New York, NY, Jan. 22, 2024 —  Memcyco Inc, the real-time digital impersonation detection and prevention solution provider, and Deloitte, the leading consulting, advisory, and audit services firm, today announced their strategic partnership in the cybersecurity sector.

The partnership enables Deloitte to extend this range of solutions offering customers Memcyco’s industry-leading anti-impersonation software. The solutions will be offered globally in regions such as the EMEA, LATAM, USA, and others.

Deloitte and Memcyco’s pivotal collaboration combines the former’s consulting expertise with the latter’s cutting-edge platform for detecting and preventing digital impersonation fraud in real time. This alliance will elevate fraud prevention to a new level, helping government organizations, enterprises, and brands protect themselves from damage and safeguard their reputations from being tarnished through attacks that use phishing sites to target their customers.

By virtue of their partnership, Memcyco and Deloitte will leverage additional solutions related to integration and cooperation, such as Deloitte’s Strategic & Reputation Risk Services. This multidisciplinary synergy ensures a holistic response to threats, capitalizing on each organization’s area of expertise and accumulated experience, thus offering more robust and complete solutions to clients.

Memcyco provides a platform for real-time detection, protection, and response to online impersonation attacks, whereby malicious actors use phishing, smishing, and other techniques to direct customers to fake pages that look and feel much like the real thing. These attacks trick users into giving up their personal data, such as login credentials and credit card information, which is subsequently used for ATO (account takeover) and other online attacks, leading to data breaches, theft of funds, and ransomware.

Unlike other solutions, Memcyco is singularly able to safeguard the “window of exposure” between when a fake website goes live and when the attacker attempts to use stolen data to access company web pages, using real-time alerts to warn users not to trust the spoofed site, as well as tracking attacker and victim activity. Addressing this window is crucial for organizations to be able to protect themselves from data breaches, financial losses, and reputational damage while protecting their customers from identity theft and financial harm.

Memcyco also provides organizations with full insight into attacks, including a list of all victims. This data not only gives the organization improved visibility, but also helps risk engines to predict fraud more accurately, thereby significantly decreasing remediation costs.

Mazin

“Memcyco is delighted to build a partnership with Deloitte due to its dedicated team, expertise, and innovation capabilities,” said Israel Mazin, CEO of Memcyco. “Our shared commitment to empowering organizations to make informed decisions about their cybersecurity strategy is at the heart of our collaboration. In the long term, this partnership will pave the way for organizations of all sizes to mitigate impersonation and brandjacking attacks and to gain more trust from their customers.”

Memcyco will showcase its solutions at the third annual Deloitte Cyber iCON event in Spain on Jan 23, 2024. Cyber iCON allows businesses to gain first-hand knowledge about the most prevalent and sophisticated cyber threats they face today. Attendees will be able to learn about the latest strategies and countermeasures they can employ to safeguard themselves against advanced threats via real-world, interactive scenarios. Memcyco’s representatives will join Deloitte’s experts on-stage to discuss the dangers presented by digital impersonation and to introduce businesses to their comprehensive solution for mitigating such risks. Memcyco will also participate in a joint panel discussion and presentation alongside Deloitte’s expert cybersecurity consultants.

About Memcyco: Memcyco provides real-time digital impersonation detection, protection and response solutions to companies and their customers. Their real-time, agentless solutions are unique in fully safeguarding the critical “window of exposure” between when a fake site goes live and when an attacker attempts to use stolen data to access company web-pages. Memcyco alerts users who visit fake sites and gives organizations complete visibility into the attack, allowing them to take remediating actions. Led by industry veterans, Memcyco is committed to ensuring the security and digital trust of its customers – and of their customers. For more information, visit www.memcyco.com/.

About Deloitte: Deloitte has contributed to the development of business organizations and society during its more than 175 years of history. Faced with a constantly evolving reality, it has established itself as the advisor of reference for the transformation of large national and multinational companies using a multidisciplinary approach based on excellence, technological innovation and the continuous development of the talent of its professionals, maintaining its position as a leading professional services firm. The organization has strengthened its position by impacting clients, communities and people through the Make an impact that matters initiative, which is implemented in social action programs -WorldClass-, action against climate change -WorldClimate-, and its ALL IN diversity and inclusion strategy. Globally, the firm is present in more than 150 countries, where more than 345,000 professionals work. Learn more at: www.deloitte.com/

Media contact: Sheena Kretzmer, sheena@memcyco.com.

Los Angeles, Calif., Jan. 17, 2024 – Spam calls continue to be a major nuisance in the US, and advice on how to avoid them abound.

Incogni’s latest research challenges prevalent assumptions about spam calls, revealing that traditional advice on avoiding specific area codes is largely ineffective. The study, based on the latest data from the Federal Trade Commission (FTC), demonstrates that, contrary to popular belief, a staggering 59.81% of all unwanted calls originate from local numbers within the recipient’s state.

An in-depth study of the FTC data debunks the notion that certain area codes reliably signify spam. Incogni’s researchers found that spam area codes vary widely from state to state, discrediting the widely circulated lists suggesting specific area codes to avoid. Even well-known recommendations like area code 216 for Cleveland, Ohio, or 469 for Dallas, Texas, do not align with the datareported to the FTC.

Incogni’s research reveals that the top ten reported spam area codes differ significantly from state to state. Even neighboring states like California and Colorado exhibit a 100% variance in their reported spam area codes.

In addition to the variance in reported spam area codes, Incogni’s research sheds light on the prevalence of toll-free numbers. The study reveals a distinct trend where toll-free numbers, starting with 833, 888, 855, 800, 866, and 844, consistently emerge as common sources of unwanted calls nationwide. Unlike the state-specific variation observed in local area codes, these toll-free numbers are the only ones to transcend state borders.

The study sheds light on the prevalence of “neighbor spoofing,” where spammers intentionally manipulate their numbers to mimic local area codes, capitalizing on the trust associated with local calls.

With no universal catalog of spam area codes, Incogni advocates for a proactive approach to combating spam. The study underscores the importance of digital hygiene, urging individuals to secure their personal data online. Hope for the future, Incogni suggests, lies in comprehensive data protection laws coming into effect to curtail spam effectively.

Incogni’s researchers sought out and downloaded yearly Daily Data Files from the FTC’s Do Not Call (DNC) registry, a database listing the phone numbers of individuals who have requested not to be contacted by telemarketers.

The data represents 286,250 reports submitted to the Federal Trade Commission from 16th October to 8th December, 2023. Incogni researchers combined all the information into one database. Reports without a telephone number for the advertiser, or telephone numbers reported as “111111111” or “0” were removed from the database.

The full text of the study as well as images are available here: https://blog.incogni.com/spam-area-codes

Google drive with data used in this research, images, press release are available here: Spam area codes

About Incogni: Incogni is a leading data privacy company offering an automated data removal tool, with a mission to empower internet users to take control of their personal information online.

Uncategorized

Washington, DC, Jan. 12, 2024 – Trimarc Security, the professional services company with extensive expertise in securing Active Directory for enterprise organizations, today announced the early access availability of its new product, Trimarc Vision.

Trimarc Vision is a powerful security posture analysis product that provides visibility into the most important security components of Active Directory. With Trimarc Vision, organizations gain continuous monitoring of security issues attackers leverage to compromise Active Directory (AD).

With dozens to hundreds of thousands of AD users often spread across multiple domains and forests, maintaining a strong security posture can be a daunting task. This is especially true when performing risk calculations, mergers and acquisitions, or conducting remediation planning.

Related: Trimarc Vision demo scenarios

But with Trimarc Vision, organizations can now have a unified view of their AD security, real-world based risk scoring, and prioritized remediation guidance – all in one powerful tool that’s quick to deploy and simple to implement

Metcalf

“Trimarc Vision represents multiple decades of Active Directory knowledge and experience,” notes Sean Metcalf, Trimarc Founder and CTO. “This product is the culmination of over 2 years of active development, and the consolidation of over 7 years and hundreds of Active Directory assessments of the Fortune 50 and beyond. We are very excited to see customers use Trimarc Vision to improve their Active Directory security in just days!”

With Trimarc Vision, you can get answers to these and other critical questions:

What risk do I have in my environment with Active Directory?

•What actions can I take today/tomorrow/this week to best mitigate AD attack impact?

•What should I be most concerned about in AD when it comes to a potential attack?

•What is the current security posture of ALL of my AD forests?

In addition to being quick to deploy and integrate into existing workflows, one of the key benefits of Trimarc Vision is its ability to enable collaboration between security and operations teams, allowing them to “work off the same sheet of music.” By providing a unified view of security posture across all AD environments, teams can work together more efficiently to address any issues that may arise.

Considering a merger or acquisition? Trimarc Vision has several pain-reducing benefits just for M&A:

•No agent required! Run the Trimarc Vision tool to capture all required information.

•Discover the most important AD security issues with realistic risk scoring.

•Compare the M&A forest with another AD forest, and get an auto-generated summary of high-level concerns.

•Identify when acquired company’s AD forest security level is appropriate before connecting to the corporate network.

Learn more about Trimarc Vision and get early access (and introductory pricing) at https://www.trimarcvision.com/

About Trimarc: Trimarc helps organizations in the Fortune 50 and beyond secure their Microsoft platform, whether on-premises or in the cloud. Based out of Washington, DC, the company is self-funded and was founded in 2016 by Sean Metcalf, a Microsoft Certified Master in Active Directory. Trimarc’s mission is to help organizations better secure their critical IT infrastructure. See how Trimarc is securing the enterprise at https://www.trimarcsecurity.com.

Media contact: Jennifer VanAntwerp, JVAN Consulting, LLC, jen@thejvan.com

 

Uncategorized

Augmented reality (AR) and virtual reality (VR) technologies provide intriguing opportunities for immersive and interactive experiences in cybersecurity training.

Related: GenAI’ impact on DevSecOps

Here’s  how these technologies can bridge learning gaps in cybersecurity awareness and enhance the overall training experience.

AR and VR technologies can create distinct immersive experiences by merging digital reality with the physical world. Augmented reality lets users experience the world around them with digital images and audio-visual elements layered on top. This integration offers innovative ways for people to interact with their environment, enhancing their overall experience. Common examples of AR applications include the Pokemon Go mobile game and Snapchat filters.

Virtual reality also utilizes interactive audio-visual elements but within a computer-generated environment. These virtual worlds appear genuine, giving users a more immersive and holistic experience in their surroundings.

These industries are growing in popularity and demand. Research suggests there will be over 1.7 billion AR devices worldwide by 2024 — nearly three times the figure from 2020. The market has also grown by 1,600% since 2018, displaying an interest that shows no signs of slowing.

Improving best practices

Cybersecurity training entails teaching the procedures for mitigating and addressing risks to computer systems. Organizations conduct these sessions to bring participants up to speed on the cybersecurity threat landscape and develop their knowledge of best practices to secure sensitive data, assess risk levels, and report incidents.

Amos

In addition to providing essential knowledge, cybersecurity training encourages individual and team accountability. Everyone in the company is responsible for maintaining information security and applying protective measures in line with established policies.

The immersive nature of AR and VR technologies presents a number of opportunities to improve how people learn about and enforce cybersecurity.

Hands-on training

Incorporating AR and VR into learning creates an environment where participants can enjoy a hands-on experience, which is a great way to retain knowledge and develop skills. For example, security professionals can build cyberattack scenarios, designing the system to provide realistic feedback so participants better understand what to do if they encounter real-life threats.

AR and VR facilitate gamified learning — or using game elements to make learning more enjoyable. This approach encourages deeper engagement since participants interact with various features like leaderboards, achievement badges and actual games as part of their cybersecurity training.

PwC sets an excellent example of gamification in cybersecurity with its Game of Threats. It simulates real-world cyber breaches so participants can gain experience in making critical decisions to protect their companies.Personalized Learning

People are complex, with different learning preferences and aptitudes. Cybersecurity experts can utilize AR and VR  to tailor lessons based on individual learning needs.

For example, they can create and deploy customized projects using AR apps or VR headsets. Each participant will have a specific learning plan built around what they need to know and how they prefer to learn. This is not a new concept — 2021 research on using VR for personalized learning showed a strong positive correlation, resulting in improved student motivation and performance.

Potential drawbacks

While AR and VR have their advantages, there are also disadvantages. The most notable include:

•Technological issues: The risk of technical glitches, power outages, internet disruptions and the like are a huge challenge to successfully adopting immersive technology in cybersecurity training.

•Eye strain and discomfort: Using AR or VR devices for extended periods may cause eye strain and related symptoms.

•Potential for increased distraction: With so many interactive features at their disposal, it’s easy for participants to get distracted.

•Accessibility issues: Developing countries might encounter limited access to AR and VR equipment, making it considerably difficult to explore immersive learning.

Keeping these potential issues in mind when launching AR and VR cybersecurity training will provide trainees with the best experience possible.

AR and VR can help enhance cybersecurity awareness training by facilitating personalized, immersive learning experiences. As these tools become more pervasive among a wide range of applications, they will play a critical role in creating more engaging and efficient learning experiences.

About the essayist: Zac Amos writes about cybersecurity and the tech industry, and he is the Features Editor at ReHack. Follow him on Twitter or LinkedIn for more articles on emerging cybersecurity trends.

 

In today’s digital landscape, organizations face numerous challenges when it comes to mitigating cyber risks.

Related: How AI is transforming DevOps

The constant evolution of technology, increased connectivity, and sophisticated cyber threats pose significant challenges to organizations of all sizes and industries. Here are some of the key challenges that organizations encounter in their efforts to mitigate cyber risks in the current environment.

 •Rapidly evolving threat landscape. The threat landscape is constantly evolving, with cybercriminals coming up with new techniques and exploiting vulnerabilities. Organizations must stay ahead of these threats, but it can be challenging due to the dynamic nature of the cybersecurity landscape.

•Lack of security awareness and education. Often, employees within organizations lack sufficient security awareness and education. This lack of knowledge makes them susceptible to phishing attacks, social engineering, and other cyber threats.

Organizations need to invest in cybersecurity training programs to educate their employees about security best practices.

•Inadequate security testing. Many organizations rely solely on traditional penetration testing or security assessments performed at the end of the software development cycle. This reactive approach often fails to identify critical vulnerabilities early on, making it easier for attackers to exploit them.

DevSecOps encourages a shift-left approach, where security testing is integrated throughout the development process. By incorporating automated security testing tools and conducting regular code reviews, organizations can identify and remediate vulnerabilities in a timely manner.

•Legacy systems and dependencies. Legacy systems and dependencies pose a significant challenge for organizations. These systems may contain known vulnerabilities that are difficult to patch or update due to compatibility issues.

Moreover, outdated software components and libraries can introduce security risks into the overall system. Practical DevSecOps aproach promotes a proactive approach to managing dependencies and encourages the use of tools for vulnerability management and continuous integration, which can help identify and address these risks.

•Compliance and regulatory requirements. Organizations often struggle to meet regulatory and compliance requirements due to the complex and ever-changing nature of these standards. Failing to comply with these requirements can result in hefty fines and reputational damage. Implementing DevSecOps practices can help organizations stay compliant by embedding security controls into the development process, performing regular audits, and ensuring that security requirements are met throughout the software lifecycle.

Effective mitigation

To effectively mitigate cyber risks and address the challenges mentioned above, organizations can adopt the Practical DevSecOps approach. Practical DevSecOps integrates security practices into the software development process, embraces automation and continuous integration, and emphasizes collaboration between development, security, and operations teams.

By implementing Practical DevSecOps, organizations can:

•Identify and address vulnerabilities early in the development cycle.

•Promote security awareness and education among employees.

•Conduct regular security testing and code reviews.

•Manage dependencies and address vulnerabilities in software components.

•Ensure compliance with regulatory requirements.

•Improve overall security posture and reduce cyber risks.

For individuals looking to advance their careers in cybersecurity and demonstrate their proficiency in Practical DevSecOps, obtaining relevant certifications can provide a competitive edge.

Nugraha

Practical DevSecOps certifications validate a person’s skills and knowledge in implementing security practices throughout the software development lifecycle. Mitigating cyber risks in the current environment is challenging due to the rapidly evolvin threat landscape, lack of security awareness, inadequate security testing, legacy systems, and compliance requirements. However, by implementing DevSecOps practices, organizations can effectively address these challenges

About the essayist: Yuga Nugraha is abDevSecOps engineer who is focused on the research division exploring multiple topics including DevSecOps, Cloud Security, Cloud Native Security Container, Orchestration, IaC, CI/CD) and Supply Chain Security.

Russia’s asymmetrical cyber-attacks have been a well-documented, rising global concern for most of the 2000s.

Related: Cybersecurity takeaways of 2023

I recently visited with Mihoko Matsubara, Chief Cybersecurity Strategist at NTT to discuss why this worry has climbed steadily over the past few years – and is likely to intensify in 2024.

The wider context is all too easy to overlook. Infamous cyber opsattributed to Russia-backed hackers fall into a pattern that’s worth noting:

Cyber attacks on Estonia (2007) Websites of Estonian banks, media outlets and government bodies get knocked down in a dispute over a Soviet-era war memorial.

Cyber attacks on Georgia (2008, 2019) Georgian government websites get defaced; thousands of government and private websites get blocked, including two major TV stations.

Ukrainian power grid take downs (2015, 2016) The capitol city of Kyiv suffers widespread, extended outages.

U.S. presidential election interference (2016) The personal accounts of Clinton staffers get hacked; disinformation supporting Trump gets widely disseminated via social media.

French presidential election Interference (2017) Leaks and fake news is similarly spread in attempts to influence the presidential election.

Solar Winds hack (2020) Supply chain connections for thousands of federal agencies and large enterprises get swiftly, deeply compromised.

-•MOVEit hack (2023) File sharing hook-ups for thousands of enterprises get compromised, triggering class action lawsuits.

It’s not just Russia. Other milestone nation-state cyber-attacks include Titan Rain (China 2003 – 2006,) Stuxnet (U.S and Israel, 2005 – 2010,) Operation Aurora (China, 2009,) the Sony Pictures hack (North Korea, 2015,) and WannaCry (North Korea, 2017.)

Matsubara

Matsubara is a former Japanese Ministry of Defense official who previously served as Palo Alto Networks’ VP and Public Sector Chief Security Officer for Asia-Pacific and, before that, as Intel’s Cyber Security Policy Director. We discussed how Russia in 2023 began synchronizing asymmetrical attacks with kinetic military operations — targeting Ukraine’s infrastructure with both missile strikes and advanced power grid hacks.

Matsubara warns that geopolitical tension often entails cyber espionage and disruption. Such a playbook could come into play in the Middle East and Taiwan as well.

For a full drill down, please view the accompanying videocast.

Looking ahead to 2024 and beyond, Matsubara observes that company leaders would do well look beyond basic cyber hygiene and adopt a more holistic approach to protecting their networks.

Given geopolitical conflicts of the moment, pressure from adversaries isexpected to intensify, going forward. Regulators are responding by implementing stricter data privacy and supply chain security standards. This means company leaders must do their due diligence.

The good news is that AI is coming into play across the board — in cybersecurity innovations to harden software code, manage cloud access and even make encryption more flexible and resilient. Company leaders can and should lean into AI as they select and implement leading-edge security tools and services, she says.

For small and medium-sized organizations that lack the resources of large enterprises, the challenge is acute, as their role in the supply chain makes them prime targets for strategic cyber disruptions. Matsubara sees managed security services as a lifeline enabling smaller companies to cost-effectively boost their cyber resiliency.

Company decision makers responsible for cybersecurity certainly have their plates full in the coming year. I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

 

Rehovot, Israel Dec. 18, 2023 – Salvador Technologies, the pioneering cyber-attack recovery platform provider for critical infrastructures and industrial organizations, today announced that it has secured $6m in funding.

Salvador Technologies’ investment round was led by Pico Venture Partners with participation from existing investors, such as Pitango VC and Sarona Partners, who continue to play an essential role in shaping the company.

Salvador Technologies has built its market-leading cyber-attack recovery platform with its patented security failover technology to prevent downtime damage and ensure ongoing operational continuity for Operational Technology (OT) and Industrial Control Systems (ICS). With the average downtime period after a cyber-attack being up to three weeks and leading to the majority of direct and indirect damages, Salvador Technologies’ platform bypasses standard recovery protocols and allows critical infrastructure operators and industrial enterprises to recover from attacks and any malfunction within only 30 seconds.

Salvador Technologies was founded in 2020 by Alex Yevtushenko (CEO) and Oleg Vusiker (CTO), two childhood friends and innovation enthusiasts with vast experience in cybersecurity.

Yevtushenko

“The number of cyber-attacks on critical infrastructures is exponentially increasing,” said Alex Yevtushenko, Co-Founder and CEO of Salvador Technologies. “The security challenges are growing, especially in light of the artificial intelligence (AI) that has penetrated into cybercrime and the need for an effective recovery solution is critical.”

“We are thrilled to announce this round of financing and welcome additional investors to our journey,” added Yevtushenko.

The company’s rapidly expanding customer base includes multi-national manufacturing corporations in the chemical, food, automotive and aerospace industries as well as critical infrastructure organizations, such as national maritime ports, healthcare centers, water and energy providers in multiple geographies.

“Salvador solves a tremendous problem in the underserved OT cybersecurity market,” said Tal Yatsiv, General Partner at Pico Venture Partners. “The company’s innovative solution acts as an insurance policy for organizations, eliminating risk by ensuring an immediate full recovery following an attack or a system malfunction.”

About Salvador Technologies: Founded in 2020, Salvador Technologies provides security failover technology for cyber-attack recovery and downtime prevention in Industrial Control Systems (ICS) and Operational Technology (OT) organizations. Its innovative solution bypasses standard cyber-attack recovery protocols and forensics measures, minimizing downtime, and regains operations within an astonishing 30-second timeframe. The company’s platform is used by some of the world’s most secure critical infrastructure organizations, including manufacturing, aerospace, maritime, energy and water companies. For more information, please visit www.salvador-tech.com.

Media contact: Tony Miller +972 544 870 808 | tony@noteya.com

Uncategorized

The Internet of Things (IoT) is on the threshold of ascending to become the Internet of Everything (IoE.)

Related:Why tech standards matter

IoT is transitioning from an array of devices that we can control across the Internet into a realm where billions of IoE devices can communicate with each other and make unilateral decisions on our behalf.

This, of course, is the plot of endless dystopian books and movies that end with rogue machines in charge. Yet IoE, at this nascent stage, holds much promise to tilt us towards a utopia where technology helps to resolve our planet’s most intractable problems.

This was the theme of Infineon Technologies’ OktoberTech 2023 conference, which I had the privilege of attending at the Computer History Museum in the heart of Silicon Valley. I had the chance to visit with Thomas Rosteck, Infineon’s Division President of Connected Secure Systems (CSS.)

Infineon supplies semiconductors embedded in smart systems, most notably in automotive, power and IoT. What I found most commendable about this Neubiberg, Germany-based semiconductor manufacturer is that it is fully directing its innovations squarely at reversing the negative impacts of climate change.

The theme of their conference, Driving decarbonization and digitalization – together, defines the company’s culture. I spoke with Rosteck about how  emerging IoE systems can help accelerate decarbonization – and about the security challenges that must be met along the way. For a drill down on our discussion, please view the accompanying videocast. Here are my takeaways:

Decentralizing IoT

Advancements in smart buildings and smart transportation systems continued apace in 2023 — and this has resulted in a choke point. Latency build-up has become intolerable, Rosteck noted, as more and more IoT devices send larger and larger rivers of data up into the Internet cloud for processing.

The solution that hardware and software suppliers are pursuing is to push more and more computing tasks out to the far edges of IoT systems — all the way out to the semiconductors controlling and directing the electrical current coursing through each discreet IoT device.

Semiconductors are the processing chips that convert alternating current (AC) to direct current (DC) in everything from the tiniest sensors to cloud servers and back to our laptops and smartphones. The technology industry has been focused on finding ways to circulate electricity much more efficiently at this chipset level.

Infineon’s bailiwick happens to be supplying advanced power modules and microcontrollers – the chipsets found embedded in thousands of different types of digitally-controlled appliances and machines, including IoT devices. Along with its partners and even its competitors, Infineon is on a path to push out more and more intelligence to the far edges of IoE systems. Instead of just carrying out simplistic tasks, IoT sensors and actuators are evolving into controls capable of making complex decisions, autonomously, where they are situated.

Rosteck

“We’re in a new wave of digitalization where devices at the edge are getting more and more powerful,” Rosteck says. “We can execute a lot of machine learning, at the edge, in IoT devices . . . it’s possible to reduce complexity and increase efficiencies because you don’t have to bring everything up to the cloud.”

Security by design

I asked Rosteck about the security implications of pushing computation out to the edge of IoT/IoE systems. After all, decentralizing smart functionalities does nothing to slow the expansion of the cyber-attack surface open to clever, motivated hacking collectives.

Rosteck stressed the importance of adopting a “security by design” approach. This means security must get factored in during the earliest stages of IoT product development, more pervasively so at the software level and, more so than ever at the hardware level.

Infineon’s power module and microcontroller chipsets provide a case in point. They come with a “secure element” which embeds encryption keys and authentication certificates at the chip level. “We protect these chips by making sure no one can access these keys,” Rosteck told me.

Locking down device authentication at the chip level provides a very deep, final layer of assurance that connections to each IoT device are trustworthy. What’s more, embedding robust security directly onto a chipset requires minimal use of additional energy in the field. This is important when considering the alternative of deploying yet more layers of software security delivered as a cloud service, Rosteck noted.

It struck me that this all fits very nicely into Infineon’s business model, which essentially is to grow revenue and profits by aggressively reducing its own carbon footprint and then encouraging its partners and customers to do the same.

“Driving decarbonization is a mission we have given ourselves and it is one that’s really important for all of us and actually for the generations to come,” Rosteck says, acknowledging that it also makes good business sense. “I also have to be able to make money with it because if I don’t make money, I can’t do the things that I believe in.”

Very well said! I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

 

Uncategorized

Here’s the final installment of leading technologists sharing their observations about cybersecurity developments in the year that’s coming to a close — and the year to come. Last Watchdog posed two questions:

•What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at my organization?

•What should I be most concerned about – and focus on – in 2024?

Their guidance:

Snehal Antani, CEO, Horizon3.ai

Antani

Many speculated that the ransomware attack on a Toyota supply chain player in Kojima, Japan was in retaliation for Japan’s aid to Ukraine. Nearly $400 million was lost as 28 Toyota production lines shut down.

The cyber threat landscape is evolving rapidly. Generative AI is expected to supercharge the velocity and precision of attacks. Our defensive strategies must evolve. Our success will hinge on deploying AI in a way that not only matches, but anticipates and outmaneuvers, the threat actors’ evolving tactics.

Rebecca Krauthamer, Co-founder and CPO, QuSecure

Krauthamer

As new standards for quantum-resilient cryptography come into effect, many government agencies will move toward quantum-readiness. Cryptographic inventories need finalizing and quantum safe encryption needs to be adopted for sensitive communications and data. Consumers will begin to see their favorite applications touting “quantum-secure encryption.”

CISOs will have to get quantum resilient encryption on their cyber roadmap. “Crypto agility orchestration” holds promise of taking us beyond this cryptography upgrade to resilience in the face of evolving threats to encryption.

Alex Rice, Co-founder & CTO, HackerOne

Rice

Over the next year, we’ll see many overly optimistic companies place too much trust in generative AI. GenAI holds immense potential to supercharge productivity, but if you forget basic security hygiene, you’re opening yourself up to significant risk.

The best solution I see to ensure the safe implementation of GenAI is to strike a balance: organizations must remain measured and conservative in their adoption and application of AI. For now, AI is the copilot and humans remain irreplaceable in the cybersecurity equation.

Mehran Farimani, CEO, RapidFort

Farimani

A wide range of vulnerabilities are being introduced by AI development tools. The federal government, specifically the Defense Industrial Base (DIB,) which consists of 300,000 contractors, is struggling to keep up. According to Merrill Research, only 19 percent of them have any vulnerability management solutions in place. In 2024, security teams will need to focus on developing automated tooling to shrink the range of issues that they need to address.

Jeremy Snyder, CEO, FireTail

Snyder

In 2024, human error-based public cloud exposures will continue to decline and AI will actually help reduce noise for detection and response — and make it much easier for humans to process alerts.

But business logic abuse may get worse.  Many API vulnerabilities also expose business logic functions in the software. In 2024, we are likely to see an API-based attack that will go undetected for a long period of time because it doesn’t seek to breach data, but rather to abuse the application logic.

Doug Dooley, COO,  Data Theorem

Dooley

2024 will be the year of full-stack visualization. Generative AI tools like ChatGPT, GPT-4 Turbo and others will help developers build and deploy more applications faster. But they also increase the potential for security flaws and data privacy violations. IT teams will need to visibly inventory all of their cloud applications and APIs in order to ensure compliance and security. The challenge is around discovery, security testing, protection and the visual understanding of the interconnected nature of this modern software.

Nick Mistry, SVP, CISO, Lineaje

Mistry

The software landscape is poised for significant changes, with a growing emphasis on Software Bill of Materials (SBOM.) As concerns about supply chain attacks continue to escalate, compliance measures will tighten.

The proactive adoption of SBOMS is a response to heightened awareness and a crucial step in securing the software supply chain. There will be an increase in compliance requirements, like U.S. Executive Order 14028, across the globe.

Matt Wilson, Principal Product Manager, SynSaber

Wilson

In 2023, we witnessed a renewed focus on asset discovery and monitoring. This start-with-the-basics momentum will carry into 2024. No one would be shocked if 2024 included more talk of regulation. For one, NERC-CIP is under pressure to clarify acceptable cloud data storage uses for bulk electricity providers. Another important thing to watch in 2024 will be whether government funding is made available to help support the critical infrastructure sectors that need financial assistance with their cybersecurity transformations.

Eric Avigdor, VP of Product, Votiro

Avigdor

The year coming to a close has shown us that the data protection space is flooded with isolated point products that do not integrate well. In the next year, we will see a strong market push for tighter integration and preference for platforms that address multiple use cases vs. point solutions. This will most probably lead to M&A within this space, for instance, Palo Alto Networks recently acquired Dig Security.

Wayne Schepens, Chief Cyber Market Analyst, CyberRisk Alliance

Schepens

The weakest link is still humans; attacks caused by social engineering remain a critical risk for all organizations. In 2024 I encourage leadership to dedicate more attention to discussing the risks of spear phishing. Young employees eager to prove their metal are particularly at risk. Leaders must foster a culture where employees feel comfortable surfacing security issues. Educate your workforce. Encourage them to share information. Ensure they know where to escalate concerns if they find themselves trapped.

Calvin Carpenter, Product Marketing Manager,  Hughes

Carpenter

Generative AI has lowered the barrier of entry for cybercriminals, who can now use it to write malicious code and make more believable phishing emails. In 2024, a layered approach to cybersecurity will become even more essential. This means implementing multiple security controls including multifactor authentication (MFA), MDR or EDR, securing and well-maintaining backups, implementing Zero Trust architecture, and having ready swift, decisive incident response measures.

Stephen Helm, Director of Product Marketing, Nisos

Helm

Behind every cyber attack is a human with a motive, yet the focus remains on what amounts to the tools of the trade. 2023 drove home the importance of seeing your organization through the eyes of an adversary; this helps align resources with the right risks and avoids wasting time on low-priority threats. In 2024, the lines between nation-state actors, criminal groups, and low-level adversaries will continue to blur. With geopolitical waters becoming more turbulent, the stakes for threat actors and organizations are higher than ever.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

Here’s part two of Last Watchdog’s year-end tête-à-tête with top cybersecurity experts. Part three to follow on Friday. We asked two questions:

•What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at my organization?

•What should I be most concerned about – and focus on – in 2024?

Their guidance:

Brandon Colley, Principal Security Consultant, Trimarc Security

Colley

Some 10-year-old vulnerabilities are still wildly prevalent. “Kerberoasting” and “Golden Ticket” attacks were both introduced in 2014 and yet enterprises continue to have hundreds of accounts configured with unconstrained delegation.

In 2024 we’ll see more of the same. As we shift to hybrid workloads, identity is becoming more complex. Instead of arguing about MFA strength, VPN vendor, or nation-state treat actors, let’s finish our conversation about using dedicated administrator accounts and unique passwords.

Or Shoshani, CEO and founder, Stream Security 

Shoshani

As 2023 ends, we’re already seeing businesses adopting technology to diagnose and detect threats to their cloud infrastructure before they occur. In the coming year, we also expect to see organizations work to close the disconnect between their DevOps and security teams.

By empowering these teams to work more cohesively, companies will have an easier time ensuring that applications and data are protected from security threats and vulnerabilities. DevOps and security teams must work together in securing the border guarding each system.

Michiel Prins, Co-Founder, HackerOne

Prins

Ethical hackers are consistently first to pressure-test emerging technology. As the adoption of generative AI accelerates, organizations must prioritize security and risk management.

In 2024, red teaming and the insights ethical hackers offer will play an increasingly central role in ensuring the security of this new technology — as exemplified by the Biden Administration’s endorsement of red teaming in its recent executive order. As AI continues to shape our future, the ethical hacker community will remain at the forefront of identifying new risks.”

Javed Hasan, CEO and co-founder, Lineaje

Hasan

Organizations have become concerned about a threat actor using AI to prompt actions that could lead to a compromise.  The truth is that the best time to compromise AI is when it is being built. Determining who created the initial AI models, with what bias and what intent, is critical to preventing security gaps.

I suspect that few organizations have considered this approach, and as a result, we’ll see all kinds of interesting challenges and issues emerge in the coming months.

Tyler Farrar, CISO, Exabeam

Farrar

Traditional SIEM solutions face numerous challenges with limited ability to adapt to new threats and attack vectors —  and complex deployment and maintenance processes. In 2024, cloud-native SIEM solutions will continue to emerge as a strong alternative.

The best cloud-native SIEM tools enable security and business teams to have a shared understanding of their organization’s security posture and the same interpretation of each and every threat. Cloud-native SIEM empowers organizations to effectively protect their valuable assets and data from an ever-growing array of cyber threats.

Richard Bird, CSO, Traceable AI

Bird

The bad guys are showing no restraint in exploiting API security weakness to their advantage. In 2024 we’ll see a steep upward trend of APIs being used to attack organizations and more companies will move from ‘thinking about doing something about API security’ to doing actually something about API security.

Stop trusting that your APIs are secure and start asking the hard questions about how exposed your organization currently is to API key theft, API transactional fraud and authorization level exploits.

Marcus Scharra, Co-CEO, Senhasegura

Scharra

The primary takeaway from 2023 is that most cybersecurity attacks are still linked to credentials — whether it’s the use of stolen credentials, or social engineering attacks to mine new credentials.

As organizations adopt cloud infrastructure and services, they need to carefully manage access rights and permissions. The move to the cloud has created bigger, more rewarding, and easier to penetrate targets. In 2024, security teams need to double down on defending increasingly complex threats to their assets in the cloud.

Jason Mashak, Senior Manager, Analyst & Public Relations, Runecast

Mashak

It has become crucial for organizations to proactively discover, identify, and prioritize misconfigurations and other potential vulnerabilities. In 2024, geopolitical shifts and economic uncertainties are expected to continue; generative AI and changing workforce dynamics will impact organizations.

Balancing efficiency, innovation and risk will be essential. Lastly, building organizational and societal resilience through rapid skillset evolution will be vital. Professionals must manage chaos, adapt, and embrace change management – all to align more with innovation, sustainability, and security.

Gabi Reish, Chief Product and Business Development Officer, Cybersixgill.

Reish

Supply-chain attacks have become paramount. Ransomware is more advanced and prevalent, even reaching “as-a-service” availability on the Dark Web. Not surprisingly, threat actors increasingly use AI to launch attacks more efficiently and stealthily.

Most organizations can benefit from gaining greater insights into the threats they face. The role of cyber threat intelligence (CTI) vendors is to deliver insights that are relevant to each organization’s use cases and security maturity level —  and that are integrated across the security stack .

 Kern Smith, VP Sales Engineering, Americas, Zimperium.

Smith

Regulatory requirements to embed more robust protections in mobile apps evolved greatly in 2023. Most recently the FCC adopted new rules for wireless carriers aimed at enhancing security measures for cell phone accounts.

Meanwhile QR-code phishing arose as a popular form of attack. As the use of QR codes for everyday things increases, bad actors will continue to take advantage of vulnerabilities to launch attacks. Having a mobile-first security strategy will be necessary for a QR-code friendly business.

Geoff Haydon, CEO, Ontinue

Haydon

The scope of potential threats is growing faster than human defenders can keep up with. AI is set to completely transform cybersecurity.

Organizations will – and should — demand transparency around how vendors responsibly apply AI and what business value they’ll see. The genuine potential of AI in cybersecurity lies in its ability to enhance its knowledge and capabilities as it gains a better understanding of your specific environment. AI can continuously learn an organization’s environment so that the models can better determine relevant next steps.

Sean Cronin, CEO, ProcessUnity

Cronin

A major trend this year has been the over hype-ification of Gen AI in risk and compliance. Risk managers want and will use AI, but in 2024, its usage will need to be reined in and human intervention is critical.

The notion of AI powered teams would be ideal. AI will be able to help with that underlying third-party or fourth-party risk that doesn’t appear significant until it causes downstream breaches, but it can’t be the be-end, end-all  in risk management.

Brandon Hart, CTO, EBI   

Hart

In 2024, zero trust will become increasingly important in ensuring the security of remote workers. Zero trust is a strategy, not a product or service that can be purchased outright. Every access attempt is treated as if it’s originating from an untrusted network.

Implementation may require increased use of cloud-based security solutions and a stronger focus on user training and awareness. A continuous evaluation and improvement mechanism is necessary as the security landscape evolves and new threats emerge.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

 

Uncategorized