LONDON, Sept. 18, 2023 – The first comparative research into the evolution of the vulnerability management market authored by Omdia has found risk-based vulnerability management (RVBM) is set to encompass the entire vulnerability management market by 2027.

Omdia’s comprehensive market analysis is the first report that provides a strategic overview of RBVM and its broader evolution within cybersecurity that Omdia refers to as proactive security.

“The emergence of RBVM has been driven by several factors,” said Andrew Braunberg, Principal Analyst with Omdia and author of the report. “Traditional vulnerability management tools, which enterprises use to identify, prioritize, and remediate software security vulnerabilities, have increasingly struggled to meet the needs of the modern enterprise because of the challenges of digital transformation, the expanded and diversified attack surface, the proliferation of IoT devices, and the acceleration of the application development lifecycle.

Braunberg

“The goal of better understanding and assessing risk is at the heart of RBVM,” Braunberg added. “Instead of trying to figure out how to patch everything faster, RBVM tackles the scale problem through smarter, better-informed prioritization, helping enterprises calculate what to patch quickly and what to delay or ignore.”

Vulnerability management is the highest area of investment for 2022/23, according to Omdia’s research. Omdia is tracking the investment activity taking place within the market with many of the larger players acquiring startups over the last few years.

Parizo

“Omdia Cyber has been tracking not only today’s most important cybersecurity technologies, but also tomorrow’s,” said Eric Parizo, Managing Principal Analyst, Omdia Cybersecurity. “We believe RBVM represents a seismic shift in how organizations manage vulnerabilities and will, at last, provide cybersecurity operations teams with the tools to measure and make decisions based on vulnerability risk.”

According to Omdia research, the total global vulnerability management market revenue for 2022 of $2.008bn. Despite a reduced year-over-year growth rate of 4.8%, Omdia anticipates stronger growth, powered by the rise of RBVM, in 2023 and 2024.

Omdia is providing complimentary access to the report, Omdia Universe: Risk-Based Vulnerability Management Solutions, 2023, via Omdia.com, with free registration. Access the report here.

About Omdia: Omdia, part of Informa Tech, is a technology research and advisory group. Our deep knowledge of tech markets combined with our actionable insights empower organizations to make smart growth decisions.

Media contact: Stephanie DeAngelo, PR & Communications Manager Informa Tech, +1 619 510 1564

Uncategorized

In today’s digital age, trust has become a cornerstone of building a better Internet.

Preserving privacy for a greater good

The Internet was designed as a platform for peer research, not for the vast scale and diverse uses we see today. Over the decades, it’s grown in a way that has left it with many inherent vulnerabilities.

These vulnerabilities, not borne out of malice, were the result of choices made with limited information available at the time.

Fastly addresses these technological vulnerabilities by utilizing tools like Rust and WebAssembly. Leveraging WebAssembly’s sandboxing capabilities allows us to isolate potential risks, while Rust provides the memory safety essential for our modern internet applications.

Taming the human side

But the challenges facing the internet don’t just lie in its technical foundations. The societal aspects of technology, the human side, have grown equally unruly.

The trust deficit we experience today is palpable. People are wary of technology and its creators. Our major platforms, tools integral to modern life, are now used as vehicles for misinformation and chaos. A disconnect exists between those building technology and its end-users, often exacerbated by financial pressures and lack of proper oversight in the tech industry.

Despite this bleak landscape, there’s hope. We possess the tools to craft a better, more trustworthy internet. As we embark on a new era for the web, the foundation lies not just in what we build, but how we build.

The ethos? Openness, transparency, and collaboration. These principles drive better technological outcomes, ensuring an improved experience for all web users.

For many, open source stands as the embodiment of these ideals. While not all technology must be open source, perhaps it should be developed with the same spirit. Trust, after all, is foundational to the open source model. It hinges on community faith in institutions, and this trust, once broken, is painstaking to restore.

Transparent approach

Sharing a couple of personal experiences from my work in the open source community illustrates this concept. When I joined Fastly, I had the chance to recommit $50 million towards supporting open-source projects during the challenging times of the pandemic.

However, bureaucracy and inefficiencies had muddled our vision. The decision to pause our program in order to reimagine it was difficult and led to criticism. Yet, by taking a transparent approach, seeking feedback, and re-building collaboratively, we restored our trust within our open sourcecommunity, Fast Forward.

Related: Twitter users flock to Mastodon

Another enlightening experience emerged from my home instance, Fosstodon, on the decentralized social web (aka The Fediverse). Recently, a controversy arose due to their English-only policy, seen by many as exclusionary.

Aubry

However, in response to the community’s concerns, Fosstodon’s administrators put the policy to a public vote. By opting for an open and collective decision-making process, they were able to retain the trust of their vast community, including mine.

Improved experiences

These stories serve as potent reminders. Trust in the technology realm is essential, and achieving it requires an open-source mindset. This approach calls for inclusion, clear communication, and cooperation. By granting all stakeholders not just a seat but a voice at the table, we create superior technology for users, preserving our communities’ vitality and improving overall web experiences.

Our ultimate goal is straightforward: develop both technical and human-centric systems that are intrinsically beneficial and trustworthy. From the core programming to the communities we build, let’s champion an Internet that stands as a beacon of trust and collaboration.

About the essayist: Hannah Aubry joined Fastly in 2020 as  Senior Community Manager of Fast Forward, Fastly’s $50 million commitment to support the open internet through open source projects and nonprofits like the Scratch Foundation, Kubernetes, and the Rust Foundation.

Uncategorized

From Kickstarter to Wikipedia, crowdsourcing has become a part of everyday life.

Sharing intel for a greater good

Now one distinctive type of crowdsourcing — ethical hacking – is positioned to become a much more impactful component of securing modern networks.

I had a terrific discussion about this at Black Hat USA 2023 with Casey Ellis, founder and CTO of Bugcrowd, a pioneer in the crowdsourced security market. Bugcrowd ushered in crowdsourced security with its launch in 2012, and today a covey of vendors have followed suit, each supplying intricate platforms to connect hackers with proven skillsets to companies that have particular needs.

“What we’ve got under the hood is effectively a dating website for people who are good at breaking into computers,” Ellis says.

Crowdsourced security vendors (others include Synack, Hacker One and Intigriti) make it seamless for companies to tap into a global network of software coders, and set them on the hunt for vulnerabilities.

Guest expert: Casey Ellis, CTO, Bugcrowd

This decentralized, diligently-managed approach meshes well with the overall shift to massively interconnected digital services.

For more on this, please do give the accompanying podcast a listen. Ellis and I discuss the evolution of pen testing, the current state of bug bounties and the rising influence of AI. For instance, some 85 percent of hackers responding to Bugcrowd’s Inside the Mind of a Hacker poll said they are already using generative AI in their workflows.

For its part, Bugcrowd has committed to helping companies shift to a risk-management approach to security, Ellis says. With AI speeding everything up, triaging risks makes a lot of sense. I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

 

 

San Francisco, Calif. —Traceable AI, the industry’s leading API security company, today released its comprehensive research report – the 2023 State of API Security: A Global Study on the Reality of API Risk.

Despite APIs being critical to the modern enterprise, until now, there has not been an extensive, global study offering a panoramic view of the API security landscape.

Traceable believed that it was time to fill this gap and embarked on this research journey with the Ponemon Institute.

Engaging 1,629 cybersecurity experts across the United States, the United Kingdom, and EMEA, this exhaustive study presents a unique perspective into the dark reality of API-related data breaches and their impact on organizations. Download the full report for in-depth insights and recommendations.

The report critically analyzes API-related data breaches, API sprawl, the use of traditional solutions such as Web Application Firewalls, API governance and the emerging role of Zero Trust Security in fortifying API security. These global findings provide profound insight into the challenges and security practices of organizations around the world, assessing their awareness and strategies for addressing API security risks.

Findings from the survey underscore the urgency of API security:

–74% reported at least three API-related breaches in the past two years: Within the last two years, 60% of organizations faced at least one API-related breach. Disturbingly, 74% of these endured three or more incidents, revealing a relentless threat landscape with 23% undergoing six or more breaches.

–DDoS tops the list with 38% as the primary API attack vector: Alongside fraud and known attacks, DDoS stands out as the primary API breach method. Compounding this, 58% agree that APIs substantially expand organizations’ attack surface.

–Only 38% understand unique context of APIs57% doubt traditional security: Only 38% can discern intricate context between API activity, user behaviors, and data flow. Plus, a significant 57% of respondents feel traditional security solutions, including Web Application Firewalls, can’t effectively distinguish genuine from fraudulent API activity.

–61% foresee escalating API risks; 48% grapple with API sprawl: With a considerable 61% anticipating rising API-related risks in the next two years, organizations are also wrestling with challenges like API sprawl (48%) and keeping an accurate inventory (39%).

–Organizations juggle an average of 127 third-party API connections, yet only 33% feel secure: While dealing with an average of 127 third-party API connections, a mere 33% express confidence in managing these external threats. This is exacerbated by uncertainties regarding the volume of data their APIs transmit, emphasizing an urgent call for advanced breach detection solutions.

“In an era where digital ecosystems are intrinsically entwined with our operational fabric, this report brings to light the hidden iceberg beneath the API landscape. It’s alarming to see that the majority of businesses are navigating these treacherous waters with a significant blind spot, unprepared and underestimating the very real threats associated with APIs. As a security community, we must address this glaring disconnect, prioritizing API security as a cornerstone of our cyber defense strategy. It’s time that API security is elevated from the server room to the boardroom. Only by doing so can we hope to stay ahead of the evolving threat landscape,” said Richard Bird, Chief Security Officer of Traceable.

Join the Conversation on the 2023 State of API Security: Global Findings

Bird

To help organizations understand the deeper findings, Traceable is hosting an exclusive webinar on Wednesday, Sept. 27 at 12 p.m. E.T./9 a.m. P.T. to interpret the results and to arm security professionals with the information they need to shape their organization’s cybersecurity strategy.

The webinar features Larry Ponemon of the esteemed Ponemon Institute, and Richard Bird, Chief Security Officer of Traceable. Together, they will unpack the intricate findings of the State of API Security report. This is a rare opportunity to gain insights directly from industry leaders, and engage in meaningful dialogue about the impact of API security on global cybersecurity initiatives. Reserve your seat here.

About Traceable: Traceable is the industry’s leading API Security company that helps organizations achieve API protection in a cloud-first, API-driven world. With an API Data Lake at the core of the platform, Traceable is the only intelligent and context-aware solution that powers complete API security – security posture management, threat protection and threat management across the entire Software Development Lifecycle – enabling organizations to minimize risk and maximize the value that APIs bring to their customers. To learn more about how API security can help your business, book a demo with a security expert.

Media contact: Shannon Cieciuch, Touchdown PR, traceable@touchdownpr.com

Uncategorized

In an era of global economic uncertainty, fraud levels tend to surge, bringing to light the critical issue of intellectual property (IP) theft.

Related: Neutralizing insider threats

This pervasive problem extends beyond traditional notions of fraud, encompassing both insider threats and external risks arising from partnerships, competitors, and poor IP management. Organizations dedicate substantial resources to detecting and preventing fraudulent activity in customer accounts.

Yet, the rise of internal fraud presents a unique challenge. Perpetrated by insiders who already possess unrestricted access to highly sensitive data and systems, internal fraud not only defies easy prevention but also imposes substantial costs.

Annually, American businesses suffer losses exceeding $50 billion, underscoring the impact on competitiveness in today’s fiercely competitive landscape. To navigate this complex landscape, business leaders must strike a delicate balance between fostering open research environments and securing their valuable IP, safeguarding both their business and innovative endeavors.

Remote work factor

The growing trend of remote or hybrid working has particularly intensified the issue, enabling trusted insiders to mask fraudulent activity by operating outside the conventional security perimeter. And while many instances of this type of fraudulent activity may start out as an accidental mistake, the longer the fraudster goes unnoticed, the greater the risk of an easy payout snowballing into more malicious actions becomes.

In some cases, insiders with malintent attempt to circumvent internal processes and policies by stealing innovation through a variety of methods, including gathering human intelligence from other employees and contractors, conducting digital and even physical surveillance operations, among other strategies.

Frogley

Some insiders may borrow tactics from more traditional state sponsored intelligence organizations such as confidential information collection through practices like “ratting” — where cybercriminals utilize malware to access sensitive information. Another example of on-the-ground tactics includes Intelligence agencies exploiting graduate students at research universities to access sensitive materials and coercing professionals working on sensitive technologies to engage in activities like IP theft.

Organizations must prioritize data and decision intelligence to tackle these threats effectively. However, fragmented and siloed data pose a significant hurdle for businesses in mitigating these risks, hindering their comprehensive understanding of the risk landscape. The combination of mounting pressures, accelerated decision-making, and the rapid availability and volume of data has intensified the difficulty of maintaining an efficient and resilient IP protection environment.

Role of AI

One technology businesses are looking to detect and prevent fraud, waste, and abuse is Decision Intelligence (DI), which allows companies to connect data and identify patterns or anomalies that potentially indicate the kind of behavior that may probe an investigation. By leveraging advanced analytics and AI, it offers enhanced scrutiny of individuals and organizations, monitoring their vulnerability to risks from sanctioned or risky entities that jeopardize intellectual property.

To accomplish this, the broader Decision Intelligence strategy should encompass the integration of techniques like graph analytics and entity resolution.

Organizations have access to ample data; the key lies in adopting suitable technology to extract its value. Gartner predicts that by 2026, organizations that prioritize AI transparency, trust, and security will witness a 50% boost in adoption, business goals, and user acceptance of their models. This emphasizes the transformative potential of Decision Intelligence (DI) for organizations that aim to be prepared for disruptions and resilient in the face of challenges. One example of where this impact can come from is entity resolution.

Entity resolution, powered by advanced AI and machine learning models, efficiently connects, organizes, and analyzes data to accurately identify similar entities. It groups related records, establishing a collection of characteristics and labeled connections for each entity. Unlike traditional record-to-record matching in MDM systems, entity resolution enables organizations to introduce new entity nodes that play a crucial role in linking real-world data.

Reusable resource 

With a strong data foundation, businesses can leverage a dependable and reusable resource to automate and enhance decision-making organization-wide, addressing diverse challenges beyond IP theft detection.

A strong data management strategy is vital for companies to monitor illicit and unlawful activities, safeguard intellectual property, and stay competitive. It is crucial to have visibility into networks across different environments, whether it’s an advanced persistent threat, cyber threat, or supply chain issue. The key lies in connecting data to gain a comprehensive understanding and effectively address complex challenges.

Tackling IP theft is an ongoing and intricate challenge that necessitates sustained cooperation between businesses leaders, workers and stakeholders. Ultimately, to drive global technology innovation, businesses must turn to Decision Intelligence to reduce manual work and make quick, well-informed decisions to protect their intellectual property.

About the essayist: Clark Frogley is Head of Financial Crime Solutions at Quantexa. He began his career with the FBI investigating organized and financial crime and served as the Assistant Legal Attaché in the US Embassy in Japan. Previously, Frogley worked as an executive at IBM in positions as the global head of AML and Counter Fraud Services in Banking, the Financial Crime Practice Leader for IBM in Japan, and the Financial Crime Solution leader for AML, Sanctions and KYC.

Over time, Bitcoin has become the most widely used cryptocurrency in the world. Strong security measures become increasingly important as more people use this digital currency.

Related: Currency exchange security issues

For managing and keeping your Bitcoin assets, you must need a bitcoin wallet, which is a digital version of a conventional wallet. The protection of your priceless digital assets will be guaranteed by this article’s discussion of the best techniques for protecting your Bitcoin wallet.Bu

A Bitcoin wallet is a piece of software that enables users to transmit, receive, and store bitcoins securely. While it performs similarly to a regular wallet, it stores digital assets in the form of cryptographic keys rather than actual cash or credit cards. These wallets are available in a variety of formats, including hardware wallets, online wallets, mobile wallets, and desktop wallets. Users can select depending on their unique needs since each type offers a varied ratio of ease to security.

Select a reliable wallet. The first step to protecting your digital assets is choosing a trustworthy Bitcoin wallet. It’s critical to select wallets with a solid track record and reputation in the bitcoin industry. Consider things like security features, user-friendliness, and community reviews when you compare various wallet solutions.

Use strong passwords, 2FA. The security of your Bitcoin wallet is mostly dependent on the strength of your passwords. Use uppercase, lowercase, digits, special characters, and a combination of them to create strong, one-of-a-kind passwords. Keep your name and birthday away from utilizing information that might be easily guessed. Also, whenever it is possible, activate two-factor authentication (2FA). By requiring a verification code in addition to your password, 2FA adds an extra layer of protection and drastically reduces the possibility of illegal access to your wallet.

Update frequently. Bitcoin wallet providers are always making software improvements to address possible security flaws. It’s critical to maintain your wallet software updated in order to stay one step ahead of criminal actors. Patches for security holes are frequently included in wallet upgrades, ensuring that your wallet is protected against new threats. To keep secure, set up automatic updates whenever feasible or often check for new software versions.

Backup, backup, backup. To guard against data loss, it’s crucial to regularly create backups of your Bitcoin wallet. Wallet backups provide a safety net in the event that your device breaks down, is misplaced, or is stolen. Backups should be kept safely in several places, such as encrypted cloud storage or external hard drives. Test the restoration procedure as well to make sure your backups are operational and available when needed.

Secure your network, device. It’s critical to protect the device you use to access your Bitcoin wallet. To avoid potential vulnerabilities, keep your operating system, antivirus software, and other security tools up to date. Refrain from installing illegal or dubious software, and only download wallets from reliable sources. Be careful while connecting to public Wi-Fi networks as well, as they may not be safe. A virtual private network (VPN) can offer an additional layer of encryption and security.

Use multisignature wallets. Multisig wallets, sometimes referred to as multi sigs, provide better protection for your Bitcoin holdings. Transactions in this kind of wallet must have approval from numerous cryptographic signatures, lowering the possibility of unwanted access. You may share keys across several devices or people using multisig wallets, adding an extra layer of security against key loss or theft.

Ashford

Be wary of fraud. As the use of Bitcoin has grown, so have the number of phishing and malware attempts that prey on naïve users. Use caution while downloading files or clicking on websites connected to your Bitcoin wallet. Be wary of dubious emails, texts, or websites that ask for your wallet credentials in an effort to deceive you. Before acting, make sure the source is legitimate to avoid falling for con artists.

In conclusion, protecting your digital assets in an increasingly linked world requires you to secure your Bitcoin wallet. You can greatly improve the security of your Bitcoin holdings by adhering to these best practices, such as choosing a trustworthy wallet, implementing strong passwords and 2FA, regularly updating your software, backing up your wallet, securing your device and network, using multi signature wallets, and being watchful against phishing and malware attacks.

It’s crucial to keep up with the most recent security procedures in the constantly changing field of cybersecurity and to adjust as necessary.  You may have peace of mind and confidently traverse the world of cryptocurrencies while securing your priceless digital assets by prioritizing the security of your Bitcoin wallet, periodically educating yourself on emerging dangers, and adhering to suggestions from reliable sources.

About the essayist: Ronin Ashford is a passionate tech enthusiast and a dedicated cryptocurrency investor. With a firm belief in the potential of blockchain technology, he is determined to contribute to the transformation of the payments industry landscape.

Tel Aviv, Israel, Sept. 5, 2023 — Reflectiz, a cybersecurity company specializing in continuous web threat management offers an exclusive, fully remote solution to battle Magecart web-skimming attacks, a popular type of cyberattacks involving injecting malicious code into the checkout pages.

As the Holiday Season approaches, online retailers face the challenge of protecting their websites against the growing threat of malicious attacks, such as Magecart. However, they struggle to add new security layers due to restrictions on modifying their website code to avoid impacting website performance during the peak shopping season.

Reflectiz, a unique web security tool, ensures 100% readiness for Magecart attacks before and during the Holiday Season. This is made possible by Reflectiz’s external, non-intrusive solution, requiring no code implementation or IT resources. Your website(s) will be fully protected within days, and there will be no impact on your website performance whatsoever.

Reflectiz automatically detects third-party code changes, keylogging, and communication with malicious domains to prevent Magecart web-skimming attacks. It overcomes the most sophisticated malware obfuscation techniques, lets you track changes, prioritize issues, and implement alerts according to their severity level, empowering you to act before the damage is done.

Despite being so powerful, Reflectiz does not affect website performance. It has zero impact on your IT resources, and it does not require any installation on the client. It begins protecting your web assets within days, ensuring continuous monitoring of all crucial and sensitive web pages, not just checkout pages.

“Reflectiz understands the challenges faced by online retailers during this busy time of the year. In fact, in 2023, Reflectiz detected Magecart attacks on more than 150 websites, and the count is still rising. Our advanced technology enables the automatic detection of sophisticated threats throughout your entire online environment, all with quick and easy external implementation. You will be up and running within days” – Ysrael Gurt, Co-founder & CTO, Reflectiz

Sign up for our exclusive offer today, and get the ideal head start in the war on Magecart.

Media contact: Marketing Director, Daniel Sharabi, Reflectiz, daniel.s@reflectiz.co

New government rules coupled with industry standards meant to give formal shape to the Internet of Things (IoT) are rapidly quickening around the globe.

Related: The need for supply chain security

This is to be expected. After all, government mandates combined with industry standards are the twin towers of public safety. Without them the integrity of our food supplies, the efficacy of our transportation systems and reliability of our utilities would not be what they are.

When it comes to IoT, we must arrive at specific rules of the road if we are to tap into the full potential of smart cities, autonomous transportation and advanced healthcare.

In the absence of robust, universally implemented rules of the road, cybercriminals will continue to have the upper hand and wreak even more havoc than they now do. Threat actors all-too-readily compromise, disrupt and maliciously manipulate the comparatively simple IoT systems we havein operation today.

I had an eye-opening conversation about all of this with Steve Hanna, distinguished engineer at Infineon Technologies, a global semiconductor manufacturer based in Neubiberg, Germany. We went over how governments around the world are stepping up their efforts to impose IoT security legislation and regulations designed to keep users safe.

This is happening at the same time as tech industry consortiums are hashing out standards to universally embed security deep inside next-gen IoT systems, down to the chip level. There’s a lot going on behind the scenes. For a full drill down on my discussion with Hanna, please view the accompanying videocast. Here are a few takeaways:

Minimum requirements

A few years back, a spate of seminal IoT hacks grabbed the full attention of governments worldwide. The Mirai botnet, initially discovered in October 2016, infected Internet-connected routers, cameras and digital video recorders at scale. Mirai then carried out a massive distributed denial-of-service (DDoS) attacks that knocked down Twitter, Netflix, PayPal and other major web properties.

Then in 2017, clever attackers managed to compromise a smart thermometer in a fish tank, thereby gaining access to the high-roller database of a North American casino. Soon thereafter, white hat researchers discovered and disclosed pervasive vulnerabilities in hundreds of millions of smart home devices such as cameras, thermostats and door locks.

In 2018, UK regulators got the regulatory ball rolling taking steps that would eventually result in mandated minimum requirements for IoT data storage, communications and firmware update capabilities. The U.S., other European nations and Singapore soon began moving in this direction, as well. The U.S. National Institute of Standards and Technology (NIST,) for instance, has since developed a comprehensive set of recommended IoT security best practices.

In 2023, the U.S. announced a cybersecurity certification and labeling program to help Americans more easily choose smart devices that are safer and less vulnerable to cyberattacks. The new “U.S. Cyber Trust Mark” program raises the bar for cybersecurity across common devices, including smart refrigerators, smart microwaves, smart televisions, smart climate control systems, smart fitness trackers, and more.

Guest expert: Steve Hanna, Distinguished Engineer, Infineon Technologies

“We’re moving to a world where IoT cybersecurity will be table stakes” Hanna told me. “It’s going to be required in every IoT product and governments will have their own checklist of IoT requirements, similar to what we have for electrical equipment.”

Harmonizing the baseline

The efforts by regulators and technologists to establish a baseline for IoT safety has, as might’ve been expected, given rise to conflicts and redundancies. “At the moment, we have a Tower of Babel situation where each nation has its own set of requirements and it’s a big challenge for a manufacturer how they get their product certified in multiple places,” Hanna says.

Harmonizing of different requirements across multiple nations needs to happen, Hanna argues, and this quest is made even more challenging because of the sprawling array of IoT device types. This is, in fact, precisely what a tech industry consortium, calling itself, the Connectivity Standards Alliance, has set out to tackle head on, he says.

“Basically, we’re creating, shall we say, one certification to rule them all,” Hanna told me. “We’re going to bring together all the requirements from these national and regional certifications and say if you get this one certification from CSA, then that indicates you’re compliant with all of the national or regional requirements, no matter where they might come from. And your product can then be sold in all of those different regions.”

The technologists are striving to resolve a profound pain point, in particular, for IoT device makers facing the prospect of needing to test and certify their IoT products in 50 different locales. “If I can test it once against a set of requirements that I understand, then that’s much less expensive,” Hanna says.

Safety labels

The give-and-take vetting of emerging standards that’s now unfolding reflects a tried-and-true dynamic; it’s how we arrived at having detailed food additive labels we can trust on every item on supermarket shelves and it’s why we can be sure no electrical appliance in our homes poses an egregious hazard.

The ramping up of IoT rulemaking and standards-building portends a day when we won’t have to worry as much as we now do about directly encountering badness on the Internet.

I asked Hanna about what individual citizens and small business owners can do, and he indicated that staying generally informed should be enough. He noted that the regulators and tech industry leaders are cognizant of the need to foster consumer awareness about the incremental steps forward. The push behind the new Matter home automation connectivity standard introduced in late 2022 being a case in point.

“We can’t expect the consumer to be an expert on IoT cybersecurity, that’s just not realistic,” he says. “What we can ask them to do is to look for these security labels coming soon to IoT products . . . you just can’t buy an unsafe extension cord anywhere today; only the ones with the proper safety inspections get sold. I hope the same will be true in five or 10 years for IoT products, that all of them are adequately secure and they all have that label.”

This is all part of a maturation process that must happen for digital systems to rise to the next level. I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

 

San Francisco, Calif.,  Aug. 30, 2023 Every year over 340m workers suffer a workplace injury: slips and falls, strains and sprains, vehicle collisions and crashes. Voxel, an AI startup using computer vision to transform safety and operations in the workplace, is today announcing a $12m strategic funding round to improve workplace safety and save lives.

The strategic funding round was led by global manufacturing industry leader Rite-Hite with participation from existing investors Eclipse Ventures and World Innovation Lab. This takes total funds raised to $30m since 2020.

In the US, manufacturing, logistics, and physical operations are the lifeblood of the economy, with over 25 million individuals at the frontlines, contributing to 40% of the nation’s GDP. However, with massive output comes the persistent challenge of workplace injuries and operational inefficiencies. Now, artificial intelligence is revolutionizing the field of environment, health and safety (EHS) in industrial operations.

Voxel integrates state-of-the-art computer vision technology into existing security cameras to identify hazards, risky behaviors, and operational inefficiencies across a diverse range of workplaces. Once potential risks, such as near-miss vehicle collisions, blocked exits, improper ergonomics,or spills, are identified, a real-time alert is sent to on-site personnel who can take immediate action, and Voxel’s analytics help sites identify operational inefficiencies and design policies to prevent future issues. These proactive measures allow businesses to significantly reduce worker’s compensation and general liability costs, while improving their operations.

In order to protect workers’ privacy, Voxel’s AI ethics policy means that no facial recognition or identification of individuals is permitted in their systems. Voxel provides its customers with resources for ethically and responsibly implementing AI in the workplace crafted after years of experience developing AI for America’s industrial leaders.

Senemar

Voxel has had a transformative impact for their strategic partners’ operations, reporting up to an 80% reduction in workplace injuries and substantially improving operational efficiency. Fortune 500 firms like Michael’s, Dollar Tree, Clorox, PPG Industries, Office Depot, and many others are already seeing the benefits of Voxel’s platform.

Alex Senemar, CEO and co-founder of Voxel commented: “AI is saving lives. We’ve proven that our technology has made great strides toward reducing injuries and saving lives. Our approach is going to create worksites where employers don’t have to bargain between meeting safety standards and meeting their productivity goals. The future of work is not just about doing more, but doing it safer in an environment fit for purpose”.

Voxel business highlights since series A funding round, April 2022:

•The team has grown from 10 people to over 50 employees, who have joined from established industry firms Samsara and Verkada to big tech Google, Apple, and Uber.

•Featured in the Fast Company magazine Most Innovative Companies list.

•Best B2B Tech Tool of 2023 by Products That Count.

Voxel’s team is led by CEO Alex Senemar, who previously co-founded Sherbit, an AI-powered remote health monitoring system for hospitals (acquired in 2018) as well as co-founders, CTO Anurag Kanungo, who co-founded Sherbit with Senemar, and led the Machine Learning Systems Team at Uber’s Self Driving Unit; Harishma Dayanidhi, who developed self-driving car technology at Uber and Aurora; and Troy Carlson, former software engineer at Google.

About Voxel: Voxel uses artificial intelligence to enable security cameras to automatically identify potential workplace hazards, high-risk activities, and operational inefficiencies, allowing on-site personnel to address concerns in real-time. The platform keeps workers safe, while helping companies significantly reduce overhead costs from general liability, worker’s compensation, and property claims. ??Voxel software is transforming operations in warehousing, manufacturing, retail, transportation, construction, and oil & gas. A demo is available upon request. For more information, visit https://www.voxelai.com/ or follow via LinkedIn and X

About Rite-Hite: Rite-Hite is a world leader in the manufacture, sale, and service of loading dock equipment, industrial doors, safety barriers, HVLS fans, industrial curtain walls, and more – all designed to improve safety, security, productivity, energy savings, and environmental control. Watch Rite-Hite’s Always Looking Ahead video to learn more.

About Eclipse Ventures: With over $2 billion in assets under management, 70 portfolio companies, and a team of investors with deep expertise in technology, manufacturing, supply chain, logistics, healthcare, and consumer products, Eclipse is one of the US’ leading venture capital organizations. Its leadership team has the experience necessary to create and scale complex operations – with partners coming from industry giants, such as Flextronics, Tesla, Apple, Samsara, Intel, and GE. Eclipse partners with entrepreneurs boldly transforming the essential industries that define and propel economies. For more information, visit www.eclipse.vc.

Media contact: Bilal Mahmood, Stockwood Strategy. Mob: +44 (0) 771 400 7257

Uncategorized

Hannover, Germany, Aug. 31, 2023 – Hornetsecurity has recently launched The Security Swarm podcast series to shed light on the latest cybersecurity issues.

The weekly show, hosted by Hornetsecurity’s Andy Syrewicze, brings together experts from across the cybersecurity sector to discuss industry challenges, how businesses can overcome ever-changing threats, and future cybersecurity issues.

The informative and educational series has already looked at topics such as AI and whether ChatGPT could conduct a cyberattack, discussions around Hornetsecurity’s recent compliance survey, as well as a conversation with Microsoft Certified Trainer on how secure Microsoft 365 actually is.

Hofmann

Hornetsecurity CEO Daniel Hofmann said: “The Security Swarm podcast launch has been incredibly successful and delivers insightful conversations about the biggest cybersecurity challenges facing businesses today. This podcast is one of many new approaches we have introduced to support and educate cybersecurity decision-makers across the world.”

The world of cybersecurity should not be taken on alone. A glimpse into the podcast series is available in this trailer.

The podcast can be listened to via the Hornetsecurity website and is also available to download on Apple PodcastsGoogle PodcastsSpotify, and YouTube.

About Hornetsecurity: Hornetsecurity is a leading global provider of next-generation cloud-based security, compliance, backup, and security awareness solutions that help companies and organisations of all sizes around the world. Its flagship product, 365 Total Protection, is the most comprehensive cloud security solution for Microsoft 365 on the market. Driven by innovation and cybersecurity excellence, Hornetsecurity is building a safer digital future and sustainable security cultures with its award-winning portfolio. Hornetsecurity operates in more than 30 countries through its international distribution network of 8,000+ channel partners and MSPs. Its premium services are used by more than 50,000 customers.

For more information, visit www.hornetsecurity.com.

Media contact: Please contact us on press@hornetsecurity.com. Angelica Micallef Trigona, Director of Corporate Communications, Hornetsecurity Group – www.hornetsecurity.com

Uncategorized