and cloud workload protection will be enhanced, unified and integrated with XDR to deliver centralized detection and response for the cloud (CDR). Trend will also look to integrate its CSPM and container runtime vulnerability capabilities into a major new offering to help customers better manage risk across their cloud attack surface. These enhancements are part of the Trend Vision One™ strategy designed to deliver visibility, control and risk management across the entire IT and OT environment from a single platform. "Trend Micro pioneered cloud security as we know it," said Kevin Simzer, COO at Trend. "We remain focused on innovating for our customers, whatever stage of the cloud journey they're at. Our upcoming announcements at AWS re:Invent will deliver even more value as we accelerate our platform-based security strategy to help global organizations improve attack surface risk management."
Cobalt Iron Advances Cyber Recovery With Isolated Vault Services
Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced Isolated Vault Services™, a new enhancement available in the Cobalt Iron Compass® enterprise SaaS backup platform. In a simple and unique way, Isolated Vault Services makes it possible to transition normal backup operations into isolated vault recovery services. It is intended for companies needing to recover data in an isolated vault or clean-room environment, typically as part of a declared disaster or cyber recovery operation. The simplicity of switching normal backup operations to isolated vault recovery services is something not experienced with other backup products. With the ubiquity of cyber attacks, companies must continually improve their data resiliency and recovery posture. A critical part of that task is ensuring data is recoverable and then validating the integrity of recovered data after a disaster or cyber event. Data administrators need clean copies of data that they know have been and are isolated from access by bad actors. To that end, they often establish an isolated clean room for purposes of recovering systems, applications, and data. Transitioning normal backup operations into isolated recovery services is challenging because backup infrastructures and operations are based on accessibility and connectivity that are not allowed in a vaulted recovery zone. In addition, typical backup environments have many vulnerabilities and are the target of cyber attacks themselves, so there must be some level of confidence that backup data and operations are sanitized before introducing them into a clean-room recovery environment. As a result, organizations struggle with establishing safe, isolated recovery zones, where production operations can be restored from current backups that are accessible and validated. Cobalt Iron Compass is unique in that all backup data ingested into the platform is vaulted and immutable by design, with no access available to the backup environment. Compass Isolated Vault Services extends these Zero Access™ architectural advantages by allowing administrators to toggle Compass Accelerators — the physical, on-premises devices that deliver the Compass SaaS platform — from normal backup operations into an isolated recovery services mode. At that point, customers can use the Compass Accelerators to restore business data and services inside of an isolated vault zone, completely disconnected from the internet. This vault service functionality is available through the local Compass Accelerator menu services or through the Compass REST API for orchestrated recovery. Isolated Vault Services: (1) Facilitates clean room system, application, and data recoveries. (2) Allows any Compass Accelerator to operate in a completely network-isolated vault mode for safe recovery from cyber events and disasters. (3) Enables automated recovery orchestration via Compass Isolated Vault Services REST API. >Stop, start, restore, and query data protection server instances. >Control, select, and connect Accelerator-protected data storage. >Perform Accelerator-protected client data operations, such as list clients, unlock clients, and change client passwords. Isolated Vault Services frees data administrators from cumbersome isolated recovery processes, such as establishing a recovery infrastructure in the isolated vault zone, manually reconfiguring backup and storage, manually recovering backup data and operations into an isolated vault environment, and validating backup data to ensure it was not infected prior to being made available in the isolated vault zone. Isolated Vault Services is available today at no additional cost to Compass users. "Disasters and cyber attacks can wreak havoc on even the most prepared businesses. We see organizations struggle with restoring data and services in safe, isolated recovery environments," said Richard Spurlock, Cobalt Iron founder and CEO. "Compass Isolated Vault Services transforms the complexity of vaulted recovery zone services into simple and dependable recovery activities for systems, applications, and enterprise data following disaster or cyber events."
Arlo Unveils New Essential Cameras and Doorbell To Provide Affordable Smart Home Security that Protects Your Everything
Arlo Technologies, Inc. (NYSE: ARLO), a leading smart home security brand, recently announced its second generation Essential cameras and doorbell that deliver smart home protection at incredible value in the USA. Today, they are available in Australia and New Zealand. The lineup includes a new standard Essential Outdoor Camera, as well as a new Essential Indoor Camera with an automated privacy shield. A new Video Doorbell with head-to-toe 180-degree field of view is also available. "Arlo prides itself in building trusted, lifelong customer relationships with innovative, award-winning security solutions that deliver an exceptional user experience," said Brad Little, Vice President & Managing Director – Arlo APAC. "Our new second generation Essential cameras and doorbell provide the best combination of technology and value Arlo has ever offered, adding to Arlo's wide range of high-quality products and industry-leading AI software to ensure you can protect your everything." The all-new second generation Essential Cameras and Doorbell offer several new advancements, providing customers with powerful smart home security solutions at affordable price points. Additionally, each device features USB-C connections for easy re-charging, and a new quick set-up process offering a faster, more streamlined experience via Bluetooth. Each of Arlo's second-generation Essential Cameras and Doorbell are available in 2K resolution that delivers two times more clarity than HD, allowing consumers great clarity at an affordable price. The new Arlo Essential Cameras and Doorbell include: Essential Outdoor Camera (2nd Generation) Check-in and take action quickly when motion is detected around your home with the Essential Outdoor Camera, featuring a 130-degree viewing angle, colour night vision, noise-cancelling audio and an integrated spotlight to rid any unwanted guests. 130-Degree Viewing Angle: Keep an eye on what matters most with a wide field of view Integrated Spotlight: Shine a light on your yard to ward off unwelcome visitors See More at Night: See videos in colour rather than traditional black and white for better identification Noise-Cancelling Audio: Hear and speak to visitors with clear, two-way audio Integrated Siren: Trigger your siren automatically, or manually from the Arlo app Weather Resistant: Designed to withstand heat, cold, rain, or sun Easy Setup and Install: Easy DIY installation with wire-free setup and mount MSRP of US$99.99 for a single camera kit. Essential Indoor Camera (2nd Generation) Stay connected to what's happening inside your home and keep your private moments yours with Arlo's Essential Indoor Camera featuring an automated privacy shield. Check-in on your home, family or pets anytime with two-way talk and night vision. Automated Privacy Shield: Keep moments private at any time by closing the shield directly through the Arlo Secure App 130-Degree Viewing Angle: Keep an eye on what matters most with a wide field of view Noise-Cancelling Audio with Two-Way Talk: Hear and speak to visitors with clear, two-way audio See at Night: View critical details even without a light with night vision Integrated Siren: Trigger your siren automatically, or manually from the Arlo app Easy Setup and Install: Plug in and connect directly to Wi-Fi and install anywhere MSRP of US$79.99 for a single camera kit. Video Doorbell (2nd Generation) See more at your front door and greet guests from anywhere right from your phone with the Arlo Video Doorbell, featuring two-way audio, night vision, and an integrated siren. Video Call: Answer the doorbell directly from your phone so you never miss a visitor Visitor Messaging: Have your guests leave a voice message if you're unable to answer the door, while listening remotely at your convenience Get the Full Picture: See a person from head to toe and packages on the ground with 180-degree field of view See at Night: View critical details even without a light with night vision Integrated Siren: Trigger your siren automatically, or manually from the Arlo app Weather Resistant: Certified to withstand heat, cold, rain, or sun MSRP of US$129.99. The second-generation Essential cameras and doorbell are fully compatible with Arlo Secure, Arlo's mobile app that allows users to connect and protect what matters most. An easy-to-use interface manages all connected Arlo products, letting users monitor their entire home and take immediate action right from their phone lock screen for ultimate peace of mind. With a paid Arlo Secure plan, users can take their security to the next level with advanced features including 30 days of rolling video history, customisable Smart Activity Zones for alerts that matter most, as well as time-saving automations that can be programmed to trigger events such as geofencing, mode changes, schedules, alarms and more. Accessories for the Arlo second generation Essential Cameras and Doorbell, including a Solar Panel, Outdoor Charging Cable, and Protective Camera Covers, will also become available. The Arlo second generation Essential Cameras and Doorbells are available now on Arlo.com and leading retailers nationwide. For more information on Arlo's full range of smart home security products and services, visit www.Arlo.com
Black Box to Showcase AI-Enhanced Solutions for Unified Customer Experience at GITEX GLOBAL
At GITEX GLOBAL, Oct. 16-20 at the Dubai World Trade Center (DWTC), Black Box® (booth H8-30) will showcase customer experience (CX) solutions and consulting services that leverage Conversational AI, Generative AI, and other cutting-edge tools to help businesses dramatically improve customer experiences, reduce costs and ensure optimal ROI from their CX technology investments. With a focus on how AI can improve efficiency and improve employee and customer satisfaction, Black Box will feature world-class services and solutions that help organizations deliver exceptional experiences with consistency across the customer journey. Black Box will partner onsite with Cognigy, which is revolutionizing the customer service industry by providing the most cutting-edge AI workforce on the market, providing solutions for the ultimate customer experience, whether it's an existing or new platform. "The quality of the customer experience can be a key differentiator for businesses today, and when deployed strategically within a larger CX solution, tools such as Conversational AI can deliver a valuable competitive edge," said N Jayantha Prabhu, business head - India, SAARC and MEA at Black Box. "We look forward to showcasing our best-in-class CX solutions and services at GITEX GLOBAL, where we'll offer insights into the value of AI tools and provide guidance with regard to overall CX transformation: choosing the right platforms, applications and business partner to deliver those integrations." Exhibiting within the AI Everything show at GITEX GLOBAL, Black Box will highlight CX transformation solutions and services that empower businesses to improve the experiences they provide to customers while reducing the costs of those services. Black Box experts will be on hand at GITEX GLOBAL to discuss in detail how AI-based tools can be implemented within larger CX solutions and services to help enable exceptional customer experiences. The company will also show how tools and technologies such as chatbots and voicebots, empowered by Conversational AI and Generative AI, can facilitate these goals — accelerating response times, enhancing personalization, reducing wait times, prioritizing issues, answering common questions, routing calls automatically, verifying or confirming customer-specific information, etc. — to help businesses optimize both internal processes and CX. More information about GITEX GLOBAL is available at www.gitex.com Further information about Black Box and the company's products and services is available at www.blackbox.com
SeeMetrics Launches *Customizable* Cybersecurity Performance Boards
SeeMetrics, the pioneering Cybersecurity Performance Management (CPM) platform reshaping the landscape of how security leaders measure, track, and improve security performance, is thrilled to launch its latest innovation: Customizable Cybersecurity Performance Boards. This product launch marks a significant milestone as it allows security leaders to communicate their desired narrative to different stakeholders and in the context that matters most to them. This customization comes in two essential dimensions: Security leaders can now instantaneously create their own Cybersecurity Performance Boards, selecting from a library of ready-to-use metrics that align with their specific needs and goals. Secondly, the customization extends to the metrics level as well, allowing leaders to set thresholds, filter business units, timeframes, asset types, geographic considerations and more in a dynamic way. These stack-derived metrics automatically analyze the relevant data and reflect performance in real-time. The genesis of this customization feature can be traced back to the introduction of SeeMetrics' Cybersecurity Performance Boards, spanning Vulnerability Management, Endpoint Protection, Identity Management, Mail Security, Security Awareness, and Incident Response. The new customizable boards were created to help meet the diverse demands of CISOs, each armed with unique objectives and interests, in order to assist them in managing their operations and sharing different narratives with various stakeholders. CISOs and security leaders are increasingly tasked with promptly addressing queries regarding performance, progress, and budget allocation. They require a centralized platform that consolidates, analyzes, and visualizes data from a multitude of operational security tools to communicate the state of operations to a range of different audiences - from security engineering, to management and executive teams. They need to identify trending patterns, identify the critical gaps, and understand how these factors impact overall performance. While SeeMetrics has been delivering out-of-the-box metrics thus far, the maturation of the cybersecurity industry and the increasing interest in metrics necessitate a move towards full customization capabilities, enabling CISOs to measure precisely what aligns with their unique needs. "When it comes to metrics, one size doesn't fit all: each company has their own challenges, priorities and risk appetite, requiring them to filter and focus on their specific business context,” says Shay Haluba, CTO and Co-Founder of SeeMetrics. “SeeMetrics now enables security leaders to easily customize their own metrics, empowering them to craft their own multidimensional security story by leveraging a foundation of out-of-the-box metrics and offering the option to mix and match, and coherently communicate the organization’s up-to-date security-stack performance on a regular basis.” "From my personal experience as a CISO, we all need a direct means to efficiently manage cybersecurity operations and customize them to suit our specific requirements, enhancing our comprehension of our effectiveness. This will lead to more dynamic conversations and better prepared CISOs,” says Julie Tsai, former Roblox CISO and advisor to SeeMetrics. “Metrics undoubtedly facilitate this process, but the ability to customize metrics relevant to my team's needs is a true game-changer."
VDM selects NAGRA to deliver the highest level of security through mediaspot, its next gen distribution platform
NAGRA, a Kudelski Group (SIX:KUD.S) company and the world's leading independent provider of content protection and multiscreen television solutions, today announced that France-based Video Digital Multimedia (VDM), a Groupe Transatlantic Company and leading provider of digital media solutions for the audiovisual industry, has integrated NAGRA NexGuard forensic watermarking to enhance content protection across its distribution workflows. “NAGRA provides the most efficient, flexible, and powerful solution that seamlessly integrates into mediaspot®, our Digital Media Platform. This ensures that our customers’ valuable assets remain secure from production to distribution, with no impact on quality or lead time.” said Sébastien Arlaud, Director of Business and Innovation at VDM. “Available as a subscription-based option of mediaspot®, forensic watermarking capabilities are configurable and can be activated for one title, for the full catalog, for content that meets a particular criteria or just automatically applied - customers are free to decide.” NAGRA NexGuard forensic watermarking is integrated into VDM’s mediaspot® file distribution service to uniquely watermark all content delivered and published to third parties. The solution allows for quick and efficient identification of any source of content leaks, providing content owners with key intelligence for anti-piracy actions, while acting as a strong deterrent against illegal copying or distribution. “We pride ourselves on being the trusted partner for innovative companies, like VDM, who recognize that security can no longer be considered optional—but rather a core component to protect valuable assets essential to business success,” said Olivier Met, SVP EMEA region at NAGRA. “NAGRA NexGuard continues to be the proven solution that delivers results for production and post-production houses, enabling them to keep control over the valuable content they produce as it progresses along increasingly distributed workflows.”
NAGRA Receives Industry Recognition for Content Protection Innovation at IBC 2023
NAGRA, a Kudelski Group (SIX:KUD.S) company and the world's leading independent provider of content protection and media and entertainment solutions, today announced that its Active Streaming Production CDN Gatekeeper won the CSI Award for Best Content Protection at the 2023 IBC Show. CDN Gatekeeper together with security monitoring and analytics are the latest extensions of the NAGRA Active Streaming Protection framework that address the growing threat piracy and fraud at the CDN edge. “This CSI Award win is further testament to NAGRA’s industry expertise, commitment to preserving content value and innovation in bringing the best solutions to take on the ever-evolving pirate service landscape,” said Nancy Goldberg, Executive Vice President and CMO at NAGRA. “Not only are we helping to secure investments in content, but our work demonstrates the value that can be derived from a holistic streaming security solution. With the right tools in place, our customers can transform their content protection strategies from a cost center to a profit center.” NAGRA Active Streaming Protection CDN Gatekeeper works alongside other Active Streaming Protection services to enable rapid identification and disruption of illicit stream consumption and service fraud at the CDN edge. Rather than terminating the feed, NAGRA makes it possible to degrade the quality of service, significantly impacting the viewing experience. The result is increased churn and damage to the reputation and ongoing viability of the pirate service. Leveraging edge-computing services such as AWS CloudFront Functions, Akamai EdgeWorkers or Google Media CDN Service Extensions, the NAGRA Active Streaming Protection CDN Gatekeeper service manages restriction lists and schedules targeted smart disruption to pirate services. At the same time, CDN tokens can be generated with extended rules to be enforced at a CDN level that align and are consistent with DRM sessions. Established in 2003, the CSI awards are among the industry's most prestigious and competitive technology awards, designed to recognize and reward innovation and excellence in the cable, satellite, broadcast, IPTV, telco, broadband/OTT video, mobile TV and associated sectors. NAGRA Active Streaming Protection is a holistic approach that delivers end-to-end content protection to address the security gaps often left open to pirates. For more information, visit https://dtv.nagra.com/active-streaming-protection
Swissbit introduces iShield Archive memory card that protects sensitive information
With ‘iShield Archive’, the storage and security expert Swissbit introduces a new microSD card designed for encryption and access protection of video and image records, expanding the Swissbit iShield product line for plug-and-play security solutions. The card is intended particularly for manufacturers and users for whom sensitive data confidentiality and data protection in line with GDPR legislation are top priorities. It can be used host-independently with all common camera types. The plug-and-play system offers insurance firms, governments, or security organizations an effective solution to guarantee that recordings are never viewed, copied, or erased by unauthorized people under any circumstances. The data is AES-256-bit hardware encrypted by iShield Archive and can also be used in WORM (Write Once, Read Many) scenarios. The microSD comes in storage sizes ranging from 16 to 64 GB and is UHS-I U3 and V30 rated for 4K video recordings. Securely storing sensitive video and image data is, in many cases, essential to ensure data protection, confidentiality, or the integrity of crucial evidence. After all, data breaches can have significant repercussions, particularly for public safety but also for the insurance or healthcare industries. This is where Swissbit's iShield Archive offers a reliable solution. Manufacturers, system integrators, businesses or authorities can easily equip drones, body cams and many other types of cameras with an extra layer of security using the microSD card. Functionality and operation The PC-based "iShield Archive Tool" (iAT) software is used to set up the card. Both the security parameters and user PIN are configured here. Following the initial configuration, iShield Archive securely stores data in the end device and uses hardware AES-256-bit encryption to protect it. Any previously recorded data is no longer viewable on iShield Archive once the camera is turned off or the microSD card is removed, and can only be accessed and downloaded using iAT together with a correct password. Up until the card's capacity is reached, this procedure can be repeated. To release storage capacity, data must first be deleted from iShield Archive, which is only possible through authentication with the correct password. Optionally, deletion can be further safeguarded by an admin PIN, which allows iShield Archive to be used for role-based access control. Here, only a defined group of individuals have the required rights to permanently delete recordings or data. In the so-called WORM mode, regular users have read-only access with a user PIN, but are not authorized to edit or delete data. WORM mode is commonly used for data that needs to be stored in a safe and unalterable manner for legal reasons. Technical specification and availability The 16, 32, and 64 GB storage capacity options for iShield Archive feature Speed Class UHS-I U3 and Video Speed Class V30 for capturing 4K video. The microSD cards are based on 3D-pSLC NAND and designed for use in the industrial temperature range of -40 to +85 °C. The iAT software is available for Windows, macOS, and Linux operating systems and can be downloaded for free from www.swissbit.com. The following sales channels sell iShield Archive: Allnet, Digikey, Distrelec, Farnell, Mouser, and Rutronik 24. Individual inquiries can also be directed at any time to email@example.com
pCloud Celebrates a Decade of Innovation and Security in Online Storage: A Decade of Data Management Excellence
pCloud, the leading platform in online storage and data management, proudly commemorates a decade of reshaping the digital landscape. Since its inception in 2013, pCloud, a European cloud storage service provider created in Switzerland and compliant with Swiss privacy laws and GDPR, has redefined how individuals and businesses manage their data, offering secure, reliable, and user-centric solutions that have garnered the trust of over 19 million users worldwide. A Symphony of Achievements: 1. Global User Reach: With its worldwide presence, pCloud has fostered a global community of 19 million users who rely on its exceptional services for their data storage needs. 2. Innovation and Security: Throughout the past decade, pCloud's innovation has set new industry standards, all while maintaining an unblemished record of data security. pCloud utilizes advanced encryption techniques to safeguard user data. The company also boldly launched the "Hacking Challenge", inviting the world's best hackers to test its security measures, with none succeeding. 3. Championing Data Privacy: Over the years, pCloud's commitment to privacy has stood unwavering, resulting in zero data breaches. Users can trust that their data is safe and remains their own. 4. Launch of pCloud Pass: In 2022, pCloud extended its commitment to security by launching pCloud Pass, a truly secure European password manager. pCloud Pass provides users with a safe and convenient way to manage their passwords, enhancing their online security. 5. More Security Tools: pCloud introduced innovative security tools like a Data Breach Checker, Password Strength Checker, and Strong Password Generator, empowering users to safeguard their digital presence. 6. Unique Offerings: pCloud has been at the forefront of innovation by becoming the first cloud storage to offer Lifetime plans with a unique payment model. Additionally, pCloud introduced a pioneering 10TB storage plan, meeting the evolving needs of its user base. 7. Referral Campaign: To thank its loyal users for a decade of support, pCloud is launching a referral campaign that rewards users with free storage. For each successful referral, users and their friends both receive additional storage space, strengthening the pCloud community. An Exciting Future Ahead: As pCloud embarks on its next decade, the company remains steadfast in its commitment to pushing the boundaries of data management technology. "Tunio Zafer, CEO of pCloud, expressed, "Our journey of the last 10 years has been characterized by innovation, security, and unwavering user trust. We're excited to carry this legacy forward as we continue to redefine data management."
ViewQwest strengthens commitment to Information Security Management standards with ISO 27001:2013 certification
ViewQwest – an award-winning Telecommunications and Managed Security Services Provider, has achieved ISO 27001:2013 certification – a globally recognised security compliance standard outlining best practices for organisations to manage information security risks through the creation of an information security management system (ISMS). Following a rigorous audit and certification process, which is repeated annually, the certification was issued by TÜV AUSTRIA CERT GMBH from Akkreditierung Austria, the Austrian National Accreditation Body – a leading provider of testing, certification, auditing and advisory services. "We are proud to be ISO 27001:2013 certified. By achieving this certification, ViewQwest has demonstrated our ability to identify and manage risks related to data and information security. It underscores our commitment to security best practices and, most importantly, to protect our clients' company and customer data," said Vignesa Moorthy, ViewQwest Group CEO. The certification affirms that ViewQwest has established and implemented, and maintains and continually improves their information security policies, procedures and systems to safeguard non-public (confidential and internal) data such as customer data, financial data and internal communications from external breaches or being leaked to the public, in compliance with ISO 27001 standards. ISO 27001 is the best-known and most globally recognised standard for information security management systems, data protection, cyber resilience, and their requirements. Through the implementation of ISO 27001 standards, organisations take a systematic approach for managing the security of vital assets and sensitive information in a way that minimises risks and ensures confidentiality and integrity. For more information on ViewQwest, please visit https://corporate.viewqwest.com/
Microsoft Cyber Signals: Sporting Events and Venues Draw Cyberthreats at Increasing Rates
Today Microsoft released the fifth edition of Cyber Signals, spotlighting threats to large venues, sporting and entertainment events, based on learnings and telemetry from delivering cybersecurity support to critical infrastructure facilities during the State of Qatar's hosting of the FIFA World Cup 2022™. Cybersecurity threats to large events and venues are diverse and complex. They require constant vigilance and collaboration among stakeholders to prevent and mitigate escalation. With the global sports market valued at more than 600 billion USD, sports teams as well as major league and global sporting associations, and attendees house a trove of valuable information desirable to cybercriminals. Unfortunately, this information is made increasingly vulnerable by the growing number of connected venues and the number of devices and interconnected networks in these environments, sports teams as well as major league and global sporting associations and attendees, house a trove of valuable information desirable to cybercriminals. Venue IT systems and arenas contain hundreds of known and unknown vulnerabilities that allow threats actors to target critical business services such as point of sale, IT infrastructures, and visitor devices. Teams, coaches, and athletes themselves are also vulnerable to data loss on athletic performance, competitive advantage, and personal information. Attendee personal identifiable information can also be targeted through vulnerable event digital amenities, like companion mobile apps, Wi-Fi hotspots, and QR codes with malicious URLs. Microsoft Defender Experts for Hunting (DEX) developed comprehensive cybersecurity defenses for Qatari facilities and organizations supporting the soccer tournament. DEX conducted an initial risk assessment, factoring in threat actor profiles, adversary tactics, techniques, and procedures, and other global intelligence from Microsoft's telemetry. It ultimately analyzed over 634.4 million events while providing cybersecurity defenses for Qatari facilities and organizations throughout November and December of 2022. With sporting and entertainment events at large, there is a level of cyber risk and vulnerability that does not exist in other environments. Because some of these events come together quickly, often with new partners and vendors acquiring access to enterprise networks that are perceived as temporary, they are often not designed for evaluation and ongoing refinement of the security posture. In addition to the pre-planning required to support this unique security apparatus, venues consider the privacy risk associated with temporary, ad-hoc, and permanent cyber infrastructure. That means understanding and acknowledging if configurations needed to support the event potentially add additional risk or vulnerability. To safeguard against cybersecurity threats, sports, associations, teams, and venues must adopt robust protective measures. First and foremost, they should prioritize the implementation of a comprehensive and multi-layered security framework. This includes deploying firewalls, intrusion detection and prevention systems, and strong encryption protocols to fortify the network against unauthorized access and data breaches. Regular security audits and vulnerability assessments should be conducted to identify and address any weaknesses within the network infrastructure. Furthermore, user awareness and training programs are crucial to educate employees and stakeholders about cybersecurity best practices, such as recognizing phishing emails, using multifactor authentication or passwordless protection, and avoiding suspicious links or downloads. Additionally, it is essential to partner with reputable cybersecurity firms to continuously monitor network traffic, detect potential threats in real-time, and respond swiftly to any security incidents. By adopting these proactive measures, sports associations, teams, and venues can significantly enhance their resilience against cyberattacks and protect both their own infrastructure and the sensitive information of their patrons. Learn more in this fifth edition of Cyber Signals. To learn more about Microsoft Security solutions, visit the website. Bookmark the Security blog to keep up with Microsoft's expert coverage on security matters. Also, follow Microsoft on LinkedIn (Microsoft Security) and Twitter (@MSFTSecurity) for the latest news and updates on cybersecurity.
Kaspersky unveils latest APT trends for Q2
In Kaspersky's latest report on Advanced Persistent Threats (APTs) trends for the second quarter of 2023, researchers analyze the development of new and existing campaigns. The report highlights APT activity during this period including the updating of toolsets, the creation of new malware variants, and the adoption of fresh techniques by threat actors. A significant new revelation was the exposure of the long-running "Operation Triangulation" campaign involving the use of a previously unknown iOS malware platform. Experts also observed other interesting developments that they believe everyone should be aware of. Here are key highlights from the report: Asia-Pacific witnesses a new threat actor – Mysterious Elephant Kaspersky uncovered a new threat actor belonging to the Elephants family, operating in the Asia-Pacific region, dubbed "Mysterious Elephant". In their latest campaign, the threat actor employed new backdoor families, capable of executing files and commands on the victim's computer, and receive files or commands from a malicious server for execution on the infected system. While Kaspersky researchers have observed overlaps with Confucius and SideWinder, Mysterious Elephant possesses a distinctive and unique set of TTPs, setting them apart from these other groups. Toolsets upgraded: Lazarus' develops new malware variant, BlueNoroff attacks macOS, and more Threat actors are constantly improving their techniques, with Lazarus upgrading its MATA framework and introducing a new variant of the sophisticated MATA malware family, MATAv5. BlueNoroff, a financial attack-focused subgroup of Lazarus, now employs new delivery methods and programming languages, including the use of Trojanized PDF readers in recent campaigns, the implementation of macOS malware, and the Rust programming language. Additionally, ScarCruft APT group has developed new infection methods, evading Mark-of-the-Web (MOTW) security mechanism. The ever-evolving tactics of these threat actors present new challenges for cybersecurity professionals. Geopolitical influences remain primary drivers of APT activity APT campaigns remain geographically dispersed, with actors concentrating their attacks on regions such as Europe, Latin America, the Middle East and various parts of Asia. Cyber-espionage, with a solid geopolitical backdrop, continues to be a dominant agenda for these endeavors. Adrian Hia, Managing Director for APAC at Kaspersky said "Kaspersky has been monitoring all the active APT actors in the region that infect mobile devices and are slowly targeting businesses and infrastructure. Our researchers focuses on APT activities to uncover the most sophisticated cyber-attacks. By publishing our findings from our investigation, we hope to be able to help organisations be aware of the latest activities and remain secure in our bid to build a safer world." "While some threat actors stick to familiar tactics like social engineering, others have evolved, refreshing their toolsets and expanding their activities. Moreover, new advanced actors, such those conducting the 'Operation Triangulation' campaign, constantly emerge. This actor uses a previously unknown iOS malware platform distributed through zero-click iMessage exploits. Staying vigilant with threat intelligence and the right defense tools is crucial for global companies, so they can protect themselves against both existing and emerging threats. Our quarterly reviews are designed to highlight the most significant developments among APT groups to help defenders combat and mitigate related risks," comments David Emm, principal security researcher at Kaspersky's Global Research and Analysis Team (GReAT). To read the full APT Q2 2023 trends report, please visit Securelist. In order to avoid falling victim to a targeted attack by a known or unknown threat actor, Kaspersky researchers recommend implementing the following measures: Ensuring the security of your system, it is crucial to promptly update your operating system and other third-party software to their latest versions. Maintaining a regular update schedule is essential in order to stay protected from potential vulnerabilities and security risks Upskill your cybersecurity team to tackle the latest targeted threats with Kaspersky online training developed by GReAT experts. Use the latest Threat Intelligence information to stay up-to-date with the actual TTPs used by threat actors. For endpoint level detection, investigation, and timely remediation of incidents, implement EDR solutions such as Kaspersky Endpoint Detection and Response. Dedicated services can help combat high-profile attacks. The Kaspersky Managed Detection and Response service can help identify and stop intrusions in their early stages, before the perpetrators achieve their goals. If you encounter an incident, Kaspersky Incident Response service will help you respond and minimize the consequences, in particular - identify compromised nodes and protect the infrastructure from similar attacks in the future.
Cobalt Iron Introduces Compass Migrator for Automating Data Migration From Legacy Backup Environments
Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced the availability of Compass Migrator™, a new capability of the Cobalt Iron Compass® enterprise SaaS backup platform. Large enterprises are using Compass Migrator to gain control of their backup operations and data, move to the most modern backup technology available, and maintain custody control of their long-term retention data. Compass Migrator enables companies to remove aging backup and storage technologies from their environments, while reducing investment in obsolete skills and giving them greater control over their data. Businesses have struggled for years with trying to manage large amounts of legacy backup data. Some of the biggest challenges are: They don't know how much or what data resides in their legacy backup and storage infrastructures. They don't understand which data might still be valuable and need to be maintained. Undisciplined policy management over years often leads to dozens, or even hundreds, of inconsistent retention policies. Companies often are not even sure they can recover some old backup data, but they keep it "just in case." Businesses want to migrate to the latest data protection and storage technologies but are locked in with current products due to large amounts of legacy data. Companies moving data to new backup or storage products typically must analyze legacy data to try to determine what data should be kept and then perform manual and labor-intensive movement of data, sometimes object by object, with a multistep process of recovering the old data and then backing it up to the new infrastructure. After doing all that, they often must maintain the legacy data and infrastructure anyway to satisfy data custody requirements, leading to higher costs and a need to maintain archaic technology skills. Unlike other backup products, which do little or nothing to assist customers in moving off their legacy platforms, Compass Migrator brings tremendous ease and automation to the inherently complex and challenging problem of data migration. It is extremely flexible in what, when, where, and how data is moved from the legacy environment. Through unprecedented levels of automation, visibility, and data governance control, Compass Migrator: Selectively identifies data to be migrated (e.g., only particular types of data, for certain systems, by date range, active data only, etc.). Allows customers to automatically migrate valuable backup and long-term retention data from legacy backup environments into multiple storage targets (including to new data centers or the cloud) within the modern Compass solution. Optimizes the migration processes (e.g., minimizes tape mounts, dynamically manages a migration staging area, manages throughput, allows massive parallelism for large data amounts, etc.). Rebinds long-term retention data with appropriate retention policies. Provides migration progress indicators, details, and migration validation analysis. Maintains data custody-tracking throughout the entire migration process and beyond. Provides summary and analysis reports of all migration operations as audit evidence. Enables an easy migration path off legacy tape. Supports migration restarts in the event of failed migration jobs or scheduled maintenance activities. "As a user of this remarkable Compass Migrator tool, I am amazed by how it simplifies the management of numerous data migrations from multiple sources and targets," said Graham McGivern, deployment coordinator at Cobalt Iron. "With real-time status updates and progress-tracking, it has transformed the way complex data migration processes are handled, providing unparalleled ease and efficiency. It's truly a game-changer."
Swissbit and lern.link secure Moodle with FIDO2 authentication
Storage and security specialist Swissbit and lern.link GmbH, one of the DACH region's top integration consultants for the Moodle learning management system, are enhancing security for online learning platforms. The integration of the FIDO2 standard, which allows users to securely log in to the Moodle platform using multi-factor authentication (MFA), is an important initial step in the partnership. The already established Moodle plug-in for "multi-factor authentication" has been extended to integrate FIDO2/WebAuthn on the initiative of both companies and with the help of Swissbit. It is available for download at moodle.org/plugins Certified Moodle service providers, such as lern.link, can now provide phishing-resistant authentication via hardware security key or FIDO stick to users such as universities, schools, and businesses. Customers will be able to purchase the secure authentication method directly during implementation in the future through lern.link's subscription model in a bundle with Swissbit's iShield Key Pro security key. Full details will be announced by the companies at the MoodleMoot Global conference in September 2023. Learning platforms have grown in popularity not only since the pandemic. Their ability to make educational content more accessible and the learning process more flexible is now being adopted by a growing number of educational institutions throughout the world. Moodle, a platform-independent open-source learning management system (LMS) with a global presence and active development community, is one of the most popular solutions on the market. Moodle implementation and rollout are handled by certified partners such as lern.link GmbH, which has a long list of corporate and educational clients. Cybersecurity is critical to lern.link as a full-service provider. Access to online platforms typically starts with a login process. For this reason, the company turned to Swissbit to collaborate on making the established FIDO2 standard available as an additional MFA option for Moodle. FIDO2 is based on asymmetric cryptosystems and relies on hardware security keys for authentication. lern.link and Swissbit committed to implementing the standard into the existing plug-in for "multi-factor authentication" and financially backed the request for FIDO2 integration as a login choice in Moodle. The functionality was tested and confirmed with Swissbit's iShield Key Pro during implementation. In the spirit of platform openness, the plug-in is listed in the Moodle Plugins Directory and can be used by all Moodle system integrators and developers. Moodle with Swissbit’s iShield Key Pro in a bundle Both lern.link and Swissbit are working on a subscription model now that the technical prerequisites for using FIDO2 on Moodle have been created. In future, customers of lern.link will be able to order the required hardware security key, the Swissbit iShield Key Pro, when ordering a Moodle implementation. Details will be made available in the lead-up to MoodleMoot Global. The annual Moodle Community conference will take place in Barcelona from September 18 to 21, 2023.
Tivù Srl Extends Service Lineup to Bring Customers NAGRA Secured DAZN Sports Content
NAGRA, a Kudelski Group (SIX:KUD.S) company and the world's leading independent provider of content protection and multiscreen television solutions, today announced that Tivù Srl, the company which provides tivùsat, the Italian free-to-air satellite platform, has extended its technology partnership with NAGRA to include cardless security solutions. The move enables Tivù to extend its premium sports lineup with DAZN sports content, and gives DAZN the opportunity to expand its service footprint across the tivùsat satellite platform. Available to Tivù Srl end-users with a set-top box or conditional access module (CAM), DAZN subscribers simply activate the service to watch a wide range of premium sport content delivered with a high quality of service. Commenting on the extended NAGRA relationship, Alberto Sigismondi, President of Tivù Srl said: “We’re excited to bring our end-users all of the action on the “Zona DAZN” channel from the start of the new football season. Our long-term relationship with NAGRA means we’re able to bring this content to our end-users safe in the knowledge that it is secured by best-of-breed NAGRA cardless technology.” The new cardless solution, designed to secure premium content investments, will now supplement existing NAGRA smartcard solutions deployed at tivùsat. “Helping our customers to provide the widest possible content choice to their viewers is core to our ambition.” said Nancy Goldberg, Executive Vice President and Chief Marketing and Sales Officer at NAGRA. “We are proud to extend our security solution across the tivùsat platform to additionally protect DAZN premium sports content. The adoption of this disribution approach by an OTT operator, whose content will be distributed via satellite, further demonstrates the flexibility of NAGRA solutions to support the needs of today’s media and entertainment market.” NAGRA cardless technology, a core part of the company’s broadcast security portfolio, is used by media and entertainment operators worldwide to secure premium content delivered to proprietary and Android set-top boxes. It also adheres to strict MovieLabs requirements for enhanced content protection of 4K/HDR content. With the largest certified SOC (security-on-chip) and set-top box partner network, NAGRA provides commercially viable, secure solutions for operators of all sizes. For more information visit https://dtv.nagra.com/broadcast-security