The BitSight Executive Reports Deliver Actionable Metrics that Foster More Educated and Powerful Business Decisions About Cybersecurity Risk.
Source: BitSight Read MoreHere are four insider tips on how you (or your CISO) can help your organisation grow and succeed while still focusing on security.
Source: BitSight Blog Read MoreBitSight’s newest risk vectors provides a comprehensive overview of your organisation’s security controls and policies.
Source: BitSight Blog Read MoreFrom an underwriting perspective, the lack of data on frequency, severity, and exposure makes it difficult for loss trends to be sufficient for cyber underwriting decisions.
Source: BitSight Blog Read MoreIt is crucial for VRM Programs to be dynamic and current in order for organisations to stay updated with vendors’ changing risk posture – but how?
Source: BitSight Security Ratings Blog Read MoreBitSight explains three cybersecurity policies your security team should ensure are in place and examine two of 2016’s largest cybersecurity threats.
Source: BitSight Blog Read MoreDoes disjointed monitoring through “swapping” and “slotting” actually proactively mitigate risk or just shift it around and hide it?
Source: BitSight Blog Read MorePreventing users from connecting to the enterprise network isn’t solving the problem of endpoint security – knowledge and awareness needs to be instilled.
Source: BitSight Blog Read MoreBitSight outlines 7 skills, traits, roles, and responsibilities necessary for a well-rounded cybersecurity team.
Source: BitSight Blog Read MoreLongtime Cyber Security executive Shaun McConnon will step down as BitSight CEO.
Source: Boston Business Journal Read MoreIn light of NotPetya, BitSight shares best practices security and risk teams should be aware of, and implications for organisations who fall behind.
Source: BitSight Blog Read MoreA notable consortium has demonstrated their commitment to supporting fair and accurate security ratings as a valuable part of any security risk management program. The consortium announced the creation of the “Principles for Fair and Accurate Security Ratings”, which is modeled on BitSight.
Source: BitSight Blog Read MoreOptiv Evantix Now Integrates with BitSight’s Security Ratings Platform to Give Organizations Increased Visibility into State of Third-Party Risk.
Source: Optiv Press Release Read MoreMore than 95% of all of the infected machines were running Windows 7. Dan Dahlberg, research scientist at BitSight shares his feedback.
Source: DARKReading Read MoreOne good thing about disasters is that we can learn from them and avoid repeating the same mistakes. Here are five lessons that the Yahoo breach should have taught us.
Source: DARKReading Read MoreWhile the criticality of continuous security monitoring cannot be understated, the process of building a successful continuous monitoring plan isn’t simple. These 5 components will give you a leg up.
Source: BitSight Blog Read MoreThe agreement between BitSight and Telefónica Cybersecurity Unit provides Telefonica customers with access to the BitSight Security Ratings Platform for security benchmarking and continuous supply chain risk management.
Source: BitSight Read MoreFind out how insecure systems put end users at risk of a cyber attack and affects the security of the corporate networks into which the devices connect.
Source: BitSight Blog Read MoreBitSight’s board member – Venky – explains how using BitSight’s Security Ratings can give visibility into a company or industry’s cyber hygiene.
Source: BitSight Blog Read MoreIf you’re involved in the cyber insurance underwriting process—from the transaction to the ongoing operations—you’re constantly looking for things to help you (and your team) select better risks. Here are three specific ways BitSight’s Security Ratings platform can play an integral role in the underwriting process.
Source: BitSight Blog Read MoreBitSight Technologies is on the Periodic Table of Cybersecurity Startups!
Source: CB Insights Read MoreSaks Fifth Avenue online customers were subjected to privacy vulnerabilities when their personal information, including email, phone numbers and IP addresses were visible via open WiFi networks.
Source: Retail Dive Read MoreBitSight’s Senior Data Scientist Jay Jacobs shares what can be learned from common vulnerabilities.
Source: BankInfo Security Read MoreBitSight analysed the security posture of some of the world’s largest organisations, and identified the most common system compromises.
Source: Help Net Security Read MoreBitSight is named one of the 20 Coolest SIEM And Threat Detection Vendors in CRN’s 2017 Security 100 list!
Source: CRN Read MoreA Data Breach Response Plan outlines every step you should take if you suspect your data has been compromised—and every company should have one.
Source: BitSight Blog Read MoreMany companies are trying to figure out what to do in light of the recent cyber attacks stemming from the MongoDB vulnerability. Here are some key steps that companies can take to mitigate the cyber risk of open ports.
Source: BitSight Blog Read MoreEverything you need to know about Security Ratings, answered in this BitSight Blog post.
Source: BitSight Blog Read MoreBitSight’s VP of Business Development shares with Forbes how important vendor security is to gaining trust between organisations.
Source: Forbes Read MoreRsam and BitSight customers will be able to gain more control over third-party risk. They will get deeper visibility into Security Ratings across their vendor population, enabling them to take immediate action to mitigate third party cyber risks.
Source: Marketwired Read MoreIn the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Stephen Boyer, CTO and co-founder of BitSight, about the recent DNS attacks against Dyn, and how CSOs can prepare their systems against future attacks.
Source: CSO Online Read MoreBitSight’s latest blog post explores the pros and cons of formal and informal IT and cybersecurity benchmarking for the modern CIO.
Source: BitSight Blog Read MoreMany large-scale cybersecurity failures like the one that resulted in Yahoo’s recently announced data breach happen because of carelessness of victim companies, cybersecurity expert Stephen Boyer told CNBC.
Source: CNBC Read MoreBitSight’s new capabilities provide alerts and visibility Into risk level changes within an entire portfolio of vendors.
Source: BitSight Read MoreThis outage illustrates how the impact of fourth party networks on organisations’ businesses today are highly interdependent. Many companies relied on Dyn in order to run their web services. BitSight’s comprehensive database of service provider relationships affords us a unique perspective on the tightly interconnected IT ecosystem that can help companies better manage such risks and avoid business disruptions and significant outages.
Source: BitSight Read MoreStephen Boyer, BitSight CTO, weighs in on the massive DDoS attack against DNS host Dyn.
Source: CNBC Read MoreForbes names BitSight Technologies a Next Billion Dollar Startup in its 2016 list!
Source: Forbes Read MoreBitSight Technologies announced $40 million in Series C funding on Thursday, money it said it would put toward its growing channel, product lineup and acquisitions. This latest round comes on the heels of a year of strong growth for BitSight.
Source: CRN Read MoreThe new funding will be used to support expansion and partnerships in new geographic markets, make strategic acquisitions, and accelerate product innovation.
Source: BitSight Press Release Read MoreMany of the highly publicized breaches in the last several years occurred simply because the companies did not follow basic best practices for IT vendor risk management. BitSight’s put together 12 tips and tricks to better organise IT vendor management best practices—and help you avoid being in the spotlight for embarrassing reasons!
Source: BitSight Blog Read MoreResearchers from Advisen and BitSight Technologies recently published a report that found a high percentage of healthcare organisations with security ratings below a “basic” level, indicating that a large number of healthcare organizations are challenged with malware events and malicious software.
Source: BRINK Read MoreIf you’re looking for some thought leadership in the information security space, searching #cybersecurity on Twitter isn’t going to give you clear advice or direction.
So BitSight’s put together a list of eight cybersecurity managers, influencers, and thought leaders you’re sure to gain some new insights and perspectives from daily.
According to the 2015 Global Cybersecurity Status Report from ISACA, only 38 percent of global organizations feel they are prepared for a sophisticated cyber attack. Companies need to be more proactive in their cyber security defenses, preparing for possible future issues. BitSight Technologies details 5 steps to how companies can become more proactive effectively.
Source: IT Business Edge Read MoreBitSight- the most experienced and trusted Security Ratings provider – announces a worldwide customer count surpassing 410 customers, record sales and rapid global expansion, to conclude the first half of 2016.
Source: BitSight Technologies Read MoreA chief information security officer (CISO) is a senior-level executive who wears many hats in the realm of cybersecurity—but is primarily responsible for translating complex business problems into effective information security controls.
Source: BitSight Tech Read MoreLockton – a leader in the cyber risk management market – team up with BitSight to offer BitSights’s Security Ratings to Lockton’s global clients.
Read MoreBitSight Discover for Enterprises is a new cloud offering that builds on its already powerful Risk Aggregation solution. The newest solution enhances vendor management techniques by identifying single points of failure in an organisation’s supply chain and automatically revealing the service providers used.
Source: Yahoo! Finance Read MoreBitSight reports that companies operating in Brazil pose the highest cyber risks for vendors and business partners due to poor security practices.
Source: Spend Matters Read MoreBitSight’s new Insights Report examines the security ratings of a random sample of 250 companies per country from the United States, the United Kingdom, Singapore, Germany, China and Brazil. The report is intended to inform risk managers and security professionals of the potential cyber risks that may arise when sharing data with partners and vendors across borders.
Source: BitSight Press Release Read MoreNetwork World discusses why buying cyber insurance may be a nightmare, and how insurers turn to risk-rating platforms like BitSight for help.
Source: Network World Read MoreAs little as four years ago, only about a third of companies considered cybersecurity when planning a merger. Today, that percentage has flipped. Why?
Source: CSO Online Read MoreAccording to the results of a recent NAVEX Global survey of 321 professionals involved in third-party management, 32 percent of respondents don’t evaluate third parties at all before engaging with them, almost half of respondents have no dedicated budget for third party risk management, and 11 percent of respondents don’t even know how many third parties they manage.
Source: eSecurity Planet Read MoreBitSight Technologies has released a new BitSight Insights Report that analyses Security Ratings of more than 35,000 companies across 22 different industries to uncover the vulnerabilities posed by fourth parties.
Source: BitSight Press Release Read MoreBitSight expands its product suite with BitSight Discover for risk aggregation aimed at cyber insurers.
Source: BitSight Press Release Read MoreBitSight Technologies, the leader and standard in Security Ratings, announces its 2015 momentum and milestones. The demand for BitSight Security Ratings in vendor risk management, performance benchmarking, and cyber insurance underwriting has driven the company’s tremendous sales growth and product innovation.
Source: BitSight Press Release Read MoreBusiness Insider finds out why 71-year-old retired Technology professional – Shaun McConnon – has decided to re-join the workforce as CEO of BitSight.
Source: Business Insider, Singapore Read MoreTechnology has enabled better content delivery in employee learning. But beyond better content delivery, how do we establish a learning continuum that is ingrained within company cultures? How can a culture of learning make it easier to scale? Braidio’s Co-founder offers his insights.
Source: LinkedIn Read MoreBraidio’s programmes are now available on QuickBooks with insights to support small businesses. The variety of resources include allowing SMBs to share experiences among themselves in effectively achieving an employee-driven economy.
Source: prweb Read MoreGenband and Braidio are integrating real-time communications capabilities powered by GENBAND’s Kandy Platform as a Service (PaaS) – ultimately delivering agile collaborative learning for enterprise workforces across the globe.
Source: prnewswire Read MoreThese 5 key trends in employee learning align with the lean, quick, and agile methodology companies need to survive in 2016 and beyond.
Source: trainingmag Read MoreCato Network’s Cloud-based Secure SD-WAN simplifies the deployment of enterprise networks, for a customer in the retail sector with more than 100 sites globally.
Source: Cato Networks Blog Read MoreSD-WAN promises to allow manufacturers to build a robust, affordable network connecting their factories and offices. But to reap the benefits of SD-WAN companies must pay even closer attention that they implement the necessary performance and security controls to meet business and compliance requirements.
Source: Manufacturing Business Technology Read MoreSD-WAN might have begun as a networking technology, but the SD-WAN’s future lies in security.
Source: Network World Read MoreViewQwest partners network and security expert Cato Networks to offer a Software-Defined Wide Area Network (SD-WAN) solution with embedded Firewall-as-a-Service (FWaaS) to protect its enterprise customers.
Source: Network World Asia Read MoreViewQwest partners network and security expert Cato Networks to offer a Software-Defined Wide Area Network (SD-WAN) solution with embedded Firewall-as-a-Service (FWaaS) to protect its enterprise customers.
Source: Tech Revolutionist Read MoreHow will SD-WAN connect to the cloud? SD-WAN technologies have different approaches to their ease of implementation with AWS, Azure and Google Cloud.
Source: Network World Read MoreLearn more about the networking challenges facing Office 365 and how you might solve them with Cato Networks.
Source: Cato Networks Blog Read MoreKeeping company data secure can get tricky when collaborating with remote employees and contractors. Here’s how AdRoll, a marketing platform provider, addressed that issue using Cato Networks.
Source: TechRepublic Read MoreWhile physical SD-WAN appliances may not be replaced anytime soon, they do range in functionality depending on how “thick” or “thin” vendors want these to be.
Source: sdx central Read MoreA new kind of inexpensive, high-quality, SLA-backed backbone is emerging; one that allows companies to finally overcome their MPLS dependency. The UberNet.
Source: IDG Connect Read MoreCato Networks beefs up its platform security with the launch a new Intrusion Prevention System designed to spot advanced threats as soon as they appear.
Source: Silicon Angle Read MoreCato Networks claims to be the first company to integrate an intrusion prevention system (IPS) to its SD-WAN offering.
Source: Channel Partners Read MoreIn reality, enterprise firewall vendors can’t easily adapt their appliances to become the basis of FWaaS. There are too many issues with core firewall operations that must be changed to meet the cloud’s requirements for multi-tenancy, scalability, and elasticity.
Cato Networks Blog Read MoreFWaaS isn’t merely packaging of legacy appliances into a managed service. It is challenging the decades-old concept of the appliance as the primary form factor to deliver network security capabilities.
Source: The Hacker News Read MoreThe new generation of network infrastructure is driven by many key factors including eliminating appliance sprawl, readiness to provide new applications and financial aspects.
Techno FAQ Read MoreCato Networks details steps your organisation can take against the latest malware wrecking havoc…NotPetya.
Source: Cato Networks Blog Read MoreFWaaS is a cloud-based architecture that eliminates the need to deploy firewalls on-premises, mainly in remote branches, in order to provide site-to-site connectivity and secure Internet access.
Source: Cato Networks Blog Read MoreSD-WAN is a new and cost-effective way of connecting offices and staff across geographic locations. Enterprises that are burdened with the transition from traditional infrastructure to the cloud should consider SD-WAN.
Network World Read MoreCato’s converged SD-WAN and network security stack in the cloud reduces appliance sprawl, cuts global WAN costs, and gets named as Gartner’s Cool Vendor Security for Midsize Enterprises.
Source: Marketwired Read MoreCato Networks’ survey highlights continuous MPLS investment despite plans for SD-WAN adoption; security concerns present a significant barrier.
Source: Marketwired Read MoreWhen deploying an SD-WAN solution, an organisation must take a close look at how security will be handled.
Source: Techopedia Read MoreWhat’s it like to use an SD-WAN service with built-in malware prevention, next generation firewalling (NGFW), secure web gateway (SWG) and more? Check out this hands-on review of the Cato Cloud by The Hacker News.
Source: The Hacker News Read MoreCheck out the review of Cato Networks by the analysts over at Expert Market Insights (EMI).
Source: Cyber Sec Buzz Read MoreWe don’t need strategies that attempt to “patch” the carrier MPLS cash cow. What the carriers could use is a whole new fabric built for the cloud-centric enterprise that reduces costs and maximises customer value delivery.
Source: LinkedIn Read MoreShlomo Kramer, founder of Check Point and Imperva, is at it again. This time with revolutionary secure cloud networking solution – Cato Networks.
Source: Forbes Read MoreIt’s true that SD-WANs probably won’t reduce your WAN costs by 90 percent or make WANs so simple a 12-year old can deploy them. But there are plenty of tangible reasons to be genuinely excited about the technology.
Source: Cato Networks Blog Read MoreThe Cato Cloud is the industry’s first universal WAN – one globally optimised WAN service connecting all enterprise locations, mobile users, and physical and cloud datacentres.
Source: Marketwired Read MoreCato security researchers have determined the current version of the attack attempts to exfiltrate user credentials to a website – already categorized as “malware”. Yet, some reputation services did not categorise the exfiltration domain as malicious at the time of this writing.
Source: Infosecurity Magazine Read MoreA number of security stories occupied the topics of conversation among researchers at the Cato Research Labs.
Read MoreThe SD-WAN concept needs further refinement before becoming a fully viable replacement for MPLS.
Source: Innovation Enterprise Read MoreCato Networks makes it on the list of 10 Security Startups to watch at RSA US 2017.
Source: Network World Read MoreThe Cato Cloud makes the list of CRN’s 10 Innovative New Networking Products That Are Turning Heads.
Source: CRN Read MoreCato Cloud Drives WAN Transformation by Converging Networking and Security into the Cloud.
Source: Cato Networks Read MoreHistorically, service providers either managed or hosted various parts of a customer infrastructure in their facilities, creating a perception of cloud but still relying on the same underlying technology. As a result, the cost of services remained high and agility stayed low. What ensures a true, total and effective move to the cloud?
Source: ITProPortal Read MoreThere are all sorts of ways to curb ransomware, so why has it spread so successfully? Gur Shatz – CTO of Cato Networks – shares why.
Source: Dark Reading Read MoreCato Networks has expanded its leadership team in APJ and EMEA by hiring Stree Naidu and Alon Alter.
Source: ComputerWorld Singapore Read MoreCato Networks, provider of software-defined and cloud-based network with built-in enterprise security, has expanded its leadership team in APJ and EMEA and Japan by hiring Stree Naidu and Alon Alter.
Source: CIO Asia Read MoreWith plans to add more remote branches in the New Year, Blender decided it was time to shed management and maintenance of firewall appliances and move to centralized network provisioning and security. So they turned to Cato for the solution.
Source: Cato Networks Blog Read More2017 prediction: Security shall networking become.
Source: Network World Read MoreCato Networks shares their most viewed assets of 2016…
Source: Cato Networks Blog Read MoreExabeam is named one of the Top 20 Cybersecurity Leaders of 2016 by Cyber Defense Magazine.
Source: Cyber Defense Magazine Read MoreAccording to Gartner, nearly half of large enterprises will have hybrid cloud deployments by the end of 2017.
Source: ITProPortal Read MoreCato Networks’ latest survey shows 41 percent see FWaaS as the most promising infrastructure protection technology; 50 percent plan to eliminate hardware in 2017.
Source: Cato Networks Blog Read More“The only way forward is a radical simplification of the current infrastructure complexity that underpins on-premises and cloud environments.” Shlomo Kramer, founder and chief executive of Cato Networks says.
Source: silicon ANGLE Read MoreCato Networks today announced the results of its global networking and security survey, Top Networking and Security Challenges In the Enterprise; Planned Network Investments in 2017. Over 700 IT professionals from around the world shared their priorities and concerns for network and cloud security. Topics covered by the report range from the increasing cost and complexity of managing enterprise networks to defending against emerging threats such as ransomware.
Source: Marketwired Read MoreIs your WAN ready for the Cloud? Cato Networks shares what to take into consideration when deciding.
Source: SD-WAN Experts Read MoreGone are the days when it was simple and effective to connect remote sites with a perimeter firewall, or backhaul traffic to a datacenter to keep companies secure and functional. Standard network and security measures are no longer adequate to support modern business needs…that is until Firewall-as-a-Service.
Source: Cato Networks Blog Read MoreWith all 12 branches connected via MPLS, UMHS soon found that MPLS as simply too expensive to deploy in all 12 locations. Read on to find out the challenge UMHS faced and what Cato Networks did to help this organisation.
Source: Cato Networks Blog Read MoreThe Cato Research Labs team noticed that Cato’s security analytics engine was triggered by a request to a code sharing service, called Pastebin. The request originated from a preschool website in Singapore. While this may be nothing more than an eCommerce scam, the same method can be used to deliver malware through exploit kits that can put end users at a much higher risk.
Source: Cato Networks Blog Read MoreCato provides a guaranteed, SLA-backed latency. Our cloud network relies on tier-1 carrier links and has self-optimization capabilities to dynamically identify optimal routes and eliminate packet loss.
Source: Cato Networks Blog Read MoreThis round of funding will allow Cato Networks to accelerate customer adoption of networking and security in the cloud.
Source: Reuters Read MoreA Cato customer shares how Cato has addressed the immediate business need of his organisation, on time and under budget, with a platform that can further optimise his organisation’s networking and security infrastructure.
Source: Cato Networks Blog Read MoreWith global organisations setting up multiple offices, employing appliance-based network security is becoming a real challenge. Cato discusses further this increasing move to “Firewall-as-a-Service” and key characteristics of FWaaS to look out for when going for one.
Source: Cato Networks Blog Read MorePrevention and Detection technologies – either alone is not enough, but both together is tough to handle. How do we find that “perfect balance” when adopting both prevention and detection technologies to secure our network successfully? CTO of Cato Networks – Gur Shatz – divulges.
Source: Infosecurity Magazine Read MoreThe network of the future and its capabilities must align with the “one-ness” view of a cloud service: available anytime, everywhere, seamlessly updated and scaled on demand. For this, a totally new application has to be built and Cato Networks is the answer.
Source: Cato Networks Blog Read MoreAs the enterprise infrastructure landscape evolves with the increased usage of public Cloud applications (SaaS), there is a need to align network security with this in the form of Network Security as a Service(NSaaS). And when we think about putting network security in the Cloud, we start with the firewall.
Source: Cato Networks Blog Read MoreWith the traditional network perimeter basically dissolved, Cato Networks has built a new perimeter in the cloud, offering network security as a service across all enterprise entities.
Source: Network World Read MoreSecurity Entrepreneur and Founder Shlomo Kramer’s track record and the growing popularity of cloud-based security services gives Cato a seat in a hot market. The company serves up traditional security platforms – next-generation firewalling, URL filtering, application control and VPN access – in its cloud. Its willingness to license its technology to other service providers opens up a potentially large and steady revenue stream.
Source: Network World Read MoreEvaluating your Network Security Vendors are extremely crucial and asking questions such as: Is my vendor well positioned to support my business? and Do I want to own the solution? would very well guide you through this thought process.
Source: Cato Networks Blog Read MoreCato Networks was recently featured in the April 2016 issue of Post Magazine, a publication of Hong Kong’s South China Morning Post Group.
Source: Post Magazine Read MoreShlomo Kramer, who co-founded Check Point Software, raised $20 million in a series A funding round for Cato Networks late last year, a startup venture aimed at redefining how enterprises secure their networks and mobile devices. His elevator pitch: “Network security is simple again.” Now Kramer is up and running in the cloud.
Source: Forbes Read MoreCato Networks is one of the most disruptive startups in the global ecosystem to date. Bizety considers them revolutionaries because they are refusing to co-exist with the legacy way of doing things. Instead, these radical gamechangers are challenging the largest incumbents in the world. As a result, they are forcing change in the WAN, CDN and Security industries, as they all converge into one shared sector.
Source: Bizety Read MoreCato Networks recently launched its cloud-based and enterprise grade secure network offering in Hong Kong, with bold plans to disrupt the current cybersecurity market.
Source: South China Morning Post Read MoreNetwork security provider Cato Networks (Cato) has launched Cato PartnerCloud, a new channel partner program for the company’s network security as a service (NSaaS) solution, Cato Cloud.
Source: ChannelProNetwork Read MoreCato Networks announced today the launch of the CatoPartnerCloud, a new channel partner program to meet the growing demand for Cato’s network security as a service (NSaaS) solution.
Source: Cato Networks Press Release Read MoreShlomo Kramer tells the true tale of a ransomware attack.
Source: Seccurity Week Read MoreThe Fusion of Network, Security and the Cloud.
Source: Cloud Computing Magazine Read MoreThe inaugural CRN Security 100 list includes network security vendors that offer next-generation firewalls, Internet of Things security, network visibility, cloud security and more.
Source: CRN Read More“The key is how do you bring simplicity back,” said our co-founder and CEO, Shlomo Kramer, in a recent interview with CNBC’s Ari Levy.
Source: CNBC Read MoreBusinesses relying on security appliances will be likely customers because the service will enable them to unplug expensive MPLS and pull out UTM devices, firewalls and even WAN accelerators
Source: CIO Read MoreKey features: The Cato Cloud includes the Cato Cloud Network, a global, geographically distributed network of PoPs, and Cato Security Services, a full suite of network security capabilities delivered through the cloud.
Source: NETWORKWORLD Read MoreStartup Cato Networks, which emerged from stealth mode, is building a cloud-delivered security-as-a-service technology.
Source: eWeek Read MoreDoes your training give you insight into a growing business opportunity? If so, these four ideas might help you build a fortune.
Source: Inc.com Read MoreCato Networks, which is rethinking network security from the ground up and into the Cloud, has raised $20 million in a series A funding round.
Source: GlobalNewswire Read MoreExabeam is recognised for next-generation innovation for the second consecutive year.
Source: Nasdaq Global Newswire Read MoreDerek Lin, Chief Data Scientist at Exabeam explains why adopting a people-centric approach to network security can significantly reduce the risk of breaches
Source: Information Security Buzz Read MoreIn this blog, Exabeam’s Chief Data Scientist shares how Exabeam can use machine learning to reduce false alert rate and improve Insider Threat Detection.
Source: Exabeam Blog Read MoreA new variant of the infamous Locky ransomware has been detected in the wild rapidly infecting computers in a massive new phishing campaign, according to newly published research.
Source: Silicon Angle Read MoreExabeam is named as one of the major players in the Global User And Entity Behavior Analytics Market Report.
Source: Blackbird SAT PRNews Read MoreWhether you’re Lord Commander of the Night’s Watch or the CISO of a mainstream business, it’s not easy to defend against a constantly evolving threat that is as deadly as an army of White Walkers.
Source: Dark Reading Read MoreThe ability to detect and respond to threats is greatly impeded by a lack of cybersecurity skills and staff. Leading organisations offer a few suggestions.
Source: CSO Online Read MoreChief Data Scientist at Exabeam explores how behavioural analytics can help to uncover cyber security threats hiding in big data.
Source: Digitalisation World Read MoreHow do you identify whether there is an actual risky incident occurring, or just a set of coincidences and false positives?
Source: Help Net Security Read MoreUEBA and machine learning technology provide CISOs with the accurate insights they need to thwart attacks before severe damage is done.
Source: Third Certainty Read MoreExabeam’s Chief Data Scientist explains why adopting a people-centric approach to network security can significantly reduce the risk of breaches.
Source: Finance Digest Read MoreDirector of Threat Research at Exabeam – Barry Shteiman – shares more about UEBA with CBR.
Source: CBR Online Read MoreThis blog post seeks to define and explain some common acronyms involved in today’s security management landscape.
Source: Exabeam Blog Read MoreWith nearly 85% of data breaches going undetected, efficient prevention such as Exabeam UEBA solutions provides a modern approach to face the evolution of cyberattacks.
Source: CBR Online Read MoreWith the cloud, borders blur – so how do organisations protect data, wherever it is?
Source: CloudPro Read MoreThe consequences of insider threats to critical infrastructure operators are much greater than in many other sectors because of the potential for actual physical harm from compromised control networks.
Source: Exabeam Blog Read MoreChief Data Scientist Derek Lin explains how Exabeam uses HDFS and Spark to process activity data and detect anomalous behaviour.
Source: Exabeam Read MoreExabeam’s Chief data scientist argues that a new richer era of computational power is here, where the ‘conventional’ monolithic learning frameworks and their algorithms will not serve our IT protection needs today.
Source: Forbes Read MoreOrganisations need to augment antivirus protection with behavioural analytics, artificial intelligence and other technologies to stitch together a more robust defense.
Source: Computer World Read MoreLearning to screen out repeated alerts as false positives allows analysts to focus their finite time where it matters most. Exabeam shows you how.
Source: Exabeam Blog Read MoreThe buyer of a new SIEM must evaluate products using different factors or else be stuck with a system that doesn’t deliver value.
Source: Exabeam Blog Read MoreKnown (and trusted) insiders can pose an even bigger security threat than faceless hackers. Learn how to reduce associated risks with Exabeam’s CEO – Nir Polak.
Source: Tech Republic Read MoreLeaders in Behavioural Analytics and Endpoint Protection Provide Comprehensive Protection.
Source: Marketwired Read MoreWith the Target example as the high-water mark, enterprises need to worry about the lack of security on the part of third-party providers that have access to internal systems.
Source: CSO Read MoreThe 5-Star Partner Program Guide rating recognizes an elite subset of companies that offer solution providers the best partnering elements in their channel programs.
Source: Yahoo Read MoreSecurity experts weigh in on stopping the danger from your own employees.
Source: CSO Online Read MoreSecurity professionals face 2 opposing dilemmas – scarcity of data events that leave them in the dark as to whether their systems have been breached, or an overwhelming amount of data that leaves them hard-pressed to identify actual attacks. Cognitive computing could provide a solution.
Source: TechBeacon Read MoreAttacks have evolved significantly calling the need for drastically improved security tools such as Artificial Intelligence to take on modern cyber attacks.
Source: The Hill Read MoreHave you added some “Exabeamium” to your mix?
Source: CB Insights Read MoreCurrent SIEM systems have flaws. Here’s how the SIEM’s role will change as mobile, cloud, and IoT continue to grow.
Source: Dark Reading Read MoreThis post presents Exabeam’s analysis of key findings in CyberEdge’s 2017 Cyberthreat Defense Report.
Source: Exabeam Blog Read MoreExabeam honoured as one of CRN’s top security tech suppliers for the second consecutive year!
Source: Marketwired Read MoreGreat new blog post by Exabeam’s Chief Data Scientist Derek Lin on how we can use machine learning to enhance the detection signal from first time abnormal behaviours.
Source: Exabeam Blog Read MoreExabeam announces that its Advanced Analytics product won the award for Best Emerging Technology at the 2017 SC Magazine Awards.
Source: Yahoo Read MoreExabeam co-founder Sylvain Gil chats with Risky Biz on Exabeam’s roadmap in terms of problems Exabeam is trying to solve.
Source: Risky Biz Read MoreExabeam’s VP of Worldwide Channels and Corporate Development Sales is named a 2017 Channel Chief by CRN!
Source: CRN Read MoreExabeam announced today that Cyber Defense Magazine, the industry’s leading electronic information security magazine and media partner of the RSA® Conference 2017, has named Exabeam Advanced Analytics winner of the Editor’s Choice in User Behaviour Analytics.
Source: Marketwired Read MoreExabeam is “going right after the heart” of the SIEM market.
Source: Fortune Read MoreLightspeed Venture Partners and Cisco led a Series C round for Exabeam, which applies automated Big Data technology to detect, analyze, and respond to cyberthreats. With the latest funding announced Tuesday, the company has now raised about $65 million in total.
Source: Silicon Valley Business Journal Read MoreThe Exabeam Security Intelligence Platform includes five products: Exabeam Log Manager, Exabeam Advanced Analytics, Exabeam Incident Responder, Exabeam Threat Hunter and Exabeam Cloud Connectors. Combined, CEO Nir Polak said the products move Exabeam beyond what he called a “SIEM helper” to be a SIEM (security information and event management) replacement.
Source: CRN Read MoreExabeam Leverages UEBA Experience to Launch New Next-Generation Security Intelligence Platform.
Source: SecurityWeek Read MoreSIEM was broken and the opportunity to make something massively better was clear… with Exabeam’s Security Intelligence Platform.
Source: Exabeam Blog Read MoreThe Top Barriers to Effective Incident Response, by Exabeam’s own IR expert and security researcher, Ryan Benson.
Source: Dark Reading Read MoreAs if holding your data hostage and seeking cash payment weren’t harsh enough, security experts foresee the next stage of ransomware to be even worse.
Source: CSO Read MoreRansomware increasingly hits businesses, hospitals, public utilities, public transit systems and even police departments.
Source: CIO Read MoreExabeam is named one of the Top 20 Cybersecurity Leaders of 2016 by Cyber Defense Magazine.
Source: Cyber Defense Magazine Read MoreIntel Security recently discussed its research report on how SOCs work in enterprises today, with a writeup in HelpNetSecurity. They interviewed 400 security practitioners and found some interesting stats.
Source: Exabeam Blog Read MoreBarry Shteiman, director of threat research at Exabeam, completed an analysis of ransomware and looked at more than 80 strains. “We need behavioral modeling and automated techniques to tackle this problem,” says Shteiman.
Source: TechCrunch Read MoreWith Exabeam 3.0, enterprises can now perform the same level of behavioural analysis on the entities within their networks as they do with human behaviour, including the ability to detect when the accounts (service accounts, system accounts, etc.) of those devices are being hijacked and used for malicious purposes.
Source: Marketwired Read MoreMany think that a SIEM is a requirement for a modern SOC. Yet in recent years, new product categories like User and Entity Behavior Analytics (UEBA), are increasingly including much of the functionality expected of a SIEM. More specifically, solutions like Exabeam, have made it possible to run a highly functioning SOC without the need to invest in a SIEM.
Source: Exabeam Blog Read MoreCorporations are increasingly finding themselves the targets of advanced ransomware campaigns. This post explores some of the challenges security teams may face when trying to use SIEM correlation rules to identify activities associated with a ransomware infection.
Source: Exabeam Blog Read MoreIn a new report titled “Threat Research Report: Anatomy of a Ransomware Attack,” Exabeam offers tips to healthcare organizations stung by the persistent pounding of ransomware. To help guide its recommendations for handling a ransomware infection, Exabeam said it detonated various strains of malware in its tech lab and recorded the effects.
Source: Healthcare IT News Read MoreSC Magazine reviews Exabeam’s Threat Hunter tool and finds it easy to use yet detailed enough, and has the most impressive approach to cyberthreat analysis they have seen.
Source: SC Magazine Read MoreJudged by 100 CIOs, IT directors, and heads of data centers and security from the Asia Pacific region, Exabeam takes home the coveted win of best vendor in the Most Promising User Behaviour Analytics Solution category of the Network World Asia Information Management Awards 2016.
Source: Network World Asia Read MoreExabeam, a market leader in user and entity behavior analytics (UEBA), today announced its partnership with FireEye, as a member of the FireEye® Cyber Security Coalition (CSC). The Exabeam platform makes full use of the output of FireEye’s leading security technologies, to build comprehensive pictures of user activity.
Source: Marketwired Read MoreExabeam’s Analytics for Ransomware uses the company’s existing behaviour analytics technology to detect ransomware infections just shortly after they occur. By using data from a company’s existing logs to build behaviour profiles, previously unknown ransomware without pre-existing detection signatures is easily detectable.
Source: CIO from IDG Read MoreExabeam’s new ransomware application, Exabeam can provide significant early detection across the corporate network, in the absence of third party security controls. Unlike other security products, Exabeam can detect ransomware movement and activity in the network, the servers, workstations, BYOD devices, and cloud services.
Source: Exabeam Press Release Read MoreExabeam is recognized in the Most Innovative Cybersecurity Company category, for demonstrating innovation and leadership in information security.
Source: Marketwired Read MoreLeading organizations are investing in new controls for sensitive data protection
Source: NETWORKWORLD Read MoreExabeam is working to “put the brain on SIEM” technology, using user behavior analytics to build patterns and pinpoint behavior that is out of the ordinary.
Source: CRN Read MoreExabeam, the cyber security company specialising in user behaviour analytics (UBA), is expanding its channel programme and presence in Asia Pacific.
Source: Channel Life AU Read MoreExabeam, the provider for user behaviour analytics (UBA) in security, has expanded its channel programme as part of a growth strategy for the Asia Pacific region.
Source: TechTrade Asia Read MoreTechnology and network security expert Harjith Prabhakaran appointed to role of Product Director for region
Source: PC World Read MoreExabeam’s platform uncovers APT attacks using big data science to alert security teams to suspicious user behavior even if they change locations, devices or logins.
Source: eWeek Read More“Incorporated in 2013, Exabeam is a leader in the User Behavior Analytics market, one of the fastest-growing segments
within computer security.”
The executives on this annual list represent top leaders in the IT channel who excel at driving growth and revenue in their organizations through channel partners.
Source: Exabeam Press Release Read MoreExabeam’s UBA solution leverages existing log data to quickly detect advanced attacks, prioritize incidents and guide effective response.
Source: IT Wire Australia Read MoreIBM Beacon Awards recognize select Business Partners for delivering advanced IBM solutions to bring clients into the cognitive era
Source: Exabeam Press Release Read MoreBehavioral Search Solution Empowers Any Security Professional to Identify and Stop Cybercriminals
Source: Exabeam Press Release Read MoreMarket demand somewhat muted by market confusion.
Source: NETWORKWORLD Read MoreCompany Extends Leadership Position Within Red-Hot User Behavior Analytics Market
Source: Exabeam Press Release Read MorePredictions each day from industry experts offering insight and thoughts for the next 12 months in 2016.
Soure: Infosecurity Magazine Read MorePalo Alto will integrate LightCyber technology into its Next-Generation Security Platform.
Source: Dark Reading Read MoreThe addition of LightCyber to Palo Alto can help prevent exfiltration of data, connecting to command and control servers.
Source: Network World Read MoreQualified Service Assessor (QSA) consulting firm, HALOCK Security Labs, has concluded that the LightCyber Magna™ platform meets the Payment Card Industry Data Security Standard (PCI DSS) intrusion detection Requirement 11.4 based on their testing of the product.
Source: LightCyber Press Release Read MoreTo make security great again, we must augment the best preventive security with detection capabilities that can catch an attacker red-handed at an early stage, before damage can occur.
Source: Market Watch Read MoreWe are all familiar with the security model of “known bad” – that is the idea that threats have identifiable signs to them that can be flagged to stop the particular exploit. But in this increasingly complex online environment, should we also start paying more attention to the “known good”?
Source: Techspective Read MoreKasey Cross discusses the importance of having the ability to see active attackers on your network at work.
Source: SC Magazine UK Read MoreLightCyber, announces its latest release of its Magna™ platform that increases the precision and speed of detecting an in-progress attack from a malicious insider or external targeted bad actor. The Magna 3.5 release adds enhanced visibility of user credential use and more granular Virtual Private Network (VPN) intelligence so attackers can be detected even more efficiently and accurately.
Source: LightCyber Read MoreFD Mediagroep uses LightCyber Magna to constantly stay ahead of threats. Watch the video interview with the Security Manager of FD Mediagroep.
Source: LightCyber Read MoreThe VP of Information Security at PDX and his team originally considered 15 different products, but narrowed the competitive field to four products which he evaluated in the PDX network to learn what they could discover. Only LightCyber Magna offered the deep visibility of the network combined with on-demand agentless endpoint visibility they were looking for.
Source: LightCyber Press Release Read MoreWith traditional security, a data centre is always vulnerable to an attack. By taking a new behavioural-based approach, attackers can be caught early before they can achieve their end goal—finding and stealing or destroying valuable data in the data centre.
Source: Computer Business Review Read MoreCloud-based workloads may be configured and used for different scenarios than on-premises servers, but the process of picking out cybercriminal activity is not so far removed. What are the telltale signs of penetration to look for?
Source: CSO Read MoreTo monitor and secure deployments in the public cloud, LightCyber is extending support of its award-winning Behavioral Attack Detection platform to AWS data centers.
Source: LightCyber Blog Read MoreRapidly changing malware is often blamed for businesses’ inability to spot telltale malicious code until it’s well ensconced on the network, but a new study suggests that the challenges of spotting that malware may stem from attackers leaning heavily on otherwise legitimate network tools to extract data from their victims’ networks.
Source: CSO Read MoreThe Cyber Weapons Report 2016 from LightCyber Inc issued today catalogues the top ten weapons used in various categories of cyber-attack, however its main thrust is that once an attacker is on your system, they rarely use malware and what you need to monitor is anomalous behaviour using legitimate tools.
Source: SC Magazine UK Read MoreContinuing on from CRN’s list of Top 100 Executives of 2016, comes the Top 25 list of Technology Disrupters, named on the basis of those who lead the charge beyond traditional IT challenges and revolutionise the market. LightCyber CEO – Gonen Fink – is named one of them.
Source: CRN Read MoreCRN’s annual Top 100 executives honors the best and brightest execs pushing the technology envelope in 2016, those leaders who not only recognise problems and opportunities, but identify the right people and products to conquer them. In the latest CRN’s Top 100 Executives of 2016, Gonen Fink is listed as one of them under the Top 25 Disrupters of 2016.
Source: CRN Read MoreNew integration of LightCyber Magna and Ayehu eyeShare thwarts targeted and opportunistic ransomware from network servers and End-user computers.
Source: CIO Today Read MoreAlmost all (99 percent) post-intrusion cyber attack activities don’t employ malware, but leveraged standard networking, IT administration and other tools, according to LightCyber’s Cyber Weapons Report 2016.
Source: CIO Asia Read MoreLightCyber’s new Cyber Weapons Report 2016 reveals that attackers do not typically utilise malware once inside the network. Instead, attackers may leverage ordinary end-user programs for command and control and data exfiltration activity. The most mundane applications, in the wrong hands, can be used for malicious purposes.
Source: Networks Asia Read MoreLightCyber’s Cyber Weapons Report 2016 found that while malware is the go-to tool for the initial compromise of a network, almost all (99%) of post-intrusion cyberattack activities use standard networking, IT administration and other tools to get the job of exfiltration, snooping and sabotage done.
Source: InfoSecurity Magazine Read MoreWith the success of a 20 million investor funding, LightCyber plans to ramp up its marketing and sales activities to meet the global demand for Behavioural Attack Detection solutions.
Source: Business Wire Read MoreLightCyber launches the Technology Alliance Program that allows channel partners to integrate the LightCyber Magna behavioral attack platform with other ecosystem security products via a new API. Not only will this add value to the partner’s security line card, it will also create new services for managed and consultative services.
Source: Channel Insider Read MoreThe CEO of LightCyber shares a new approach focusing on the ‘known good’ in networks, that allows organisations to gain a vantage point over network attackers for the first time.
Source: ITProPortal Read MoreIn a video interview with eSecurity Planet, the CEO of LightCyber, discusses how he has built LightCyber to fill an important gap in the security landscape.
Source: eSecurityPlanet Read MoreWith a reported 17,000 malware alerts on a weekly basis, organisations are struggling to tend to every one of them. LightCyber eases this burden by cutting through the clutter to lay out the entire story behind a relevant alert so that organisations can respond quickly, accurately and efficiently.
Source: Network World Read MoreLightCyber is upgrading its endpoint detection and remediation platform so when it discovers bad behaviour on the network it can also identify the machine and exact process that’s causing it, then shut the malware down.
Source: Network World Read MoreThe new Attack Detection Metrics sets a new standard for assessing accuracy and efficiency of security offerings, providing an objective benchmark for detecting stealth attackers operating within enterprise networks.
Source: LightCyber Press Release Read MoreThe SIEM and threat detection vendors on CRN’s inaugural Security 100 list are all looking bring a piece of that market opportunity to their partners, with a range of traditional, next-generation and just downright cool solutions.
Read MoreLightCyber opens Asia Pacific and Japan headquarters in Singapore and establishes sales, marketing and technical resources. Yusuke Sakurai has been appointed to lead regional product and technical selling initiatives and will work closely with channel partners.
Source: Digital News Asia Read MoreThe LightCyber Magna appliance is reasonably priced. There is full support with the subscription license. We found that LightCyber has gone to a lot of trouble to provide white papers, case studies and videos. Support is solid and available through the web portal. If you are looking for a companion to your firewall or SIEM, this is a very good product to consider.
Source: SC Magazine Read MoreLightCyber has recently opened its Asia Pacific headquarters in Singapore; and is expanding its LightCyber Channel Alliance Programme (LCAP) across the region to equip and empower security channel partners.
Source: MIS Asia Read MoreMagna uniquely combines network deep packet inspection, agentless endpointinterrogation, and user context into a single integrated detection domain to pinpoint active attackers on a network – an architectural approach specifically referenced in each of the market guides.
Source: LightCyber Press Release Read MoreMagna platform’s new User-based detection features complement the existing Network and Endpoint Device capabilities, resulting in the broadest behavioral anomaly detection platform in the industry with the highest alert accuracy and operational efficiency for security analysts.
Source: LightCyber Press Release Read MoreThe recent expansion of its behavioral attack detection capabilities to Magna platform 3.1 is richer than previous versions and provides information and tools to make any malicious behavior alerts actionable, including a malicious file terminaion (MFT) feature which allows systems to terminate malicious activity generating processes.
Source: eWeek Read MoreProcess Street is a powerful project management tool that has a great tool for checklists. Mod Girl Marketing regularly uses their checklist tool to focus on recurring projects and procedures.
Source: Mod Girl Marketing Read MoreEvery business needs an organisational chart for it to scale consistently with a clear view of its structure. We show you the tools you can use to easily build one.
Source: Process Street Read MoreAustralia’s leading venture capital firm funds Business Process Management software – Process Street – in its seed round.
Source: The Tech Portal Read MoreFrom defining work processes into a checklist, to automating certain aspects of tasks – Process Street is a workflow tool that makes your company’s workflow, work.
Source: MWD Advisors Read MoreQuickMobile, today announced the launch of Live Insights, an advanced real-time audience response solution that allows presenters to engage with audiences in a completely new way.
Source: QuickMobile Press Release Read MoreQuickMobile, the global leader in enterprise mobile meeting and event apps, today announces a strategic shift towards meaningful attendee engagement, empowering companies to personalize attendee journeys and interactions, and attendees to collaborate and take action at the right time.
Source: QuickMobile Press Release Read MoreQuickMobile picked up two awards at the 2015 Event Technology Awards, an annual event hosted in London by Event Industry News. The awards – for Best Event App and Best Use of Gamification – were earned based on QuickMobile’s leading-edge mobile deployment for Danone UK’s Connect Live internal kickoff event.
Source: QuickMobile Press Release Read MoreQuickMobile, the global leader in enterprise mobile meeting and event apps, today released a new user interface for its mobile app and analytics platform.
Source: QuickMobile Press Release Read MoreFor the third straight year, QuickMobile is named as one of Canada’s fastest growing technology companies in the 18th annual Deloitte Technology Fast 50™ awards.
Source: QuickMobile Press Release Read MoreThe eventual AACRT app was well-received by conference attendees. It was used actively and gave SSR a whole new dimension of event data analytics useful in planning their next event.
Source: BizEventsAsia Read MoreQuickMobile’s CEO predicts events will go paperless in three to five years.
Source: TTGmice Read MoreQuickMobile expands into Asia Pacific and appoints a regional team in Singapore.
Source: QuickMobile Press Release Read MoreWaitrr aims to provide a seamless dining experience for its users, allowing them to order and pay for their meals quickly and easily through the app.
Source: Vulcan Post Read More