CISO Platform's Posts (224)

Sort by

Top 5 Emerging Vendors providing DNS Security

  • Before talking about the top 5 vendors providing DNS Security (Domain Name System Security), let us first fully understand what DNS Security does and if security is not implemented how can it be harmful.

 

What is DNS (Domain Name System)?

  • DNS (Domain Name System) is the most important part of Internet. When entering any website’s address (e.g. www.cisoplatform.com- easy to remember), the address is converted into machine readable numbers i.e. IP Address (e.g. 64.383.372.190 – not easy to remember). Thus, DNS converts the human-readable address into machine-readable IP Address. ICANN manages the DNS Root Servers.

 

What can an attacker do?

  • Hackers found some weakness in DNS which can allow attackers to create a fake DNS records. These fake records can trick users to visit fake websites, downloading malicious files and software’s. Attacker can gain the control and redirect the domain name to another or fake domain.

 

Types of Attack:

 

Impact:

  • Brand Damage: Imagine the mess that will happen in the company when your employees and/or customers are not able to access your website due to an attack.
  • Imagine if online banking system was corrupted.
  • Financial Loss: Imagine if your company’s payment site is redirecting to fake site and payment is made in that site.

 

Solution:

  • Implement DNS Security.

 

Below are the Top 5 Vendors providing DNS Security: –

 

Infoblox:

  • Infoblox security products enable you to mitigate security challenges that arise from DNS-based threats. Their DNS solutions combine automation, centralized reporting and policy management, enhanced visibility, and unique actionable intelligence drawn from the data residing in the core of your network.
  • Product: DNS Traffic Control, DNS Firewall, Advance DNS Protection

 

 

Nominum:

  • Nominum provides DNS-based security and services innovation. The Silicon Valley company provides an integrated suite of carrier-grade DNS-based solutions that enable fixed and mobile operators to protect and enhance their networks, strengthen security for business and residential subscribers and offer innovative value-added services that can be monetized. Nominum deliver a safe, customizable internet and promote greater value to over half a billion users.

EfficientIP:

  • EfficientIP solutions offer a specialized layer of in-depth-defense to fill the gaps left by traditional security systems. Their 360° DNS Security provides a holistic approach to protect public and private DNS infrastructures from both internal and external DNS threats, regardless of the attack type. The 360° DNS Security solution is comprised of five products, which work together (or as standalone offerings) for a more reliable and secure network.
  • Product: DNS Blast, DNS Guardian, DNS Cloud

 

BlueCat DNS:

  • BlueCat DNS ensures your critical network infrastructure and business-critical core services are reliable, resilient and highly available and that no configuration change can cause an outage or leave stale or inconsistent DNS records. It delivers scalable, resilient and highly available DNS services across the enterprise, with the flexibility to deploy in high-throughput, centralized architectures, or fully distributed environments with thousands of service delivery points.
  • Product: BlueCat DNS Integrity, BlueCat DNS Edge

 

 

Cisco:

  • Cisco Umbrella provides the first line of defense against threats on the internet. As Umbrella is delivered from the cloud, it is the easiest way to protect all of your users in minutes. Cisco Umbrella uses the internet’s infrastructure to block malicious destinations before a connection is ever established. By delivering security from the cloud, not only do you save money, but we also provide more effective security.
  • Product: Cisco Umbrella
Read more…
  • Here is the list of top 5 emerging vendors of MDR Solutions (Managed Detection and Response). But before that let us understand what is the difference between MDR and MSS (Managed Security Services).

 

MDR vs MSS

  • MDR is different from MSS. Managed Security Service Providers (MSSPs) monitor network security controls and may send alerts when anomalies are identified.  MSSPs typically do not investigate the anomalies to eliminate false positives, nor do they respond to real threats.  This means that abnormalities in network usage are forwarded to your IT personnel who must then dig through the data to determine if there is a real threat and what to do about it.

 

So, lets have a look at the top 5 emerging vendors of MDR Solutions:

 

Red Canary

  • Red Canary was founded in 2013 to make customers’ security better. The Managed Detection and Response solution combines industry-defining technology, process, and expertise to accurately detect threats that bypass other security tools. Headquartered in Denver, Red Canary empowers organizations to stop attacks before they result in breaches. Red Canary was built to bring Fortune 100 detection and response to every organization.
  • Service: Red Canary

 

FireEye

  • FireEye as a Service is a managed detection, investigation and response service that provides battle-savvy security experts, equipped with timely, relevant threat intelligence to detect, investigate and remediate threats early in the attacker lifecycle. FireEye as a Service leverages your existing investments in both FireEye and third party technology to provide real-time visibility across the enterprise, including your most remote locations.

 Paladion

  • Paladion’s CyberActive℠ MDR can augment your current security operations or provide active threat defense with 24/7 monitoring, remote incident investigation, and response from our Cyber Operation Centers or SOCs. At Paladion, our cyber defense services can help your organization achieve robust cyber resilience by delivering the services necessary to protect your critical data from the latest cybersecurity threats.
  • Service: CyberActive℠ MDR

 

Trustwave

  • Trustwave’s MDR for Endpoints service continuously records endpoint activity and then centralizes that information in our secure cloud for detailed analysis. The result is complete endpoint visibility as the information is available in real-time continuously to our threat hunters. You have detailed insight into the current state of your endpoint security status as well as the details of what caused a specific alert so that a prescriptive response can be executed on your behalf.
  • Service: Trustwave MDR for Endpoints

 

Raytheon Foreground Security

  • Raytheon Foreground Security’s patented automated threat detection and analytics technology enables us to effectively engage and combat advanced threats as they emerge. Taking an end-to-end, collaborative approach, to optimize threat intelligence for your unique industry and enterprise security requirements.
  • Service: Raytheon MDR Service

 

 

Read more…
  • Vulnerability Management Solutions helps to prioritize and remediate vulnerabilities by consolidating data from multiple vulnerability scanning tools (Network VA, DAST etc.). It correlate and help to prioritize the risk (some do this by integrations with Threat Feeds, Asset Priority / tagging etc.) posed by the vulnerabilities to prioritize remediation efforts. They may NOT have native scanning capabilities and rely on scan data from third party tools. This platform Recommended for organisations using multiple scanning tools who want to streamline their vulnerability Management process.

 

Kenna Security

  • Kenna Security’s approach to threat and vulnerability management integrates the results of vulnerability scan data from Qualys, Nessus, Rapid 7, and dozens more with the results from 8 different threat feeds. The result? You know what vulnerabilities need to be prioritized in order to improve your company’s security posture. Then you can report on your team’s activity, showing the impact of your remediation. No one will doubt your work—or effectiveness.
  • To know more visit: Kenna Security Product page

 

Core Security

  • Core Security Vulnerability Insight (formerly Core Insight) unifies, regulates, and prioritizes vulnerability management initiatives enterprise-wide. Consolidating multiple vulnerability scans across vendors, while matching known exploits and simulating attacks, enables you to focus on the most vulnerable points of your network. With greater scalability and advanced attack path analytics, Core Insight helps you to accurately identify the vulnerabilities that pose the greatest threat to critical business assets, regardless of the size and complexity of your IT landscape. Once critical vulnerabilities are prioritized, you can move quickly to remediate the threat in your systems.

 

Skybox Security

  • Skybox™ Vulnerability Control supports a systematic, focused approach to vulnerability management to deliver intelligent risk reduction unlike any other vendor. With total attack surface visibility and continuous threat intelligence, Vulnerability Control analyzes risk in the context of your vulnerabilities, your network and exploits in the wild.
  • To know more visit: Skybox Vulnerability Control Product Page

 

Tenable

  • Tennable Family manages and analyzes vulnerability data across the organization, prioritizes security risks and provides automated frameworks and compliance reporting. With continuous monitoring, security teams can measure and visualize the effectiveness of the security program using SecurityCenter’s pre-built, highly customizable dashboards and reports and the industry’s only Assurance Report Cards. It also is the first Cyber Exposure platform to provide visibility into any asset on any computing platform. It enables security teams and executives to manage vulnerabilities and risks across the entire attack surface with confidence. Built on the leading Nessus technology from Tenable.
  • To Know more visit: Tenable (Tennable.io, Security Center Continuous view) Product Page

 

Denim Group

  • Denim’s ThreadFix is the industry leading vulnerability resolution platform that provides a window into the state of application security programs for organizations that build software. ThreadFix works for only applications and correlate vulnerabilities.
  • To know more visit: Denim Group Threadfix Product Page
Read more…

Top 5 Threat Hunting tools for Q1 2017

Here is the list of top 5 vendors emerging Threat Hunting tools, but before that let us understand what threat hunting exactly refers to.

Threat Hunting?

  • Threat hunting is a proactive approach to identifying adversaries rather than reactively waiting for an alert to go off. This is an iterative process, meaning that it has to be continuously carried out in a loop, beginning with a hypothesis. It involves a security analyst who keeps an eye throughout threat intelligence and other data and, using their knowledge, building a hypothesis about potential threats to the resources of the company they’re protecting. It is possible to partly automate some of this using machine learning, and along with user and entity behavior analytics to highlight potential risks. And with this new market, organisations are attempting to maximise the buzz around threat hunting, positioning their own products as able to operate in this latter space.

 

So, lets have a look at the top 5 Threat Hunting tools for Q1 2017:

 

Sqrrl

 

  • Sqrrl is the threat hunting company that enables organizations to target, hunt, and disrupt advanced cyber threats. Sqrrl’s industry-leading Threat Hunting Platform unites link analysis, User and Entity Behavior Analytics (UEBA), and multi-petabyte scalability capabilities into an integrated solution. Sqrrl reduces attacker dwell time by detecting adversarial behavior faster and with fewer resources through the use of machine learning, and enables effective threat hunting. As an incident response tool, it enables analysts to investigate the scope, impact, and root cause of an incident more efficiently and thoroughly than ever before.
  • Product : Sqrrl Enterprise

 

Vectra

 

 

  • Vectra Cognito™ is the fastest, most efficient way to find and stop attackers in your network. It uses artificial intelligence to deliver real-time attack visibility and put attack details at your fingertips to empower immediate action. Vectra Cognito unburdens and empowers security operations teams that are often understaffed and under siege. This is achieved by automating the time-consuming analysis of security events and eliminating the need to endlessly hunt for hidden threats. Vectra Cognito automates the hunt for cyber attackers, shows where they’re hiding and tells you what they’re doing. The highest-risk threats are instantly triaged, correlated to hosts and prioritized so security teams can respond faster to stop in-progress attacks and avert data loss.
  • Product : Vectra Cognito™

 

Infocyte

 

  • Infocyte is a developer of proactive cyber security solutions designed to identify threats and unauthorized activity on enterprise networks. Through their technology, Infocyte is pioneering the first objective breach discovery assessment that is both fast and affordable enough to perform regularly. Infocyte HUNT provides an easy-to-use, yet powerful solution to limit risk and eliminate dwell time by enabling an organization’s own IT and security professionals to proactively discover malware and persistent threats, active or dormant, that have successfully breached existing defenses and established a beachhead on one or more endpoint devices.

Exabeam

  • Exabeam Threat Hunter is an advanced querying tool that uses Stateful Session data models to complement user behavior analytics. It enables security analysts to search and pivot across multiple dimensions of user activity to find sessions that contain specific unusual behaviors or find users that match certain criteria. For example, an analyst might ask to see “all sessions where a user logged into the VPN from a foreign country for the first time, then accessed a new server for the first time, after which FireEye created a malware alert.” This level of analysis across disjoint activities and systems is simple with Exabeam. Now analysts can ask new questions. With Threat Hunter, machine learning provides intelligent answers, in addition to alerts.
  • Product : Exabeam Threat Hunter

 

Endgame Inc.

 

  • Endgame Inc. is a leading endpoint security platform that transforms security operations teams and incident responders from crime scene investigators into hunters that prevent damage and loss, and dramatically reduces the time and cost associated with incident response and compromise assessment. Endgame’s platform uses machine learning and data science to prevent and detect unique attacks at the earliest and every stage of the attack lifecycle. Endgame’s integrated response stops attacks without disrupting normal business operations.
  • Product : Endgame

 

DNIF

 

  • DNIF, a product of NETMONASTERY offers solutions to the world’s most challenging cybersecurity problems. Recognized by Gartner and used by some of the well-known global companies like PwC, Vodafone and Tata, this next generation analytics platform combines Security and Big Data Analytics to provide real-time threat detection and analytics to the most critical data assets on the Internet.
  • With over a decade of experience in threat detection systems, DNIF has one of the fastest query response times and bridges the gap between searching, processing, analyzing and visualizing data thereby enabling companies with better SOC (Security Operations Center) management.
  • Product: DNIF
Read more…

FireCompass Top Security startup

  • FireCompass, an AI based platform which helps you to discover & compare Cybersecurity products has just announced the names of Top CyberSecurity Startups 2017 (India). 
  • With the growing cyber attacks, the role of innovations in the cyber-security startups ecosystem has become more crucial than ever. “FireCompass Top Startup” recognition is part of the vision to help promote innovations in the domain of Cybersecurity as well as helping end user organizations to keep track of emerging technologies and vendors.

  • FireCompass Top Startups were selected through a stringent process based on real end user feedback. The jury consisted of Top Industry CISOs and industry innovators. The startups presented face to face to the jury and based on presentations of their innovations the Final 3 were selected. Here are the FireCompass Top 3 CyberSecurity startups for year 2017 (in no particular order):

  • Smokescreen: Smokescreen has an innovative product called Illusion Black in niche market called “Deception”. It maximizes attack detection through the kill-chain, even against stealthy, targeted campaigns that don’t involve malware.  features rapid out-of-band deployment, no performance impact, enterprise scalability, and minimal false positives, leading to faster breach detection and improved security and incident response team productivity. From targeted threat intelligence of an impending attack, to detecting lateral movement in every single subnet, Smokescreen’s deception technology helps turn the tables on apex attackers. To know more about Smokescreen: Click Here
  • DNIFIt is an “Open” Big Data Analytics Platform that can ingest, parse, enrich large volumes of data each day and bounce back with actions using complex rules, profilers and machine learning models. Get started with easy 3 step deployments — on-prem, on cloud or just go virtual. It is an “Open” Big Data Analytics Platform that can ingest, parse, enrich large volumes of data each day and bounce back with actions using complex rules, profilers and machine learning models. Get started with easy 3 step deployments — on-prem, on cloud or just go virtual. To know more about DNIF: Click Here

 

  • Shieldsquare: ShieldSquare’s real-time bot mitigation enables online businesses to prevent content & price scraping, account takeovers, shopping cart abuse, carding, application DDoS attacks and skewed analytics. With its adaptive bot detection engine, it empowers its customers to always stay ahead of ever evolving bot attacks. To know more about Shiedsquare: Click Here

You can also refer to our study to know Top 50 Emerging Vendors of 2017: Click Here

Read more…

Security Maturity Score By Industry :

 

 

 

Identification Capabilities By Industry :

 

 

Prevention Capabilities By Industry :

 

 

 

Detection Capabilities By Industry :

 

 

Response Capabilities By Industry :

 

 

 

Key Findings :

  • Large Indian Banks and Telcos are the most mature with average score
    of ~60% with Small Banks and Insurance are lagging far behind at ~45%
  • Internal Technology Controls are primarily around prevention, with not
    sufficient measure implemented around detection & response
  • Indian organizations are primarily compliance driven & reactive, with average
    security scores hovering around ~50/ 100
  • Response Capabilities across sectors is very poor, ranging between 25 to 40%
  • Preliminary data on startup shows that the security maturity is abysmally low at
    around 8

 

 

Reference –

Data Set:

25+ Technology Controls related data for 200+ Organizations, across industries. Collected via online
surveys. Respondents were primarily CISOs or Equivalent titles.

 

 

 

Read more…

8669807062?profile=original

It is very important to properly define the right Information Security Metrics for an organization to estimate the security structure and to communicate it efficiently to the Board level executives.There is a growing interest from the Board and the CEO to understand the information security posture of the company. Many of the CISOs I know have been asked by the Board or the CEO to present. I also notice a huge disconnect between the security professionals in terms of what they think the Board want and the reality. From my experience of being a security professional as well as being a Board member (I need to manage my investors), I am attempting to structure my experience.

 

Key Considerations while presenting to the Board

  • Less is more. Board doesn’t want the technical details.We might want to fill up the presentation with a lot of information security metrics and data but the board wants the most critical ones which they can understand and relate to. E.g. They might not be interested in knowing about patching status or the number of incidents that you handled.
  • Board speaks a different languageUnderstanding the language of the board is very important. Use technical jargon as sparingly as possible. Change your language and examples to something that the non security audience can easily relate to. One way to handle this is to link your information security metrics to the most important business critical systemsFor Example: Instead of providing only information security metrics link the story to what matters to the board. If collection of revenue is central to your sustainability then the “Billing system” gets attention.
  • Board is worried about how good the security is….minus the technicalitiesThat’s a hard problem to answer. Security cannot be measured on absolute terms. However you got to explain it in simple way. Define your information security metrics to demonstrate your organization’s security. You also need to assure how ready you are in terms of handling any critical incident
  • Be cautious: Verify your assumptionsA lot of times we assume that the board might be interested in certain things, this may not be true for critical information security metrics. Most of the time people guess it wrong. It is a good idea to assume but definitely verify and take feedback

  

List of To-Do before the Board Meeting

  • Understand what the Board wants helps you define required information security metrics
  • Understand the level of understanding of each individual in the board
  • Align your security strategy & information security metrics to the Business Goals
  • Use Real Life examples and stories which is contextually similar to your business
  • Represent numbers or other complex stuff graphically which gives an idea of trend
  • Be prepared with the synopsis of the key security projects running and the most vital ones needing approval
  • Be prepared with security strategy in simple numbers eg. If scenario 1 happens, Loss=$5million
  • References to stats and competing organizations is helpful

 

Recommended Board Level Information Security Metrics / Dashboard (Less is more)

  • State of Security in comparison with competition

The management is generally uses competitive matrix in business planning exercise. Providing them a clear picture of how your security is in comparison to the peers would be the language which the board/CEO is more comfortable with.

  • Open business critical risks

Letting the management know which are the critical risks which could directly impact the business is extremely critical not just for them but also for you. A word of caution: This should not be the long list of technical details but high level understanding of only those things which are business critical.

  • No. of critical incidents reported to media/regulatory agency

Please do not deluge the CEO/Board with all the incidents that you have detected. This could create a first time impact but for the long run what matters is the incident that had to be reported to the regulatory agency or the media. This number should ideally be zero.

  • Loss/Downtime due security incidents

How much did the business lose due to security incidents? Was there any downtime? These are the business metrics that the Board/CEO really cares about.

  • Compliance status

If compliance is critical for your business then it is important to report the status. Are there any critical risks or exposures due to non compliance? If so to what extent?

  • Budget 

It is important to provide a high level idea of the money you spent, what did you deliver and how much more money you need and why? It should be simple in non technical language.

  • Key security initiative performance status

There could be some key security initiatives that you might want the management to know. It should not be all the projects you are running but the biggest and the most important ones that the business cares about. You should report the status like – if you are on time and budget? any key risks ?etc.

 

Read more…
  • We are here, once again, with our list of Top 20 Emerging IT Security Vendors from 500+ vendors attending RSAC 2018, April 16 to 20 in San Francisco.
  • BTW, We have also created a RSAC 1-Minute Itinerary tool for the ease of attendees, through which you can now navigate the maze of 500+ Vendors at RSAC Expo like a pro.  

Emerging IT Security Vendors:

Here is the list of Top 20 Emerging IT Security vendors to watch out for:


FireCompass Emerging IT Security Vendors 2018

  • Barkly provides organizations with the best defense against today’s evolving threat landscape. Barkly protects against exploits, file-based, and fileless attacks through its patented, multi-layered protection which combines behavioral analysis, CPU-level monitoring and Responsive Machine Learning™. Barkly is simple to deploy and manage through it’s cloud-based SaaS platform and has a unique approach to organization models which result in low false positives for customers.

 

FireCompass Emerging IT Security Vendors 2018

  • BlueTalon is a leading provider of Unified Data Access Control for big data and new data initiatives. The BlueTalon Policy Engine delivers precise, consistent, and dynamic user access controls to data across Hadoop, Spark, Cassandra, and traditional RDBMS. The BlueTalon Audit Engine provides a complete audit trail at the level of detail required for regulatory compliance and effective data security. Leading Fortune 100 companies rely on BlueTalon to eliminate security blind spots and gain visibility and control at the data layer, and BlueTalon has built strong partnerships with Dell EMC and Teradata to serve its customer base. BlueTalon is featured by Gartner in its Market Guide to Data-Centric Audit and Protection.

 

FireCompass Emerging IT Security Vendors 2018

  • Bricata network security solutions deliver innovative next generation intrusion prevention, advanced threat detection and analysis, and threat hunting to enable large organizations to actively pursue and identify advanced, persistent, and coordinated attacks. A specialized component-based approach to today’s attacks has left organizations with a stack of tools to manage that provide a patchwork of uncorrelated data, leaving penetrable gaps and inconsistent security policies. The Bricata platform provides organizations with process automation, streamlining operations with the most effective, affordable solution for situational awareness and proactive threat defense, reducing complexity, dwell time and time to containment.

 

FireCompass Emerging IT Security Vendors 2018

  • CounterCraft provides a Distributed Deception Platform that allows customers to plan, deploy and manage automated counterintelligence campaigns. It runs across the breadth of their digital assets to discover targeted attacks with a real-time active response and zero false positives, due to its digital breadcrumbs. The solution plants decoys through a wide variety of technical and non-technical assets, such as false servers and fake data, to lure adversaries into thinking they are penetrating companies’ networks. With this innovative cybersecurity approach, CounterCraft can get information on attackers’ and their objectives while misdirecting them. It is a GCHQ Cyber Accelerator alumnus and is supported by the Spanish Ministry of Economy, Industry and Competitiveness, National Cybersecurity Institute (INCIBE), and the European Commission through its H2020 SME Instrument.

 

FireCompass Emerging IT Security Vendors 2018

  • Deep Instinct is the first company to apply deep learning to cybersecurity. Deep learning is inspired by the brain’s ability to learn. Once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct’s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. As a result, zero-day and APT attacks are detected and prevented in real-time with unmatched accuracy. Deep Instinct brings a completely new approach to cybersecurity that is proactive and predictive. Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices. 

FireCompass Emerging IT Security Vendors 2018 

  • JASK is headed by industry leaders from ArcSight, Carbon Black, Cylance and the counter-intelligence community, bringing together decades of experience solving real-world SOC issues. Founded to address the technology gaps that restrict security modernization efforts, JASK is revolutionizing security operations to reduce organizational risk and improve efficiency through technology consolidation, enhanced AI and machine learning. JASK is backed by Dell Technologies Capital, TenEleven Ventures, Battery Ventures and Vertical Venture Partners and is headquartered in San Francisco, California and Austin, Texas. 

FireCompass Emerging IT Security Vendors 2018

  • Lacework brings automation, speed and scale to cloud security so that your security and DevOps teams can keep data and applications safe in today’s highly dynamic cloud environments. From the initial assessment of your cloud configuration for compliance, to the on-going monitoring of cloud activities for anomalies and breaches, Lacework has you covered. Our technology, Polygraph®, automatically monitors activities and behaviors of all entities deployed: applications, VMs/workloads, containers, processes, machines, users, and accounts. 

FireCompass Emerging IT Security Vendors 2018

  • Menlo Security‘s patented Isolation Platform protects organizations from cyber attack by eliminating the threat of malware. The Platform isolates and executes all Web content in the cloud, enabling users to safely interact with websites, links and documents online without compromising security. Menlo Security is trusted by some of the world’s largest enterprises, including Fortune 500 companies and financial services institutions. The company is headquartered in Menlo Park, California.

  • NeuVector is the leader in Kubernetes security and delivers the first and only multi-vector container firewall. NeuVector enables the confident deployment of enterprise-wide container strategies, across multi-cloud and on-prem environments. NeuVector delivers east-west container traffic visibility, container protection, and host security in a highly integrated, automated security solution. NeuVector customers include global leaders in financial services, healthcare and publishing, and NeuVector partners with AWS, Docker, IBM, Rancher, Red Hat, others. Founded by industry veterans from Fortinet, VMware, and Trend Micro, NeuVector has developed patent-pending behavioral learning for container security.

  • Prevoty provides a new RASP (runtime application self-protection) capability, enabling applications to protect themselves. Unlike traditional security approaches that try to defend against hackers at the network layer, Prevoty works inside the application itself and the analysis engine is smart enough to actively prevent anything malicious from executing. Prevoty is one of the most exciting new companies in the hot security market since, in addition to providing active protection and real-time threat intelligence, the technology can dramatically reduce the time and costs associated with implementation of a secure SDLC.

 

red-canary.png

  • Red Canary was founded to make customers’ security better. Our Managed Detection and Response solution detects threats that bypass other security tools. We inspect every piece of activity from an organization’s systems and never burden customers with false positives. Instead, customers receive human-vetted detections that give them the intelligence and tooling they need. Red Canary empowers organizations to stop attacks before they result in breaches. For the first time, every organization now has access to the security capabilities that can defend against today’s advanced threats.

 

  • RiskRecon provides a SaaS platform that helps organizations more effectively manage the risk reality of increasingly interconnected IT ecosystems by delivering frequent, comprehensive and actionable security performance measurements. Using proprietary data gathering techniques, RiskRecon creates a 360-degree risk profile of an enterprise’s public IT footprint. Based on that footprint and a detailed analysis, a RiskRecon rating and report is generated providing detailed, actionable information with context. No additional analysis is required. Clients rely on RiskRecon to bring greater transparency, accountability and productivity to their vulnerability and third-party risk management processes.

 

  • SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity. SentinelOne unifies prevention, detection, response, remediation and forensics in a single platform powered by artificial intelligence. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated integrated response and to adapt their defenses against the most advanced cyberattack. The company is recognized by Gartner as a Visionary for Endpoint Protection and has enterprise customers in North America, Europe, and Japan.

 

  • Signal Sciences Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform. Built by practitioners, for practitioners, it is the only solution that works seamlessly across any cloud and infrastructure. Signal Sciences customers include Under Armour, Etsy, Yelp/Eat 24, Datadog, WeWork and more.

 

  • Sixgill is a cyber threat intelligence company that covertly and automatically analyzes Dark Web activity detecting and preventing cyber-attacks and sensitive data leaks before they occur. Utilizing advanced algorithms, Sixgill’s cyber intelligence platform provides organizations with continuous monitoring, prioritized real time alerts and actionable intelligence. Through advanced data mining and social profiling, Sixgill examines threat actors and their patterns of behavior, identifying and predicting cyber crime and terrorist activity. Automatic monitoring of closed, open and hybrid dark-nets allows for accurate real-time targeted Dark Web intelligence.

 

  • StackRox helps enterprises secure their cloud-native applications at scale. StackRox is the industry’s first detection and response platform that defends containers and microservices from new threats. StackRox enables security teams to visualize the container attack surface, expose malicious activity, and stop attacker activity. It combines a new security architecture, machine learning, and protective actions to disrupt attacks in real time and limit their impact. StackRox is the choice of Global 2000 enterprises and backed by Sequoia Capital.

  • ThreatBook is China’s first security threat intelligence company, dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks. The ThreatBook team has in-depth understanding of China’s distinct cyber security landscape as well as an international perspective of the global cyber security space. ThreatBook offers a variety of SaaS-based threat intelligence products and services world widely, helps partners and customers to improve their existing detection and defense capabilities at different stage of threat attack, and enables industry customers to deal with complex, continually changing threats in a fast, accurate and cost-effective manner.

 

  • ThreatQuotient™ understands that the foundation of intelligence-driven security is people. The company’s open and extensible threat intelligence platform, ThreatQ, empowers security teams with the context, customization and prioritization needed to make better decisions, accelerate detection and response and advance team collaboration. Leading global companies use ThreatQ as the cornerstone of their threat operations and management system, increasing security effectiveness and efficiency.

 

  • ZeroFOX, the innovator of social media & digital security, protects modern organizations from dynamic security, brand and physical risks across social, mobile, web and collaboration platforms. Using targeted data collection and artificial intelligence-based analysis, ZeroFOX protects modern organizations from targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. Recognized as a Leader in Digital Risk Monitoring by Forrester, the patented ZeroFOX SaaS platform processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, HipChat, Instagram, Reddit, Pastebin, Tumblr, YouTube, VK, mobile app stores, the deep & dark web, domains and more.

  • Zimperium is the industry leader in Mobile Threat Defense with the world’s largest deployment of mobile device sensors. Only Zimperium offers real-time, on-device protection against both known and unknown threats, enabling detection and remediation of attacks on all three levels – the device, the network and the application. Zimperium’s patented z9™ machine-learning detection engine uses artificial intelligence to power zIPS™, the world’s first mobile on-device Intrusion Prevention System app, and zIAP™, an embedded, In-App Protection SDK that delivers self-protecting iOS and Android apps as well as comprehensive app risk analysis with z3A™. Headquartered in San Francisco, Zimperium is backed by major investors including Samsung, Telstra, Sierra Ventures and Warburg Pincus.

 

  • DNIF, a product of NETMONASTERY offers solutions to the world’s most challenging cybersecurity problems. Recognized by Gartner and used by some of the well-known global companies like PwC, Vodafone and Tata, this next generation analytics platform combines Security and Big Data Analytics to provide real-time threat detection and analytics to the most critical data assets on the Internet.

With over a decade of experience in threat detection systems, DNIF has one of the fastest query response times and bridges the gap between searching, processing, analyzing and visualizing data thereby enabling companies with better SOC (Security Operations Center) management.

Read more…

FireCompass wins NASSCOM Emerge 50, 2017 Award

We are happy to share that FireCompass has been selected as a winner of NASSCOM’s 2017 Emerge 50 award. At FireCompass our vision is to transform the way enterprises make security strategy and buying decisions.

 

NASSCOM Emerge 50 2017 Awards as described in their website is a marathon search for India’s Most Innovative Top 50 Emerging Software Product Companies …a mixture of burgeoning success stories and promising start-ups that are coming up with exciting new solutions. These are the startups and emerging companies to watch out for!.. In selecting the winners NASSCOM jury members considered both quantitative and qualitative criteria such as technology innovation, strategy, financial performance, management talent and market penetration. (To know more about Nasscom Emerge 50 Awards, click here)

 

At FireCompass we are working on various cool technologies to help organizations make better security decisions. Using our discovery and comparison tool you can now shorten your vendor assessment cycle by months. You can use our security maturity assessment tool to understand the gaps in your security posture. We are working on several other cool features. Stay tuned !

Read more…

India Security Buying Priority Report 2018

CISO Platform in association with FireCompass launches India Security Buying Priority Report (2018). This is the annual survey in which 395+ Companies have participated in the enterprise segment, varying over different verticals and regions. The key findings of the report includes-

  • Implementation Status of some of the important technologies like Deception, Enterprise Mobility Management (EMM), Network Advanced Threat Protection (ATP) etc. 
  • Vertical Wise Implementation Status for IT Security Technologies. Report contains analysis of all major industries like BFSI, Manufacturing, IT/ITes, Public etc. 
  • Emerging Technologies for Year 2018 like Cloud Access Security Broker, Behavioral Analytics, Threat Intelligence etc.

 

Read more…

RSA Innovation Sandbox Contest for the past 12 years has been awarding most innovative information security companies and products.  Let’s have a look at those companies who emerged as innovative cyber security startups at RSA Conference 2018.

BTW, We have also created a RSAC 1-Minute Itinerary tool for the ease of attendees, through which you can now navigate the maze of 500+ Vendors at RSAC Expo like a pro

Top Cyber Security Companies at RSA Innovative Sandbox Contest 2018

 

 

Awarded as “RSAC Most Innovative Startup 2018” 

Total Funding Amount: $16,100,000

BigID is transforming enterprise protection and privacy of personal data. Organizations are facing record breaches of personal information and proliferating global privacy regulations with fines reaching 4% of annual revenue. Today enterprises lack dedicated purpose-built technology to help them track and govern their customer data for regulations like GDPR. By bringing data science to data privacy, BigID aims to give enterprises the software to safeguard and steward the most important asset organizations manage: their customer data.  

 

Runner up at RSA Innovation Sandbox 2018

Total Funding Amount: $8,000,000

Fortanix is building a new category Runtime Encryption using Intel SGX. Just like encryption today protects data at rest and data during motion, Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats including malicious insiders, cloud providers, OS-level hacks and network intruders. Customer gets deterministic security, unlike existing leaky security, which means their applications and data remain completely protected regardless of how the attacks originate and how root credentials are compromised. Keep your most valuable applications and data protected even when infrastructure has been compromised, even when adversary has physical access and root passwords!

 

Total Funding Amount: $33,100,000

Acalvio is an innovator in delivering Advanced Defense solutions using a combination of Distributed Deception and Data Science technologies. Led by a seasoned team of security, networking, data science professionals, Acalvio allows security practitioners in detecting, engaging and responding to malicious activity with high precision in a timely and cost-effective fashion. Acalvio was selected as one of the top cyber security company at RSA Innovation Sandbox 2018. 

 

 

Total Funding Amount: $30,000,000

The Awake Security Investigation Platform enables rapid, iterative and conclusive alert investigations as well as threat hunting by placing the context that security teams need at their fingertips. Gathering this context manually, if even possible, can take hours of combing through dozens of data sources. Awake reduces time-to-truth to mere minutes with a quick-to-deploy, no tuning required, platform that builds on more than two years of R&D with over 200 security teams. It is chosen among top cyber security company as finalists at RSA Innovation Sandbox 2018 for showcasing innovative excellence.

 

 

BluVector is revolutionizing network security with state-of-the-art AI, sensing and responding to the world’s most sophisticated threats in real time. In the years to come, BluVector’s approach to allowing seamless deployment of best of breed analytics atop a simple to use, easy to integrate platform will allow the world’s businesses and governments to operate with trust and confidence that data & systems are protected. BluVector was selected as one of the top cyber security companies in the RSA Innovation Sandbox 2018. 

 

 

Total Funding Amount: $29,000,000

CyberGRX provides enterprises and their third parties with the most cost-effective and scalable approach to third-party cyber risk management today. Built on the market’s first third-party cyber risk Exchange, CyberGRX arms organizations with a dynamic stream of third party-data and advanced analytics so they can efficiently manage, monitor and mitigate risk in their partner ecosystems. Based in Denver, CO, CyberGRX was designed with partners including ADP, Aetna, Blackstone and Mass Mutual, and is backed by Allegis Capital, Bessemer Venture Partners, Blackstone, ClearSky, GV (formerly Google Ventures), MassMutual Ventures, Rally Ventures and TenEleven Ventures. CyberGRX is chosen among top cyber security company as finalists at RSA Innovation Sandbox 2018 for showcasing innovative excellence. 

 

Total Funding Amount: $8,000,000

Hysolate is re-architecting enterprise endpoints, resolving the conflict between security and productivity. With roots in the elite technology units of Israeli defense and in world-class enterprise software companies, the Hysolate team knows all about cyber-security offense/defense and the daily challenges of enterprise IT. They’ve been building enterprise software for decades and are passionate about disrupting the traditional thinking about endpoints, cyber-security and IT. Hysolate is one of the startup chosen as finalists among top cyber security companies in RSA Innovation Sandbox 2018.

 

 

Total Funding Amount: $1,500,000

ReFirm Labs is an emerging leader in the IoT and connected device security space. With decades of experience securing devices for sensitive national security applications, our team has developed a new method for vetting and validating firmware that automates the process of detecting security flaws in connected devices and mitigating them. Our Centrifuge Platform is at the forefront of this approach and is the first to deliver this capability to the commercial market. Our technology is already helping global companies secure their products by testing their firmware during and after the development process, and monitor for new vulnerabilities.

 

 

Total Funding Amount: $ 34,000,000

ShieldX is redefining cloud security to better protect organizations against cyber threats—regardless of where sensitive data resides or how it moves across public, private or multi-cloud environments. Organizations are using APEIRO to scale security and micro-segmentation on demand, support business innovation, meet compliance requirements and protect against the latest cyberattacks. Based in San Jose, CA, ShieldX is also among  the top cyber security companies who were chosen as finalists at RSA Innovation Sandbox 2018.

 

Total Funding Amount: $39,000,000

StackRox helps enterprises secure their cloud-native applications at scale. It is the industry’s first detection and response platform that defends containers and microservices from new threats. StackRox enables security teams to visualize the container attack surface, expose malicious activity, and stop attacker activity. It combines a new security architecture, machine learning, and protective actions to disrupt attacks in real time and limit their impact. StackRox is the choice of Global 2000 enterprises and backed by Sequoia Capital, it is chosen among top cyber security companies as finalist at RSA Innovation Sandbox 2018. 

Read more…
  • RSA Innovation Sandbox Contest for the past 12 years has been awarding most innovative information security companies and products.  Let’s have a look at those companies who emerged as innovative cyber security startups at RSA Conference 2018.
  • BTW, We have also created a RSAC 1-Minute Itinerary tool for the ease of attendees, through which you can now navigate the maze of 500+ Vendors at RSAC Expo like a pro. Do check it out: https://www.firecompass.com/fc/#/rsa/itinerary/home

Top Cyber Security Companies at RSA Innovative Sandbox Contest 2018

 

Awarded as “RSAC Most Innovative Startup 2018” 

Total Funding Amount: $16,100,000

  • BigID is transforming enterprise protection and privacy of personal data. Organizations are facing record breaches of personal information and proliferating global privacy regulations with fines reaching 4% of annual revenue. Today enterprises lack dedicated purpose-built technology to help them track and govern their customer data for regulations like GDPR. By bringing data science to data privacy, BigID aims to give enterprises the software to safeguard and steward the most important asset organizations manage: their customer data. To know more- https://www.firecompass.com/security/vendors/bigid-inc-

 

 

Runner up at RSA Innovation Sandbox 2018

Total Funding Amount: $8,000,000

  • Fortanix is building a new category Runtime Encryption using Intel SGX. Just like encryption today protects data at rest and data during motion, Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats including malicious insiders, cloud providers, OS-level hacks and network intruders. Customer gets deterministic security, unlike existing leaky security, which means their applications and data remain completely protected regardless of how the attacks originate and how root credentials are compromised. Keep your most valuable applications and data protected even when infrastructure has been compromised, even when adversary has physical access and root passwords!

 

Total Funding Amount: $33,100,000

  • Acalvio is an innovator in delivering Advanced Defense solutions using a combination of Distributed Deception and Data Science technologies. Led by a seasoned team of security, networking, data science professionals, Acalvio allows security practitioners in detecting, engaging and responding to malicious activity with high precision in a timely and cost-effective fashion. Acalvio was selected as one of the top cyber security company at RSA Innovation Sandbox 2018. To know more-https://www.firecompass.com/security/vendors/acalvio-technologies

 

 

Total Funding Amount: $30,000,000

  • The Awake Security Investigation Platform enables rapid, iterative and conclusive alert investigations as well as threat hunting by placing the context that security teams need at their fingertips. Gathering this context manually, if even possible, can take hours of combing through dozens of data sources. Awake reduces time-to-truth to mere minutes with a quick-to-deploy, no tuning required, platform that builds on more than two years of R&D with over 200 security teams. It is chosen among top cyber security company as finalists at RSA Innovation Sandbox 2018 for showcasing innovative excellence.

 

 

  • BluVector is revolutionizing network security with state-of-the-art AI, sensing and responding to the world’s most sophisticated threats in real time. In the years to come, BluVector’s approach to allowing seamless deployment of best of breed analytics atop a simple to use, easy to integrate platform will allow the world’s businesses and governments to operate with trust and confidence that data & systems are protected. BluVector was selected as one of the top cyber security companies in the RSA Innovation Sandbox 2018. To know more-https://www.firecompass.com/security/vendors/bluvector

 

 

Total Funding Amount: $29,000,000

CyberGRX provides enterprises and their third parties with the most cost-effective and scalable approach to third-party cyber risk management today. Built on the market’s first third-party cyber risk Exchange, CyberGRX arms organizations with a dynamic stream of third party-data and advanced analytics so they can efficiently manage, monitor and mitigate risk in their partner ecosystems. Based in Denver, CO, CyberGRX was designed with partners including ADP, Aetna, Blackstone and Mass Mutual, and is backed by Allegis Capital, Bessemer Venture Partners, Blackstone, ClearSky, GV (formerly Google Ventures), MassMutual Ventures, Rally Ventures and TenEleven Ventures. CyberGRX is chosen among top cyber security company as finalists at RSA Innovation Sandbox 2018 for showcasing innovative excellence.To know more- https://www.firecompass.com/security/vendors/cybergrx

 

 

Total Funding Amount: $8,000,000

Hysolate is re-architecting enterprise endpoints, resolving the conflict between security and productivity. With roots in the elite technology units of Israeli defense and in world-class enterprise software companies, the Hysolate team knows all about cyber-security offense/defense and the daily challenges of enterprise IT. They’ve been building enterprise software for decades and are passionate about disrupting the traditional thinking about endpoints, cyber-security and IT. Hysolate is one of the startup chosen as finalists among top cyber security companies in RSA Innovation Sandbox 2018.

 

 

Total Funding Amount: $1,500,000

ReFirm Labs is an emerging leader in the IoT and connected device security space. With decades of experience securing devices for sensitive national security applications, our team has developed a new method for vetting and validating firmware that automates the process of detecting security flaws in connected devices and mitigating them. Our Centrifuge Platform is at the forefront of this approach and is the first to deliver this capability to the commercial market. Our technology is already helping global companies secure their products by testing their firmware during and after the development process, and monitor for new vulnerabilities.

 

 

Total Funding Amount: $ 34,000,000

ShieldX is redefining cloud security to better protect organizations against cyber threats—regardless of where sensitive data resides or how it moves across public, private or multi-cloud environments. Organizations are using APEIRO to scale security and micro-segmentation on demand, support business innovation, meet compliance requirements and protect against the latest cyberattacks. Based in San Jose, CA, ShieldX is also among  the top cyber security companies who were chosen as finalists at RSA Innovation Sandbox 2018.

 

Total Funding Amount: $39,000,000

StackRox helps enterprises secure their cloud-native applications at scale. It is the industry’s first detection and response platform that defends containers and microservices from new threats. StackRox enables security teams to visualize the container attack surface, expose malicious activity, and stop attacker activity. It combines a new security architecture, machine learning, and protective actions to disrupt attacks in real time and limit their impact. StackRox is the choice of Global 2000 enterprises and backed by Sequoia Capital, it is chosen among top cyber security companies as finalist at RSA Innovation Sandbox 2018. To know more- https://www.firecompass.com/security/vendors/stackrox

Read more…
  • Cyber risks have evolved significantly over the last couple of years across industry sectors. Cybersecurity  is  a  matter  of  growing  concern  as  cyber-attacks  cause  loss  of income,  sensitive  information  leaks,  and  even  vital  infrastructures  to  fail.
  • The BFSI industry, in particular, has become the target of choice with malicious actors exploring every avenue they can in order to identify areas of vulnerability. Though the financial sector has invested hugely in security – and, logically, it is among the most advanced when it comes to IT security. But clearly, there is more to be done.

 

Security Breaches in BFSI industry of India

  • Union Bank: Hackers managed to steal Union Bank’s Access Codes for the Society for worldwide Interbank Financial Telecommunication (SWIFT)
  • Axis Bank: Unauthorized login by an unnamed, offshore hijacker
  •  Hitachi Payment Systems: Malware Caused breach of Bank data
  • Yes Bank: Malware attacked some ATMs and POS machines
  • Bank of Maharashtra: Central Server Hacked

Source : The Economic Times

READ MORE >>  Analysing/Dissecting Uber Subdomain Takeover Attack

Security Score Snapshot for Indian BFSI Industry

Key Findings

 

  • An average OSINT Score of B+ doesn’t justify the cyber security system in place for BFSI Sector
  • Banking sector in India is found to have an established, strong encrypted links between their server and client browser, with most of the banking organisation having an A+ average rating in terms of their SSL score
  • Large Indian Banks and Telcos are the most mature with average score of ~60% with Small Banks still lagging far behind at ~45%
  • Insurance sector in India is found to have an established, strong encrypted links between their server and client browser, with each of the sector having an A+ rating in terms of their SSL score
  • Client- Server Computer programs for Financial services are found to be poorly performingagainst potential cyber attacks with an average web-app security score rating of below B+

 

Read more…
  • Looking for Top Emerging Companies in the Cyber Security Industry?  FireCompass presents 50 Emerging Cyber Security Vendors to look out for in 2018. We don’t claim this is exhaustive list because there might be a possibility that we might have missed some of the products. But still we gave our best to give you the top guns who are uniquely innovative in their area of expertise.
  • Lets have a look at 50 Emerging Cyber Security Vendors for year 2018:

 

Acalvio Technologies

acalvio-firecompass-emerging-vendors-2018

  • Acalvio is an innovator in delivering Advanced Defense solutions using a combination of Distributed Deception and Data Science technologies. Led by a seasoned team of security, networking, data science professionals, Acalvio allows security practitioners in detecting, engaging and responding to malicious activity with high precision in a timely and cost-effective fashion. Acalvio was selected as one of the top cyber security company at RSA Innovation Sandbox 2018. To know more: https://www.firecompass.com/security/vendors/acalvio-technologies

 

Aporeto

aporeto-firecompass-emerging-vendors-2018

  • Aporeto is a Zero Trust security solution for microservices, containers and the cloud. Fundamental to Aporeto’s approach is the principle that everything in an application is accessible to everyone and could be compromised at any time. Aporeto uses identity context, vulnerability data, threat monitoring and behavior analysis to build and enforce authentication, authorization and encryption policies for applications. With Aporeto, enterprises implement a uniform security policy decoupled from the underlying infrastructure, enabling workload isolation, API access control and application identity management across public, private or hybrid cloud.

 

Aqua Security

aqua-firecompass-emerging-vendors-2018

  • Aqua Security provides scalable security for the complete development-to-deployment lifecycle of containerized applications. It enable companies to use containers for their many benefits without compromising their application and data security. It helps enterprises to secure their virtual container environments from development to production, accelerating container adoption and bridging the gap between DevOps and IT security.Aqua’s Container Security Platform provides full visibility into container activity, allowing organizations to detect and prevent suspicious activity and attacks, providing transparent, automated security while helping to enforce policy and simplify regulatory compliance.  

Armis

armis-firecompass-emerging-vendors-2018

  • Armis Security is an agentless IoT security solution that lets enterprises see and control any device or network. It eliminates the IoT security blind spot, letting enterprises instantly see and control unmanaged or rogue devices and networks. It specializes in IoT Security, network security, mobile security, DDoS, wireless security, Botnets, and Ransomware.

 

Attivo Networksattivo-firecompass-emerging-vendors-2018

  • Attivo Networks® is an award-winning leader in deception technology for real-time detection, analysis, and acceleration of incident response to cyber-attacks. The Attivo ThreatDefend™ Deception and Response Platform provides early detection of advanced, stolen credential, ransomware, and phishing attacks that are inside user networks, data centers, clouds, IoT and ICS-SCADA environments. By deceiving attackers into revealing themselves, comprehensive attack analysis is efficiently gathered, actionable alerts raised, and response actions automated with prevention system integrations. 

 

Avanan

avanan-firecompass-emerging-vendors-2018

  • Avanan operates a cloud-based platform to provide security solutions for public, SaaS-based applications. The product is designed for organizations that need to monitor and protect their employees’ use of the cloud. AVANAN protects your data in the cloud with the same industry-leading security you trust in your datacenter. The cloud-based platform is completely out-of-band, requires no proxy, and can be deployed in just 10 minutes. It provides seamless policy governance across users and data in the cloud.  

 

Awake Security

awake-firecompass-emerging-vendors-2018

  • The Awake Security Investigation Platform enables rapid, iterative and conclusive alert investigations as well as threat hunting by placing the context that security teams need at their fingertips. Gathering this context manually, if even possible, can take hours of combing through dozens of data sources. Awake reduces time-to-truth to mere minutes with a quick-to-deploy, no tuning required, platform that builds on more than two years of R&D with over 200 security teams.

 

Balbix

balbix-firecompass-emerging-vendors-2018

  • Balbix’s predictive breach risk platform is the industry’s first system to leverage predictive analytics and AI to provide enterprises with a comprehensive and continuous risk and resilience calculation visualized via a searchable and clickable heat map. We designed our platform for CIOs, CISOs and IT security teams who wish to proactively understand their breach risk and cyber-resilience. The Balbix system can predict critical breach scenarios, help users prioritize security operations and projects, and ultimately improve cyber-resilience.

 

Bastille

bastille-firecompass-emerging-vendors-2018

  • Bastille is revolutionizing the way Enterprises approach security. As new threats emerge from the Internet of Things, Bastille is the only solution offering full spectrum scanning of the entire corporate airspace, delivering an unprecedented view of wireless risks before they have a chance to impact networks, people or assets. This visibility, combined with machine learning and behavioral analytics, provides a holistic view of wireless environments, complimenting Wi-Fi and traditional security architectures. 

BigID

bigid-firecompass-emerging-vendors-2018

  • BigID is transforming enterprise protection and privacy of personal data. Organizations are facing record breaches of personal information and proliferating global privacy regulations with fines reaching 4% of annual revenue. Today enterprises lack dedicated purpose-built technology to help them track and govern their customer data for regulations like GDPR. By bringing data science to data privacy, BigID aims to give enterprises the software to safeguard and steward the most important asset organizations manage: their customer data. To know more 

 

Bricata

bricata-firecompass-emerging-vendors-2018

  • Bricata network security solutions deliver innovative next generation intrusion prevention, advanced threat detection and analysis, and threat hunting to enable large organizations to actively pursue and identify advanced, persistent, and coordinated attacks. A specialized component-based approach to today’s attacks has left organizations with a stack of tools to manage that provide a patchwork of uncorrelated data, leaving penetrable gaps and inconsistent security policies. The Bricata platform provides organizations with process automation, streamlining operations with the most effective, affordable solution for situational awareness and proactive threat defense, reducing complexity, dwell time and time to containment. To know more: 

 

Capsule8

capsule8-firecompass-emerging-vendors-2018

  • Capsule8 is developing the industry’s first and only threat prevention and response platform purpose-built for cloud-native environments. Founded in 2016 by experienced hackers and seasoned security entrepreneurs, and funded by Bessemer Venture Partners, Capsule8 is making it possible for Linux-powered enterprises to modernize without compromise.

 

Cato Networks

cato-firecompass-emerging-vendors-2018

  • Cato Networks provides organizations with a cloud-based and secure global SD-WAN. They deliver an integrated networking and security platform that securely connects all enterprise locations, people and data. The Cato Cloud reduces MPLS connectivity costs, eliminates branch appliances, provides direct, secure Internet access everywhere, and seamlessly integrates mobile users and cloud infrastructures into the enterprise network. Based in Tel Aviv, Israel, Cato Networks was founded in 2015 by cyber security luminary Shlomo Kramer, who previously cofounded Check Point Software Technologies and Imperva, and Gur Shatz, who previously cofounded Incapsula. 

 

CryptoMove

cryptomove-firecompass-emerging-vendors-2018

  • CryptoMove provides decentralized moving target data protection as a service. The #1 risk to data is that it is a centralized and stationary target. Today’s data at rest protection methods have not changed in decades, are too difficult to implement, suffer from poor UX, don’t deliver value to end-users, and fail to address many threats to data including exfiltration, corruption, destruction, and ransomware. CryptoMove’s patented platform flips attack-defense asymmetry and provides crown jewel protection as a service.

 

Cyber adapt

cyberadapt-firecompass-emerging-vendors-2018

  • Cyber adAPT®’s technology aims at protecting critical business assets by helping companies detect the presence of sophisticated adversaries hiding inside enterprise networks.Since the majority of available security tools have been deployed to safeguard against anticipated threats rather than alerting on suspicious “inside” activities, Cyber adAPT® is on a mission to not only educate about the growing scope of the threat ecosystem, but also to help ensure that the security postures and practices companies around the world adopt are sufficient and work holistically to protect their digital property as well as their reputation.

 

CyberGRX

cyberGRX-firecompass-emerging-vendors-2018

  • CyberGRX provides enterprises and their third parties with the most cost-effective and scalable approach to third-party cyber risk management today. Built on the market’s first third-party cyber risk Exchange, CyberGRX arms organizations with a dynamic stream of third party-data and advanced analytics so they can efficiently manage, monitor and mitigate risk in their partner ecosystems. Based in Denver, CO, CyberGRX was designed with partners including ADP, Aetna, Blackstone and Mass Mutual, and is backed by Allegis Capital, Bessemer Venture Partners, Blackstone, ClearSky, GV (formerly Google Ventures), MassMutual Ventures, Rally Ventures and TenEleven Ventures. CyberGRX is chosen among top cyber security company as finalists at RSA Innovation Sandbox 2018 for showcasing innovative excellence.

 

Deep Instinct

deepinstinct-firecompass-emerging-vendors-2018

  • Deep Instinct is the first company to apply deep learning to cyber security. It’s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. As a result, zero-day and APT attacks are detected and prevented in real-time with unmatched accuracy. They bring a completely new approach to cyber security that is proactive and predictive. Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.  

ensilo

ensilo-firecompass-emerging-vendors-2018

  • enSilo delivers the first complete endpoint security platform providing pre- and post-infection protection in real-time, defending endpoint devices from data tampering and breaches caused by advanced malware. enSilo provides security operators with an intuitive way to manage, orchestrate and automate prevention, detection, response and remediation tasks. A single lightweight agent combines enSilo’s Next Generation AntiVirus (NGAV) and automated Endpoint Detection and Response (EDR) with real-time blocking to deliver a multi-layered defense strategy that can be managed from the cloud or on premise. enSilo strives to make self-defending endpoint security cost-effective so virtually any enterprise can ensure business continuity. 

 

Exabeam

exabeam-firecompass-emerging-vendors-2018

  • Exabeam provides security intelligence and management solutions to help organizations of any size protect their most valuable information. The Exabeam Security Intelligence Platform uniquely combines unlimited data collection at a predictable price, machine learning for advanced analytics, and automated incident response into an integrated set of products. The result is the first modern security intelligence solution that delivers where legacy SIEM vendors have failed. 

Fortanix

fortanix-firecompass-emerging-vendors-2018

  • Fortanix is building a new category Runtime Encryption using Intel SGX. Just like encryption today protects data at rest and data during motion, Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats including malicious insiders, cloud providers, OS-level hacks and network intruders. Customer gets deterministic security, unlike existing leaky security, which means their applications and data remain completely protected regardless of how the attacks originate and how root credentials are compromised.

 

GreatHorn

greathorn-firecompass-emerging-vendors-2018

  • GreatHorn has cloud-native security platform for post-perimeter threat detection and response, natively integrated into G Suite, Office 365, Slack, and more. Provides enterprise security solutions for email, chat, and threat detection across multiple communication channels.Attacks on cloud email, chat, and collaboration tools are responsible for more than 90% of all data breaches. GreatHorn helps companies secure these platforms from advanced threats, simplify governance and compliance requirements, and communicate with confidence. 

Hysolate

hysolate-firecompass-emerging-vendors-2018

  • Hysolate is re-architecting enterprise endpoints, resolving the conflict between security and productivity. With roots in the elite technology units of Israeli defense and in world-class enterprise software companies, the Hysolate team knows all about cyber security offense/defense and the daily challenges of enterprise IT. They’ve been building enterprise software for decades and are passionate about disrupting the traditional thinking about endpoints, cyber security and IT.

 

iguazio

iguazio-firecompass-emerging-vendors-2018

  • iguazio digitally transforms business value by streamlining data volumes to create actionable insights. Through its Continuous Data Platform for Real-time Applications, iguazio simplifies the development and deployment of data-driven applications to extend the cloud experience at the edge and on-premises. iguazio is a driving force in industries pertaining to manufacturing, smart mobility, the Internet of Things, media and cyber security.

 

illumio

illumio-firecompass-emerging-vendors-2018

  • Illumio, the leader in micro-segmentation, prevents the spread of breaches inside data center and cloud environments. Enterprises such as Morgan Stanley, BNP Paribas, Salesforce, and Oracle NetSuite use Illumio to reduce cyber risk and achieve regulatory compliance. The Illumio Adaptive Security Platform® uniquely protects critical information with real-time application dependency and vulnerability mapping coupled with micro-segmentation that works across any data center, public cloud, or hybrid cloud deployment on bare-metal, virtual machines, and containers. 

Illusive Networks

illusive-firecompass-emerging-vendors-2018

  • Illusive Networks, the leader in deception-based cyber security solutions, empowers security teams to preemptively harden their networks against advanced attackers, stop targeted attacks through early detection of lateral movement, and resolve incidents quickly. Agentless and intelligence-driven, Illusive technology significantly increases proactive defense capability with almost no operational overhead. Illusive’s Deceptions Everywhere® approach was pioneered by experts with decades of experience in cyber warfare and cyber intelligence. By proactively intervening in the attack process, technology-dependent organizations protect critical business assets and function with greater confidence in today’s complex, hyper-connected world.

READ MORE >>  Key Program Metrics of Vulnerability AssessmentIntsights

insights

  • INTSIGHTS is an intelligence driven security provider, established to meet the growing need for rapid, accurate cyber intelligence and incident mitigation. Their founders are veterans of elite military cybersecurity and intelligence units, where they acquired a deep understanding of how hackers think, collaborate and act.They partner with organizations to boost their cybersecurity and remediate their cyberthreats. This is achieved through a subscription-based service which infiltrates the cyberthreat underworld to detect and analyze planned or potential attacks and threats that are specific to their partners.

Jask

jask-firecompass-emerging-vendors-2018

  • Headed by industry leaders from ArcSight, Carbon Black, Cylance and the counter-intelligence community, JASK brings together decades of experience solving real-world SOC issues. Founded to address the technology gaps that restrict security modernization efforts, JASK is revolutionizing security operations to reduce organizational risk and improve efficiency through technology consolidation, enhanced AI and machine learning. JASK is backed by Dell Technologies Capital, TenEleven Ventures, Battery Ventures and Vertical Venture Partner. 

 

Karamba Security

  • Karamba Security is a software company that focuses on securing automotive controllers and IoT devices from hackers in a simple, yet hermetic manner. It is led by a team comprised of security experts, serial entrepreneurs and business savvy executives with a track record of multiple IPOs and M&As.

 

Menlo Security

menlosecurity-firecompass-emerging-vendors-2018

  • Menlo Security‘s patented Isolation Platform protects organizations from cyber attack by eliminating the threat of malware. The Platform isolates and executes all Web content in the cloud, enabling users to safely interact with websites, links and documents online without compromising security. Menlo Security is trusted by some of the world’s largest enterprises, including Fortune 500 companies and financial services institutions. 

 

Obsidian Security

obsidian-firecompass-emerging-vendors-2018

  • Led by former founding team members of Cylance and Carbon Black, Obsidian Security is a Southern California technology company living at the intersection of cybersecurity, artificial intelligence, and hybrid-cloud environments. Backed by Greylock Partners, Obsidian Security is based in Newport Beach, CA.

 

PerimeterX

perimeterx-firecompass-emerging-vendors-2018

  • PerimeterX is a cyber security company that prevents automated web and mobile application attacks by detecting & protecting against malicious web behavior. To separate the actions of bots from those of normal users, PerimeterX uses artificial intelligence & machine learning to identify behaviors that are unlikely to represent human actions. This behavior based technology allows PerimeterX to detect and block the most sophisticated new forms of bot attacks in real-time with unparalleled accuracy. PerimeterX was named a Gartner Cool Vendor, and an AI 100 company by CBInsights, and was selected by DarkReading as Top 20 Cyber security Companies to Watch.

 

Preempt

preempt-firecompass-emerging-vendors-2018

  • Preempt was founded in 2014 by global security and networking experts with a passion for making IT security teams more effective in protecting their organizations from breaches and malicious insiders. They protects organizations by eliminating security threats. Threats are not black or white and the Preempt Platform is the only solution that preempts threats with continuous threat prevention that automatically adapts based on identity, behavior and risk. This ensures that both security threats and risky employee activities are responded to with the right level of security at the right time. The platform easily scales to provide comprehensive identity based protection across organizations of any size.  

Prevotyprevoty-firecompass-emerging-vendors-2018

  • Prevoty provides a new RASP (runtime application self-protection) capability, enabling applications to protect themselves. Unlike traditional security approaches that try to defend against hackers at the network layer, Prevoty works inside the application itself and the analysis engine is smart enough to actively prevent anything malicious from executing. Prevoty is one of the most exciting new companies in the hot security market since, in addition to providing active protection and real-time threat intelligence, the technology can dramatically reduce the time and costs associated with implementation of a secure SDLC. 

 

Qingteng

qinteng-firecompass-emerging-vendors-2018

  • Qingteng Cloud Security is a SaaS-based cloud security company in China. It is a China-based company that delivers server and cloud security based on Adaptive Security Architecture. Qingteng Cloud Security’s adaptive security platform can protect data on various cloud systems. Its technology can forecast, defend, and adapt to fend off new threats.

 

ReFirm Labs 

refirmlabs-firecompass-emerging-vendors-2018

  • ReFirm Labs is an emerging leader in the IoT and connected device security space. With decades of experience securing devices for sensitive national security applications, our team has developed a new method for vetting and validating firmware that automates the process of detecting security flaws in connected devices and mitigating them. Our Centrifuge Platform is at the forefront of this approach and is the first to deliver this capability to the commercial market. Our technology is already helping global companies secure their products by testing their firmware during and after the development process, and monitor for new vulnerabilities.

 

SafeBreach

safebreach-firecompass-emerging-vendors-2018

  • SafeBreach helps answer the questions security leaders are being asked by their CEO/boards today – Are we secure?”​ and “Can a breach happen to us?”​ Their platform simulates hacker breach methods across the entire kill chain to identify breach scenarios in your environment before an attacker does. SafeBreach automatically executes breach methods with an extensive and growing Hacker’s Playbook of research and real-world investigative data. SafeBreach is funded by Sequoia Capital, Deutsche Telekom Capital, Hewlett Packard Pathfinder and investor Shlomo Kramer. 

Security ScoreCard

securityscorecard-firecompass-emerging-vendors-2018

  • SecurityScorecard grading service helps organizations in an increasingly hyper-connected world better identify, understand and manage all key risks their cloud-based information systems and those of their partners face every second of every day. Its patented solution is the only automated method to monitor all key risk factors on a continuous, real-time basis. This means users will always know the security levels of every organization they work with or share data and be able to take action, quickly and easily.  

Shieldx

shieldx-firecompass-emerging-vendors-2018

  • ShieldX is redefining cloud security to better protect organizations against cyber threats—regardless of where sensitive data resides or how it moves across public, private or multi-cloud environments. Organizations are using APEIRO to scale security and micro-segmentation on demand, support business innovation, meet compliance requirements and protect against the latest cyberattacks.

 

Shiftleft

shiftleft-firecompass-emerging-vendors-2018

  • ShiftLeft.io is developing a new model for protecting software. We limit the attack surface proactively by understanding the Security DNA of each new version of any application or micro-service to strengthen it. This helps businesses increase the speed at which issues resulting from non-conformance with security DNA of their apps can be identified and automatically triaged.

 

Shocard

shocard-firecompass-emerging-vendors-2018

  • ShoCard is a digital identity and authentication platform built on a public blockchain data layer, using public/private key encryption and data hashing to safely store and exchange identity data, which includes biometrics such as fingerprint, facial, iris and voice. ShoCard’s approach to identity is different than existing solutions in that the user owns and carries her own data within her mobile app and is the sole person who decides with whom to share it with and which pieces of identification to share. The blockchain in then used to validate that information and confirm other third parties who have definitively certified the identity of the user. There is no privately held central location that holds user’s private information and pieces of a user’s identification does not need to be spread in other services in order to authenticate or prove ownership of an account. 

Signal Sciences

signalsciences-firecompass-emerging-vendors-2018

  • Signal Sciences Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform. Built by practitioners, for practitioners, it is the only solution that works seamlessly across any cloud and infrastructure. Signal Sciences customers include Under Armour, Etsy, Yelp/Eat 24, Datadog, WeWork and more.

Signifyd

  • Signifyd is the world’s largest provider of Guaranteed Fraud Protection and was founded on the belief that e-commerce businesses should be able to grow without fear of fraud. They solve the challenges that growing e-commerce businesses persistently face: billions of dollars lost in chargebacks, customer dissatisfaction from mistaken declines, and operational costs due to tedious, manual transaction investigation. They Guaranteed Payments protect online retailers in the case of chargebacks, supported by a full-service machine-learning engine that automates fraud prevention allowing businesses to increase sales and open new markets while reducing risk. 

Stackpath

stackpath-firecompass-emerging-vendors-2018

  • StackPath is the intelligent web services platform for security, speed and scale. It is the first platform to unify enterprise security solutions by leveraging collaborative intelligence that makes each service smarter and more secure with every threat detected, in addition to vastly improving the customer experience. More than 30,000 customers, ranging from Fortune 100 companies to early stage startups already use StackPath technology.  

StackRox

stackrox-firecompass-emerging-vendors-2018

  • StackRox helps enterprises secure their cloud-native applications at scale. It is the industry’s first detection and response platform that defends containers and microservices from new threats. StackRox enables security teams to visualize the container attack surface, expose malicious activity, and stop attacker activity. It combines a new security architecture, machine learning, and protective actions to disrupt attacks in real time and limit their impact. StackRox is the choice of Global 2000 enterprises and backed by Sequoia Capital, it is chosen among top cyber  security companies as finalist at RSA Innovation Sandbox 2018.  

Streamsets

streamsets-firecompass-emerging-vendors-2018

  • StreamSets is a big data startup that reinvents how enterprises deliver timely and trustworthy data to their critical applications. We’ve built the industry’s first data operations platform which makes it easy to both build and manage data movement architectures in the face of constant change. Our open source StreamSets Data Collector has been downloaded over 250,000 times and is in use at many of the world’s largest companies. We’re backed by top-tier Silicon Valley venture capital firms, including Accel Partners, Battery Ventures, Ignition Partners and New Enterprise Associates (NEA).

 

ThreatQuotient

threatquotient-firecompass-emerging-vendors-2018

  • ThreatQuotient™ understands that the foundation of intelligence-driven security is people. The company’s open and extensible threat intelligence platform, ThreatQ™, and cyber security situation room solution. ThreatQ Investigations, empower security teams with the context, customization and prioritization needed to make better decisions, accelerate detection and response, and advance team collaboration. Leading global companies use ThreatQuotient solutions as the cornerstone of their security operations and threat management system.  

Trusona

trusona-firecompass-emerging-vendors-2018

  • Trusona is the leader in simply secure identity authentication. We developed the world’s first and only insured digital identity authentication solution and are leading a movement where there are no passwords to be created, remembered, stolen, or compromised. Where people are who they say they are – every time. Our solution takes a completely different approach. It is radically simple, and relies on patented technology that uses the unique nature of every interaction to assure the True Persona behind every digital interaction. Trusona. Simply Secured.

 

Twistlock

twistlock-firecompass-emerging-vendors-2018

  • Twistlock is the leading provider of container and cloud native cyber security solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies – Twistlock gives developers the speed they want, and CISOs the control they need. 

 

UnifyID

unifyid-firecompass-emerging-vendors-2018

  • UnifyID  is building a revolutionary identity platform based on implicit authentication. Their solution allows people to identify themselves in a unique way that is extremely difficult to forge or crack. Best of all, they are doing it in a way that respects user privacy.They are developing a revolutionary new technique for authentication that relies on implicit authentication. These are factors that are unique to you but don’t require any user action, such as your location, your habits, and various signals from the devices you carry and the sensors around you. They use proprietary machine learning algorithms to discover what makes you unique and calculate a confidence level of how likely it is you based on these signals. 

 

Zerofox

Zerofox-firecompass-emerging-vendors-2018

  • ZeroFOX protects organizations from the risks introduced by social networking and digital communication platforms. In an age of constant connectivity and social sharing, users have become the primary target for the adversary. By continuously monitoring social platforms for cyber attacks, ZeroFOX protects organizations from the next generation of digital threats. Leveraging cutting edge technology and proven security practices, ZeroFOX provides both targeted protection and global insights. 
Read more…

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 1 of 3 series.

 

What will you learn:

  • Tools and techniques – understanding the taxonomy
  • Top use cases for the SOC
  • Attack surfaces
    • Insider threat
    • Credential theft
    • Endpoint compromise
    • Application attack
  • Monitoring / Building / SWIFT Fraud
  • Analytics and hunting playbooks for SWIFT


About Speaker:

 

Shomiron Das Gupta

Founder, Netmonastery

 

 

Shomiron is a highly experienced Intrusion Analyst, and has been building threat detection systems for more than a decade. He founded NETMONASTERY (NM) at the end of 2002, and set out to deliver quality attack detection products and services to its customers. Today NM serves the largest customers in the financial, telecom, media and e-commerce markets with its geographical reach and presence spanning the globe.

Read more…
  • Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 2 of 3 series.

 

What will you learn:

  • Tools and techniques – understanding the taxonomy
  • Top use cases for the SOC
  • Attack surfaces
    • Insider threat
    • Credential theft
    • Endpoint compromise
    • Application attack
  • Monitoring / Building / SWIFT Fraud
  • Analytics and hunting playbooks for SWIFT


About Speaker:

 

Shomiron Das Gupta

Founder, Netmonastery

 

 

Shomiron is a highly experienced Intrusion Analyst, and has been building threat detection systems for more than a decade. He founded NETMONASTERY (NM) at the end of 2002, and set out to deliver quality attack detection products and services to its customers. Today NM serves the largest customers in the financial, telecom, media and e-commerce markets with its geographical reach and presence spanning the globe.

Read more…

What will you learn:

  • Overview of data leakages
    • Cases
    • Risks
    • Solutions
  • Protection against data leakages
    • Main challenges
    • Sources of data leakages
    • Tools and solutions
  • Data Leakage Prevention systems
    • Core principles and technologies involved
  • Layered insider threat intelligence
    • Visualization of information flows
    • Pinpoint control of suspicious activities
  • Mobile environment and insider threats


About Speaker:

 

Nikita Zaychikov

Presales Manager,
Infowatch

 

 

Nikita has an extensive background in IT, Engineering and Security fields and has worked from both technical and sales sides, giving him insight into both technical challenges and business applications of various information security tools. During his employment at InfoWatch, he worked in several regions around the world, including Russia, the CIS, the Middle East, South-East Asia and others. This gives Nikita understanding of how approaches to security and information technology differ in various regions of the world.

Read more…
  • Today web applications are ubiquitous and in many cases, the primary source of engagement between the user and the organization. Traditionally, organizations relied on network security controls such as network firewalls and IDS/IPS as the primary defence mechanism even for applications, but that is a very flawed approach. Application security requires organizations to rethink their security strategy and not take a piecemeal view. There is a critical need for an evaluation methodology for Web Application Firewall (WAF) solution and this  20 Page comprehensive guide. 
  • This will help you with independent evaluation & comparison of WAF solutions. You can customize this checklist based on your specific requirements. This report is created by FireCompass Analystsalong with the F5 Networks Team.


Guide Includes:

  • Overview of the Web Application Firewall (WAF) Solutions
  • Common Web Application Firewall (WAF) Use Cases
  • Deployment Options for Web Application Firewall (WAF) Solutions
  • Detailed Evaluation Checklist to evaluate Web Application Firewall (WAF) Solutions

 

Who Can & How to Use This Guide:

With the increased growth in the usage of the internet, mobile applications, and the Internet of Things, applications become ubiquitous but their security is low key. Deploying an effective WAF will be one of the baseline measures organizations can take to protect themselves from breaches and secure their customers. This guide is a good start who are looking to evaluate WAF Solutions. Organizations can customize this checklist based on their specific requirements.

 

Read more…

Cyber Security Blogs One Must Follow Today

  • The world of cyber security is moving so fast, that it is important to keep yourself updated with the newest technology. There are numerous articles, newsletters,reports etc claiming to provide authentic information, but which one to trust ?! Hence, we have come up with the list of some of the most influencing and up-to-date cyber security blogs which one must follow, irrespective of being either a new entrant or veteran in this industry.
    We know that these are not the only sources and can not be always, hence we will keep on trying to provide you with the best of the best information.

Lets have a look at these Cyber Security blogs

Krebs on Security – Brian Krebs

  • Brian Krebs filled in as a columnist for The Washington Post from 1995 to 2009, composing in excess of 1,300 blog entries for the Security Fix blog, and several stories for washingtonpost.com and The Washington Post daily paper, including eight first page stories in the dead-tree release and a Post Magazine cover piece on botnet operators. In 2014, he was profiled in The New York Times, Business Week and by Poynter.org.

Schneier on Security – Bruce Schneier

  • Bruce Schneier is a globally eminent security technologist, called a “security guru” by The Economist. He is the writer of 13 books- – including Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World- – and in addition many articles, expositions, and scholarly papers.

Byron Acohido

  • Byron Acohido official produces multi-media article content made to progress insightful talk of imperative security and cyber security subjects. While at the Seattle Times prior in his career, Acohido was granted the 1997 Pulitzer Prize for Beat Reporting and 11 other national honors for investigative stories connecting an unsafe deformity in the rudder controls of Boeing 737 jetliners to a series of accidents that killed many individuals.

DarkReading

  • One of the most widely-read cyber security news sites on the Web, Dark Reading is now the most trusted online community for security professionals. Their community members include thought-leading security researchers, CISOs, and technology specialists, along with thousands of other cyber security professionals. Dark Reading is one of the most followed source among other cyber security blogs.
  • Graham Cluley is one of the world’s most renowned independent cyber security analyst and a public speaker. He is working in the computer security industry for more than 25 years. He started as programmer writing the first ever version of Dr Solomon’s Anti-Virus Toolkit for Windows, then he has worked on senior level positions in Sophos and McAfee.

IT Security Guru

  • The IT Security Guru offers a daily news digest of all the best breaking cyber security news stories first thing in the morning! Rather than you having to trawl through all the newsfeed to find out what’s cooking, you can quickly get everything you need from this site! Unlike other cyber security blogs, they make the news digestible enough for the non-technical also.

TaoSecurity – Richard Bejtlich

  • Richard started his advanced security profession as a military knowledge officer in 1997 at the Air Force Computer Emergency Response Team (AFCERT), Air Force Information Warfare Center (AFIWC), and Air Intelligence Agency (AIA). Richard is an alum of Harvard University and the United States Air Force Academy.  At General Electric, as Director of Incident Response, he constructed and drove the 40-part GE Computer Incident Response Team (GE-CIRT).

Troy Hunt

  • Troy Hunt is an Australian Cyber Security expert and is also Microsoft Most Valuable Professional. He is known for his public outreach and contributions in the field of cyber security. He created the website “Have I Been Pwned”, a free service for the non-technical to know whether their personal information is compromised or not. Troy is also the author of many top-rating courses on Cyber security and other technologies on Plural Sight, a platform for online education.

Wired

  • Wired is a month to month American magazine, distributed in print and online releases, that spotlights on how the innovative technology advances influence culture, the economy, and legislative issues. It has must followed content among the cyber security blogs.

ZDNet

  • ZDNet is a business innovation news site distributed by CBS Interactive, alongside TechRepublic. The brand was established on April 1, 1991, as a general intrigue innovation gateway from Ziff Davis and developed into an endeavor IT-centered online production claimed by CNET Networks.

READ MORE >>  Top Open Source Tools to detect Subdomain takeover risk

Read more…

Benchmarking Deception Solutions

  • With the evolving threat landscape, breaches are becoming increasingly common. As per Ponemon Institute, in 2017, the average time required to detect a breach was 191 days and the average time required to contain a breach was 66 days. These time frames can have a significant impact on businesses relying on technology for their continued operations. Deception as a strategy has always been a critical element for detecting threats and adversary behavior. Honeypots have been used as a deception mechanism for over a decade, both by organizations and security vendors, to research attack tactics, techniques, and procedures and provide threat intelligence. This 20 page comprehensive guide will help you to evaluate and compare deception solutions.


This Guide Includes:

  • Deception Technology Use Cases
  • Key Evaluation Parameters
  • Evaluation Checklist to evaluate and compare different deception solutions

Read more…