I recently learned all about the state-of-the art of phishing attacks – the hard way.

Related: GenAI-powered attacks change the game

An email arrived from the head of a PR firm whom I’ve known for 20 years asking me to click on a link to check out a proposal. Foolishly, I did so all too quickly. Within a few minutes, many of my contacts, and even strangers, were receiving a similar malicious email from me.

At Black Hat USA 2024, I visited with Eyal Benishti, CEO of IRONSCALES, an Atlanta-GA-based supplier of advanced email security systems. We discussed just how targeted and contextualized advanced phishing attacks, like the one I experienced, can be. For a full drill down, please give the accompanying podcast a listen.

Benishti explained how the anti-phishing protections from Google and Microsoft excel at blocking known threats but often struggle with threats that aren’t yet recognized as harmful. His observation correlates to the notion that GenAI is helping both the attackers and the defenders.

In this shifting landscape, it’s becoming very clear that difference maker is humans. Attackers are getting evermore adept at leveraging GenAI to exploit our distracted nature. More so than ever, companies need to continually train users to stay on high alert.

Quick reporting by well-trained users isn’t going to be enough. Legacy protections from Google and Microsoft typically take 72 hours to catch up, Benishti told me. He argues that human feedback must be tightly integrated into AI-infused defenses that are tuned to adapt in real-time to evolving threats.

This balancing act is just getting started. I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

The post Black Hat Fireside Chat: User feedback, AI-infused email security are both required to deter phishing first appeared on The Last Watchdog.

President Biden’s call for the mainstreaming of Software Bill of Materials (SBOMs) is a major step forward.

Related: Europe mandates resiliency

Requiring a formal inventory of all components, libraries and modules in all business applications can help lock down software supply chains, especially in light of the SolarWinds and Colonial Pipeline attacks.

Yet SBOMs will take us only so far. I had a deep discussion about this at Black Hat USA 2024 with Saša Zdjelar, Chief Trust Officer at ReversingLabs (RL). He drew a vivid parallel between food safety and software security.  For a full drill down, please give the accompanying podcast a listen.

An SBOM is like an ingredients list, not a recipe for a gourmet dish, Zdjelar argues. Similarly, SBOMs in and of themselves do little to flush out anomalies arising in the wild. In short, SBOMs do not take context into account, he noted.

Context is fast becoming king in cybersecurity. Contextual solutions are more like recipes for securing business networks in a cloud-centric, hyper-interconnected operating environment – without unduly taxing efficiency or user experience.

RL Spectra Assure, for instance, provides context by performing deep analyses of binary code. This technology doesn’t just identify the ingredients in software, it also analyzes how those ingredients — such as third-party components, open-source libraries and other types of dependencies — interact. In doing so, Spectra Assure does what SBOMs cannot, identify malware or tampering. before an application is released or deployed

And it does this in real time by integrating into continuous integration/continuous deployment (CI/CD) workflows for software producers. Or in the case of enterprise buyers, on-demand scanning of commercial software provides a consistently up-to-date view of application risk before deployment or as new updates are made. This is a prime example of contextual security gaining ground in a massively complex, highly dynamic operating environment.

We need a lot more of it. I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

The post Black Hat Fireside Chat: Why grasping the context of code is a recipe for keeping software secure first appeared on The Last Watchdog.

Application Security Posture Management (ASPM) arose a few years ago as a strategy to help software developers and security teams continually improve the security of business applications.

Related: Addressing rising cyber compliance pressures

At Black Hat USA 2024, an iteration called Active ASPM is in the spotlight. I had the chance to visit with Neatsun Ziv, CEO and co-founder of Tel Aviv-based OX Security, a leading Active ASPM solutions provider.

I learned all about how Active ASPM emphasizes continuous, real-time monitoring and proactive remediation, thereby augmenting more passive ASPM methods, if you will, that focus on data aggregation and periodic assessments, Ziv told me. For a full drill down, please give the accompanying podcast a listen.

For its part, OX Security does this by going the extra mile to provide rich, detailed context that enables security teams to do triage more effectively – and CISOs to justify, with hard evidence, why resources need to be directed at specific security improvements.

This heavy lifting gets done, he says, by “going into the code and reading the code myself. I’m going to connect to the cloud, read the configurations and read the active assets you’ve got in your cloud. I’m going to connect to your artifact registry and scan what’s in there. I’m going to connect to your existing tools, understand what’s in there, and basically use every asset that you have inside your organization to provide the best and most accurate answer to the question, ‘Are you right now at risk? If so, let me guide you through the process of getting to a safer place.’ “

How high might Active ASPM move the bar, going forward? I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

The post Black Hat Fireside Chat: Here’s how ‘Active ASPM’ is helping to triage and remediate coding flaws first appeared on The Last Watchdog.

LAS VEGAS – Here’s what I discovered last week here at Black Hat USA 2024: GenAI is  very much in the mix as a potent X-factor in cybersecurity.

Related: Prioritizing digital resiliency

I spoke with over three dozen cybersecurity solution providers. Some of the more  intriguing innovations had to do with leveraging GenAI/LLM-equipped chatbots as proprietary force multipliers.

This is all part of Generative AI and Large Language Models igniting the next massive technological disruption globally. In the next five years, GenAI/LLM deployments are expected to add $2.6 to $4.4 trillion annually across more than 60 use cases, according to recent McKinsey study; a recent AWS survey predicts that over 93% of employers will use GenAI/LLM to increase innovation and creativity, automate repetitive tasks and boost learning.

Part of this tech revolution will play out in the cybersecurity sector as vendors perfect ways to assign GenAI/LLM to the task of helping companies get a better grip on data sprawl. Massive, indiscriminate ingestion of data was an intractable mess long before this mad scramble to insert AI assistants high and low in company operations.

“AI thrives on large datasets, “Steve Stone, head of Rubrik Zero Labs told me. “When you add AI into the mix, it further intensifies the challenge of managing data sprawl and the associated risks.”

Ditto when it comes to detection sprawl, if you will, in the cyber realm. I’m referring to the proliferation of fragmented, siloed security systems. “Managing all of that telemetry, bringing it together, prioritizing the alerts and remediating them, well, that’s where things break in the real world,” observes Willy Leichter, CMO of AppSOC.

Roger that. Just ask CrowdStrike. After strolling the exhibits floor at Black Hat USA 2024 and speaking with the solution providers, I jotted down two categories of cybersecurity advancements: ‘coding level’ and ‘operational level.’ Highlights of what I learned:

Coding level

The continual monitoring and hardening of business software as it is being rapidly developed, tested and deployed in the field has become a foundational best practice. When it comes to the broad category of Application Security (AppSec,) there’s a lot is going on.

AppSec technology security-hardens software at the coding level. Then there’s the sub-category of application security posture management (ASPM.) ASPM toolsets came along in 2020 or so to help organizations get more organized about monitoring and updating code security as part of meeting data privacy and security regulations.

Big name tech vendors like Palo Alto Networks, Cisco, IBM and even CrowdStrike have since integrated ASPM services in their platform offerings. And alongside them there is a thriving cottage industry of independent ASPM solution providers. I spoke at length with three of them: AppSOC, Cycode and OX Security.

San Jose, Calif.-based AppSOC launched in 2021 to aggregate, consolidate and prioritize security data from various toolsets used in the software development lifecycle (SDLC). AppSOC leverages AI to reduce the noise from multiple data sources and intelligently prioritizes vulnerabilities based on exploitability and business impact, Leichter told me.

Meanwhile, Tel Aviv, Israel-based Cycode started in 2019 to deliver a secrets detection service; it subsequently evolved into supplying advanced ASPM technology, says regional sales manager Kyle Vanderzanden. Cycode uses dedicated, in-house scanners to vet code within the hectic flow of the software development and deployment processes so as to not slow down innovation, he says

I also hosted a LW Fireside Chat podcast with OX Security CEO Neatsun Ziv. We did as deep dive on the evolution of ASPM solutions over the past four years and we discussed so-called Active ASPM;  give a listen once the podcast, which is on track to go live as LW’s Top Story  tomorrow (Aug. 11.)

I’d also put San Francisco-based Traceable and Cambridge, Mass.-based ReversingLabs in the bucket of coding-level solution providers at the leading edge. In my LW Fireside Chat with Traceable’s Amod Gupta, which you can listen to here, we dissect the reasons why API Security is so effective at mitigating online fraud; we also spoke about the emerging need to help enterprises secure their  GenAI deployments.

And stay tuned for my upcoming LW Fireside Chat with ReversingLabs Chief Trust Officer Saša Zdjelar, in which he describes ReversingLabs’  unique approach to deeply vetting new code in a way that greatly enhances Software Build of Materials (SBOMs.)

Operational level

It’s not enough, of course, to do security well at just the coding level. Multiple layers of proactive protection are required to achieve resiliency in a massively complex, highly dynamic operating environment.

This includes hardware security. I spoke to Brett Hansen, CMO, of Cigent Technology, and John Gunn, CEO of Token,  about discreet security devices at the hardware layer: for remote data storage and privileged access, respectively

Based in Naples, Fla.- Cigent provides security-enhanced SSDs and microSDs. Its solution includes hardware encryption, software-based multi-factor authentication, and AI-driven anomaly detection within the storage itself, Hansen noted.

New York, NY-based Token is on the verge of introducing a very unique wearable – a smart security ring activates by a fingerprint sensor and hardened to make it hackproof. For starters the ring is aimed at system administrators and senior executives, but could eventually go mainstream. For a full drill down, give a listen to my LW Fireside Chat podcast discussion with Gunn.

Yet another layer – easily the most porous one — is the user layer. And by far the two most ubiquitous user interfaces are web browsers and mobile devices.

Island’s Uy Huynh and I discussed how enterprise browsers are gaining traction because of advanced methods to both enhance security and improve efficiency. And I visited with AppDome CEO Tom Tovar to discuss the somewhat surprising, to me at least, results of a global consumer survey highlighting smartphone users’ readiness to abandon brands associated with poorly secured mobile apps.

Screenshot

I also heard from San Francisco-based Horizon3.ai, which announced a strategic partnership with Tech Mahindra, a major India-based multinational tech services company.

Horizon3 will integrate its its NodeZero™ platform, which delivers AI-powered pentesting and other services, with Tech Mahindra’s comprehensive suite of cybersecurity services.

And I learned all about Washington D.C.-based Black Girls Hack and London-based Security Blue Team. These organizations are taking a fresh approach to filling a big unmet need. Give a listen to my conversation with BGH founder Tennisha Martin about the support services they offer to anyone looking to enter or move over to a cybersecurity career. And I also spoke with Melissa Boyle, marketing manager at Security Blue Team, about the array of free and paid cybersecurity skills training services.

Those are my big takeaways from Black Hat USA 2024. Much percolating. As always, I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


 

 

The post MY TAKE: Black Hat USA 2024’s big takeaway – GenAI factors into the quest for digital resiliency first appeared on The Last Watchdog.

LAS VEGAS — As Black Hat USA 2024 plays out here this week, the disruptive impact of GenAI/LLM at many different levels will be in the spotlight.

Related: GenAI introduces fresh risks

We’re in early days. The productivity gains are ramping up – but so are the exposures.

I had the chance to visit with Amod Gupta, head of product at Traceable; we  discussed how GenAI/LLM is reverberating at the API level, where hyper-interconnectivity continues to intensify. For a full drill down, please give the accompanying podcast a listen.

Companies in all industries are racing to deploy GenAI/LLM chatbot assistants to improve efficiencies and boost revenue. This includes cybersecurity solution providers jumping on the bandwagon to enhance their tools and services.

At this moment, there’s a huge challenge securing the data transmitted via application programming interfaces (APIs) to and from all the novel chatbot assistants, Gupta told me. It’s only a matter of time, he says, before threat actors discover fresh ways to siphon off sensitive data.

Beyond that, other types of threats pivoting off APIs, such as prompt injection attacks, seem certain to escalate. Traceable is keeping close tabs via the installed base of its advanced API security platform. Meanwhile, it, too, is examining ways to leverage GenAI/LLM to reinforce security.

For instance, Gupta described a scenario where a security team member might use a GenAI/LLM assistant to run customized analyses of a unique vulnerability disclosure or perhaps a suspicious pattern of API activity.  “Instead of spending hours sifting through data, an analyst or even a technician could ask our GenAI assistant to perform the heavy lifting,” he says.

How quickly might GenAI/LLM arise as a defacto force-multiplier across cybersecurity? I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


 

The post Black Hat Fireside Chat: The role of API Security in mitigating online fraud, emerging GenAI risks first appeared on The Last Watchdog.

LAS VEGAS — Humans, unsurprisingly, remain the weak link in cybersecurity.

Related: Digital identity best practices

We’re gullible – and we can’t get away from relying on usernames and passwords.

Steady advances in software and hardware mechanisms to secure identities and privileged access have helped; yet crippling network breaches that start by fooling or spoofing a single human user continue to proliferate.

As Black Hat USA 2024 gets underway here this week, a start-up called Token is getting a step closer to rolling out a new hardware solution – a ring with a biometric sensor – that is designed to shore up this exposure. I had the chance to sit down with Token CEO John Gunn to learn all about this. For a drill down, please give the accompanying podcast a listen.

We discussed how one-time passwords (OTPs) and even smartphone biometric sensors have proven inadequate. Token’s solution combines the power of Public Key Infrastructure (PKI) with the convenience of wearable technology.

The ring contains a fingerprint sensor and holds a private encryption key; this information is stored on a tamper-proof microchip supplied by Infineon. Communication to laptops and smartphones is via NFC and Bluetooth.

“We looked at the important security advancements and asked how we could build upon them,” Gunn explains, adding that initial interest is coming from companies that will try them out on system administrators and senior execs.

What’s more Token’s next-generation MFA was recently honored with a Fast Company 2024 “World Changing Ideas” Award.

Will the Token ring be an incremental step – or might it be a great leap forward? I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


 

 

The post Black Hat Fireside Chat: Token’s wearable MFA solution combines PKI, biometrics — in a ring first appeared on The Last Watchdog.

When Tennisha Martin, a veteran software quality assurance analyst, sought to move over to a security team a few years ago, the doors should have been wide open, given the much-ballyhooed cybersecurity skills shortage.

Related: Modernizing security training

Instead, she ran into a rigid wall of shortsightedness. So, Martin taught herself ethical hacking skills and then founded  Black Girls Hack to guide others down the trail she blazed.

As Black Hat USA 2024 rolls into high gear next week, BGH is thriving. The non-profit boasts 2,500 members globally (all genders and races) and has lined up top-tier corporate backers, led by Microsoft and Google, to back its programs.

What’s more, it is putting on a content-rich conference, SquadCon 2024, in parallel with Black Hat, at The Industrial Event Space in Vegas mid next week.

I had the chance to visit with Martin and BGH group leaders Tammy Hinkle and Rebekah Skeete; we discussed how BGH fosters a confidence-building community. Members get access to resources such as training vouchers and tools like RangeForce. And the only requirement is to “not be a jerk,” Martin says. For a full drill down, give a listen to the accompanying podcast.

BGH’s emphasis on diversity has the potential to be a game changer. In a hyper-interconnected operating environment, grasping the context of legit vs. malicious connections, on the fly, is vital.

So how much might a diverse security team contribute to staying on top of context in such a highly dynamic environment?  I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


 

 

The post Black Hat Fireside Chat: ‘Black Girls Hack’ emphasizes diversity as effective force multiplier first appeared on The Last Watchdog.

Two-plus decades of enduring wave after wave of mobile app malware and fraud has finally taken its toll on users.

Now comes a global survey from Appdome and OWASP that reveals the vast majority of consumers are fed up.

I recently visited with Appdome CEO Tom Tovar to discuss clear signals that consumers are now insisting upon mobile apps that are private and secure, as well as convenient. For a full drill down, please give the accompanying podcast a listen.

As Black Hat USA 2024 gets ready to open next week in Las Vegas, this brings pressure to bear upon app developers – and on the top consumer brands — to do much better.

“Consumers are becoming highly sophisticated in their demands,” Tovar told me.  “The fear that mobile app providers don’t care about their protection is now equivalent to the fear of the attackers themselves.”

Historically, developers and brands have prioritized innovation and competition over security. Yet consumers are now demanding much improved security – and mobile app providers would do well to make the adjustment.

Appdome’s poll reveals that 74 percent of consumers would abandon an app if they felt unprotected, while 95 percent would advocate for brands that provide strong security measures.

Consumers are demanding much better mobile app security; and they’re also willing to reward brands that deliver it. The good news is that technology is advancing, as well. Appdome, for instance, next week plans to unveil a new tool that leverages GenAI to help developers and brands embed security deeply and flexibly in apps.

Will these developments soon start to temper mobile app badness? I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

The post Black Hat Fireside Chat: Consumers demand secure mobile apps; it’s high time for brands to deliver first appeared on The Last Watchdog.

Web browser security certainly hasn’t been lacking over the past 25 years.

Related: Island valued at $3.5 billion

Advancements have included everything from sandboxing and web applications firewalls (WAFs,) early on, to secure web gateways (SWGs) and Virtual Desktop Infrastructure (VDIs,) more recently.

Yet profound browser exposures persist — and this has led to the arrival of  enterprise browsers, which will be in the spotlight as Black Hat USA 2024 gets underway next week in Las Vegas.

I recently visited with Uy Huynh, vice president of solutions engineering, at Dallas, Tex.-based Island, the pioneer and leading enterprise browser.

We discussed why enterprise browsers may be in the early stages of revolutionizing how businesses operate in the cloud-driven world. For a full drill down, please give the accompanying podcast a listen.

You’ll learn, as I did, why enterprise browsers are not just another incremental improvement. By embedding user authentication, data protections, robotic process automation, and workflow integration directly into an enterprise browser companies can reduce complexity while improving speed and productivity, Huynh explains.

In effect, this approach extends threat detection and policy enforcement to the presentation layer; each person taps into company assets via a highly capable, flexible browser that’s simpler for the company to manage with dexterity.

Huynh walked me through examples where Island’s browser has replaced cumbersome VDI implementations, complex data loss prevention policies and helped to streamline  M&A deals. “With an enterprise browser, you access applications natively and directly, removing latency and significantly boosting productivity,” says Huynh.

Will enterprise browsers become central to IT and security infrastructures? I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

The post Black Hat Fireside Chat: How ‘enterprise browsers’ help to shrink exposures, boost efficiencies first appeared on The Last Watchdog.

Clean Code’ is a simple concept rooted in common sense. This software writing principle cropped up some 50 years ago and might seem quaint in today’s era of speedy software development.

Related: Setting IoT security standards

At Black Hat 2023, I had the chance to visit with Olivier Gaudin, founder and co-CEO, and Johannes Dahse, head of R&D, at SonarSource, a Geneva, Switzerland-based supplier of systems to achieve Clean Code. Olivier outlined the characteristics all coding should have and Dahse explained how healthy code can be fostered. For a drill down, please give the accompanying podcast a listen.

Responsibility for Clean Code, Olivier told me, needs to be placed with the developer, whether he or she is creating a new app or an update. Caring for source code when developing and deploying applications at breakneck speed mitigates technical debt – the snowballing problems associated with fixing bugs.

Guest experts: Olivier Gaudin, co-CEO, Johannes Dahse, Head of R&D, SonarSource

“If you try to go faster but don’t take good care of the code, you are actually going slower,” Olivier argues. “Any change is going to cost you more than it should because your code is bad, dirty, junky or whatever you want to call it that’s the opposite of clean code.”

What’s more, Clean Code improves security —  by reinforcing “shift left,” the practice of testing as early as feasible in the software development lifecycle.

Olivier and Dahse make a persuasive argument that Clean Code can and should arise as the innermost layer of security. The transformation progresses. I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)