FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Hacking

The Art Of Exploitation...

Ethical Hacking

Security Experts...Same Techniques To Make Hacker's Stuff Useless.

Black Hat Hacking

Dark Side Of Hacking... In Short Destruction Of Cyber Stuff.

Digital Stuff

All The Digital Stuff Is Under The Influence Of Cyber Attacks... Be Safe

Tuesday, January 31, 2023

How to Earn Your (ISC)² Certification

We are excited to have more than 130,000 individuals become (ISC)² Candidates since launching in September 2022. Many of them will go on to earn their Certified in Cybersecurity (CC) as part of our One Million Certified in Cybersecurity pledge. Earn Your ISC2 Certification

For those new to (ISC)², or those who’ve had their sights set on their CISSP for years now, you may not be sure exactly how you become (ISC)²-certified. Your certification is more than a single exam. There are three steps to earn your (ISC)² certification:

Step 1: Pass your exam

Step 2: Submit your certification application

Step 3: Pay your first Annual Maintenance Fee (AMF)

Let’s dive in …

Step 1: Pass your exam

Which exam to take depends on your goals, and where you personally are in your cybersecurity career. You can use our Qualification Pathfinder to help chart your course: https://www.isc2.org/Certifications/Qualification-Pathfinder

Once you select the certification you want to earn, you will sit for your exam at a Pearson VUE test center. Register for your exam with Pearson VUE with the same email address as your isc2.org account. If you pass, you will receive a letter informing you of your provisional results and inviting you to the next step …

Step 2: Submit your certification application

If you’ve passed the CC exam, your certification application is quite simple. You will agree to the (ISC)² privacy policy, and then affirm your commitment to abide by the (ISC)² Code of Ethics. This code is a cornerstone of our association and all members – and (ISC)² Candidates – must agree to uphold the cannons themselves, as well as report anyone who violates the code.

If your certification has an experience requirement – for example, the CISSP requires five years of paid relevant work experience in two of the eight domains of the certification – then you will also provide evidence of this in your certification application. This step is where another (ISC)²-certified member will endorse your experience and affirm your good standing in the industry. If you don’t know another (ISC)²-ceritifed member to do this, you can provide your work experience (with proof via tax returns, letters from supervisors, letterhead documentation, etc.) and (ISC)² will review and the association itself will serve as your endorser. If you do not have the required experience needed to earn full certification status, you will become an Associate of (ISC)² and will be able to pursue your paid experience.

Step 3: Pay your first Annual Maintenance Fee (AMF)

As soon as your certification application has been approved, you will be notified via email and invited to pay your first Annual Maintenance Fee, known as your AMF. AMFs are used by (ISC)² to support the costs of maintaining the certifications and their related support systems.

If you earn the CC, or if you become an Associate of (ISC)², your AMF is U.S. $50 each year. If you earn the CISSP, CCSP, SSCP, CSSLP, CGRC or HCISPP, your AMF is U.S. $125 each year. If you are earning an additional certification (which includes the CISSP concentrations: CISSP-ISSAP, CISSP-ISSEP or CISSP-ISSMP) you will not have to pay additional AMFs beyond the one $125 payment each year.

What’s next?

Once you’re certified, you’ll get an invitation to claim your badge from Credly. This digital badge is a signifier of your accomplishment and is an easy way for you to display your credential online. You can use your badge on social media, in an email signature or on a website. When viewers click on it, they will see the knowledge, skills and abilities required to earn that credential, as well as the date that it was earned. Beyond your digital badge, you’ll receive a digital certificate to print or share online.

You’ll also have access to a variety of benefits including discounts on industry events, free online on-demand courses to support your professional development, access to a global network of professionals, such as in our online Community, to support your career growth and so much more. Stay in the know by following us on LinkedIn, Twitter and Facebook . Update your communication preferences; and subscribe to our newsletters to receive important announcements.

The post How to Earn Your (ISC)² Certification appeared first on Cybersecurity Insiders.


February 01, 2023 at 09:09AM

ERI Brings Carbon Neutral, SOC 2 Compliant Circular Economy Innovations to Indiana Businesses

PLAINFIELD, Ind.–(BUSINESS WIRE)–ERI, the nation’s largest fully integrated IT and electronics asset disposition (ITAD) provider and cybersecurity-focused hardware destruction company, now maintains nine state-of-the-art e-waste recycling facilities, including its state-of-the-art location in Plainfield, Indiana.

ERI has been providing comprehensive electronic waste recycling services for Indiana businesses and individuals since 2008 and was the first recycler in the state to be SOC 2, NAID AAA, R2 and BAN e-steward certified. ERI is also the only certified e-steward in Indiana that maintains its own data destruction, glass cleaning, comprehensive shredding and ITAD services in-house. ERI is also a fully carbon neutral organization, distinguishing the company as the world’s first electronic recycling and ITAD company to achieve carbon neutral status at all of its facilities nationwide.

“The constant and growing need for data destruction services – as well as the responsible recycling of electronic devices – for businesses, government agencies and individuals continues to grow,” said John Shegerian, Co-Founder, Chairman and CEO of ERI. “We’re proud to be able to help businesses of all sizes and industries achieve their ESG initiatives while protecting their proprietary data through responsible, fully certified ITAD and electronics recycling services performed in-house at carbon neutral facilities. Our location in Plainfield, for example, has set industry standards on a national and global level and we are proud to have been providing so many people and businesses in Indiana with access to a circular economy for their electronics, so they can do the right thing and keep e-waste out of landfills.”

With its longstanding dedication to ESG, ERI is also the recipient of an overall “A” rating (the highest grade ever awarded to a company in ERI’s industry) from the Ellen MacArthur Foundation’s Circulytics tool, which measures progress towards a circular economy.

ERI’s Indiana location, housing the world’s largest and most efficient e-waste shredding system, is located at 3100 Reeves Rd. in Plainfield; the facility maintains public receiving hours from Monday to Friday from 8 am to 2 pm. Anyone can easily get information by contacting 1-800-ERI-DIRECT (374-3473).

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States. ERI is certified at the highest level by all leading environmental and data security oversight organizations to de-manufacture, recycle, and refurbish every type of electronic device in an environmentally responsible manner. It is the first and only company in its industry to achieve carbon neutrality at all its facilities nationwide, and the first to achieve SOC 2 certification for security and data protection. ERI has the capacity to process more than a billion pounds of electronic waste annually at its nine certified locations, serving every zip code in the United States. ERI’s mission is to protect people, the planet and privacy. For more information about e-waste recycling and ERI, call 1-800-ERI-DIRECT or visit https://eridirect.com.

The post ERI Brings Carbon Neutral, SOC 2 Compliant Circular Economy Innovations to Indiana Businesses appeared first on Cybersecurity Insiders.


February 01, 2023 at 09:08AM

Russia Killnet launches DDoS attack on Netherlands and the United States

Killnet launched a Distributed Denial of Service attack(DDoS) on the healthcare websites of the United States and Netherlands, disrupting their operations for several hours. And preliminary investigations revealed that the attack was launched in retaliation for Biden’s pledge to send Abrams battle tanks to support Ukraine against Putin led nation.

The University of Michigan Hospital and Stanford Health Care Center are two of the most renowned websites that were targeted in the attack, and the campaign might intensify further to disrupt critical infrastructure in the coming weeks.

However, anticipating such threats in advance, Biden administration has issued orders to public and private entities managing the critical infrastructure to bolster their cybersecurity measures on a proactive note.

On a separate note, few of the dutch hospitals were also targeted in the attack by the Russian hacktivists. For instance, a University Medical Center hospital in the city of Groningen was also targeted with fake web traffic, but it did not affect any of the medical operations.

NOTE 1- Early last week, Killnet, apparently being funded by GRU, launched a cyber attack on private and public entities in Germany. As the country is supporting worn torn Kyiv by sending defense missile systems.

NOTE 2- A denial of service attack is caused when hackers engage thousands of bots connected in a network to launch fake web traffic. Thus, causing an overload on the servers and denies service to actual traffic causing disruption and resulting in monetary losses.

NOTE 3- Netherlands healthcare computer response team, Z-CERT acknowledged the news and attributed the attack to Killnet.

 

The post Russia Killnet launches DDoS attack on Netherlands and the United States appeared first on Cybersecurity Insiders.


January 31, 2023 at 09:24PM

Crystal Group Joins the vPAC Alliance as Charter Member

HIAWATHA, Iowa–(BUSINESS WIRE)–Crystal Group, Inc., a leading designer and manufacturer of rugged computer hardware, has been selected as a charter member of the vPAC (Virtual Protection Automation and Control) Alliance to advise and provide the compute hardware required as utilities transition to the Smart Grid and use of virtual protection relays.

According to the alliance’s website, the purpose of the group is to drive standards-based, open, interoperable and secure software-defined architecture to host protection, automation, and control solutions for power system substations. The outcome is cost savings, improved reliability, enhanced functionality and increased flexibility for electrical power systems.

The global move to a sustainable energy infrastructure places stress on the power grid as weather-dependent renewable energy sources are deployed at all layers. At the same time, new loads are being added to the grid, dramatically increasing our dependence on electricity. To combat this looming threat to the U.S. power grid, Crystal Group and the 12 other members of the vPAC Alliance were designated as industry trailblazers with the capability to provide the necessary technology.

“As a charter member of the vPAC Alliance, our solutions for the energy industry are tested and held to a higher standard than most,” said Lindsay Palma, industrial business development manager at Crystal Group. “We know the value that Crystal Group brings and are proud that technology leaders see this too.”

Through this newly formed alliance, ABB, a technology leader in electrification and automation, and Crystal Group have collaborated on a live demonstration on Crystal Group’s ES3604L24 substation server in booth 5326 at DISTRIBUTECH International 2023. This joint effort showcases Crystal Group’s ability to provide ready-now solutions to seamlessly run ABB’s IEC 61850-compliant centralized protection and control solution virtually using the company’s SSC600 SW (software) on VMware vSphere and the potential for future collaboration among members of the vPAC Alliance.

About Crystal Group, Inc.

Crystal Group, Inc. is a technology leader in rugged computer hardware, specializing in the design and manufacture of custom and commercial rugged servers, embedded computing, networking devices, displays and data storage for high reliability in harsh environments. A small, employee-owned business founded in 1987, Crystal Group provides defense, government and industrial markets with integrated solutions that bring seamless, real-time artificial intelligence, autonomy, compute power and cybersecurity to demanding edge applications.

Crystal Group products meet or exceed IEEE 61850-3 and IEEE 1613 as necessary and are backed by a five-plus-year warranty. All products are manufactured in the company’s facility, certified to ISO 9001:2015/AS9100D quality management standards.

©2023 Crystal Group, Inc. All rights reserved. All marks are property of their respective owners. Design and specifications are subject to change.

The post Crystal Group Joins the vPAC Alliance as Charter Member appeared first on Cybersecurity Insiders.


January 31, 2023 at 09:10PM

BlackCat Ransomware targets Indian Military weapons maker and Yandex Data Breach

BlackCat Ransomware has targeted an Indian firm that produces and supplies weaponry to military agencies across the subcontinent. And details are in that the hacking gang has now put the stolen data up for sale, as the victim failed to entertain their monetary demands.

Solar Industries India Limited is the firm that became a victim of the BlackCat group and data breach and security firm CloudSEK has confirmed the incident as it has gathered confidential evidence to prove its stance.

According to an update provided by CloudSEK researcher, the attack took place on the occasion of Republic Day of India, celebrated on January 26th of every year and cyber criminals stole about 2TB of data including that of a secret military information about an innovation filled weapons production.

In another incident related to data leak, Yandex, the search engine giant of Russia has cleared the air that the information steal that is being reported in the media is false and added to its statement that a former employee tried to steal the source code last week by replacing the storage vault with some text related to offensive terminology.

The company took the incident seriously and assured that none of its online services were affected by the insider threat.

A security research named Arseniy Shestakov revealed some details about the hack and stated the information steal was related to some files dating back to February 2022, the month when the leader of the nation Vladimir Putin waged a war against his country’s neighboring nation Ukraine.

Prima facie revealed that no personal data was leaked in the incident and information belonging to Git repositories was accessed by hackers.

 

The post BlackCat Ransomware targets Indian Military weapons maker and Yandex Data Breach appeared first on Cybersecurity Insiders.


January 31, 2023 at 11:24AM

Monday, January 30, 2023

Coalition Launches Coalition Insurance Company

SAN FRANCISCO–(BUSINESS WIRE)–Coalition, the world’s first Active Insurance provider designed to prevent digital risk before it strikes, today announced the launch of Coalition Insurance Company (CIC), the first full-stack, Active Cyber Insurance carrier. The launch of CIC, which recently received an A- rating from A.M. Best, is a major milestone for Coalition with the expansion of its available capacity in the cyber insurance market and transition to a full-stack insurance organization.

“The launch of Coalition Insurance Company marks a critical step in our company’s mission to protect the unprotected,” said Joshua Motta, cofounder and CEO of Coalition. “Cyber risk exists for any business—regardless of size or industry. With our own carrier, we can innovate faster to protect the broadest set of businesses from emerging cyber threats and make cyber insurance more accessible to small businesses who need it most.”

CIC, backed by Coalition’s Active Insurance platform, will unlock new growth opportunities for insurance brokers, enabling them to secure cyber protection for a broader range of clients and provide coverage to meet specific client needs. All CIC insurance policies will include robust cyber protection for small and midsize businesses (SMBs) that often lack the tools and resources to mitigate cyber risks.

Coalition Insurance Company will begin quoting its admitted cyber product in many states starting March 2023, with a national roll-out expected throughout 2023. To learn more about Coalition Insurance Company, please visit: https://www.coalitioninc.com/blog/introducing-coalition-insurance-company.

CIC is a licensed insurance company with its principal place of business in New York, New York (license #23-25930). Insurance products offered through CIC may not be available in all states. All decisions regarding any insurance products referenced herein, including approval for coverage, premium, commission, and fees, will be made solely by CIC and its representatives. All insurance products are governed by the terms, conditions, limitations, and exclusions set forth in the applicable insurance policy. Please see a copy of your policy for the full terms, conditions, and exclusions. Copyright © 2023. All rights reserved. Coalition and the Coalition logo are trademarks of Coalition, Inc. or its affiliates.

About Coalition

Coalition is the world’s first Active Insurance provider designed to prevent digital risk before it strikes. By combining comprehensive insurance coverage and cybersecurity tools, Coalition helps businesses manage and mitigate digital risks. Through its partnerships with leading global insurers, including Arch Insurance North America, Allianz, Ascot Group, Lloyd’s of London, Swiss Re Corporate Solutions, and Vantage, Coalition offers its Active Insurance products on behalf of its carrier partners in the U.S., U.K., and Canada, and its security products to organizations worldwide. Coalition’s Active Risk Platform provides automated security alerts, threat intelligence, expert guidance, and cybersecurity tools to help businesses remain resilient in the face of cyber attacks. Headquartered in San Francisco, Coalition is a distributed company with a global workforce that collaborates digitally and in office hubs.

The post Coalition Launches Coalition Insurance Company appeared first on Cybersecurity Insiders.


January 31, 2023 at 09:08AM

Fiserv Looks to Support New Payment Flows with Major Payment Institution License from Monetary Authority of Singapore

SINGAPORE–(BUSINESS WIRE)–A Fiserv, Inc. (NASDAQ: FISV) operating entity that provides payment solutions for merchants in Singapore, First Data Merchant Solutions Private Limited, has been granted a Major Payment Institution (MPI) license by the Monetary Authority of Singapore (MAS), effective January 1, 2023.

The license allows the company to provide merchant acquisition services and domestic and cross-border money transfer services under the Payment Services Act (PS Act) 2019.

Fiserv, a leading global provider of payments and financial services technology solutions that has its regional headquarters in Singapore, has been providing solutions to some of the largest banks, fintechs, and merchants in Singapore and across the Asia Pacific region for over two decades.

Fiserv provides end-to-end payment acceptance solutions for small businesses in Singapore as well as solutions for large enterprise clients, facilitating integrated payment acceptance across physical and digital channels and offering a wide range of payment methods locally and at global scale.

The MPI license permits the continued offering of merchant acquiring services in Singapore and will allow Fiserv to support new payment flows for its clients including cross-border funds transfer services and real-time account transfers.

Fiserv has a well-established Global Risk and Controls Framework and Global Cybersecurity Services to help ensure adherence to the regulations established under the PS Act in Singapore, as well as the regulatory bodies in markets around the world in which the company operates.

Fiserv, as part of the MPI license obligations and its own internal standards, will continue to enhance its rigorous compliance program, which includes anti-money laundering and anti-terrorism financing measures, as well as industry leading cybersecurity standards to protect customer data.

“Fiserv has a history of payments innovation in Singapore, and we are well-positioned and committed to expand our merchant acquiring business in the country and beyond, continuing to support the merchant community with robust and secure global payments technology enabling locally relevant payment acceptance solutions that meet the demands of today’s consumer,” said Suhaib Khanyari, General Manager of ASEAN at Fiserv.

In a world moving faster than ever before, Fiserv helps clients deliver solutions in step with the way people live and work today – financial services at the speed of life. Learn more at fiserv.com.

Additional Resources:

Fiserv in Asia Pacific – fiserv.com/en-ap

About Fiserv

Fiserv, Inc. (NASDAQ: FISV) aspires to move money and information in a way that moves the world. As a global leader in payments and financial technology, the company helps clients achieve best-in-class results through a commitment to innovation and excellence in areas including account processing and digital banking solutions; card issuer processing and network services; payments; e-commerce; merchant acquiring and processing; and the Clover® cloud-based point-of-sale and business management platform. Fiserv is a member of the S&P 500® Index and the FORTUNE 500®, and has been recognized as one of FORTUNE World’s Most Admired Companies® for 11 of the past 14 years and named among the World’s Most Innovative Companies by Fast Company for two consecutive years. Visit fiserv.com and follow on social media for more information and the latest company news.

FISV-G

The post Fiserv Looks to Support New Payment Flows with Major Payment Institution License from Monetary Authority of Singapore appeared first on Cybersecurity Insiders.


January 31, 2023 at 09:08AM

What’s Next for Data Security in 2023

By Sebastian Goodwin, CISO, Nutanix

IT budgets and revenue growth areas are top of mind at the beginning of every calendar year, even more so with the current state of the world economy. IT departments and data teams are looking at the best ways to prioritize, maintain and build security measures – while being cost effective. It’s a tricky balance to strike but an important one as security cannot be overlooked. How will this happen and how will it impact the data security industry? Now, perhaps more than ever, we can expect to see organizations make an increased push toward automation, growing competition for cybersecurity talent and major data breaches tied to employee turnover in the market.

Increased Automation

Given today’s worker shortage and a possible recession on the horizon, companies are not only finding it more difficult to hire enough people, but more importantly, there are never enough people to manually manage the thousands of threats a company is susceptible to. Developers capable of automating those manual tasks are very costly, but the good news is there are now no-code/low-code tools available that help ease cost challenges. Instead of writing code, employees are now able to drag and drop blocks to create automated workflows, making it a lot easier for companies to implement and leverage automation for their benefit. With the increased ease of automation, we will see more companies leveraging it from both a budget and consistency perspective to mitigate threats and compensate for talent.

Competition for Cybersecurity Talent

The skills gap and lack of talent is at an all-time high, meaning companies are fighting to hire and maintain the necessary talent for their departments. The cloud security space, among other industries, has experienced a welcome expansion that has raised demand to its highest levels in years. Yet, according to a survey conducted by Manpower, 45% of employers are struggling to fill roles with skilled workers thanks to the growing skills gap. This strain on talent will now extend all the way to the boardroom, new SEC requirements are set to go into effect in April 2023, which will demand all publicly traded companies disclose cybersecurity expertise on the board of directors.

Major Data Breaches

Lastly, with high turnover rates and layoffs set to continue in 2023, we will see an increase in larger data breaches due to the gaps in expertise of remaining team members or pure unfamiliarity of new team members. The inevitable loss of knowledge companies will be facing due to reshuffling or termination will leave organizations open to attacks and may lead to a major data breach. In order to protect themselves and ensure possible vulnerabilities are either mitigated or eliminated, companies will need to be very diligent, and process-orientated to ensure handovers and trainings are maintained and access is removed at the right time in a coordinated fashion.

As we enter the new year, there is no certain way to predict how the data security industry will change, but based on what we are seeing now, it is clear these three areas will significantly impact organizations’ decision-making in the coming year. Security risks are unfortunately only going to increase but so will the ability of boards and executive teams to deal with these new challenges. For those that make security a strategic priority, they will be far better equipped to deal with any new risks ahead.

 

About Nutanix

Nutanix is a global leader in cloud software and a pioneer in hyperconverged infrastructure solutions, making clouds invisible, freeing customers to focus on their business outcomes. Organizations around the world use Nutanix software to leverage a single platform to manage any app at any location for their hybrid multicloud environments. Learn more at www.nutanix.com or follow us on social media @nutanix.

About Sebastian Goodwin
Sebastian is a cybersecurity and risk management executive with experience launching products, leading consulting practices, and managing information security / compliance teams. He has worked throughout the U.S., Middle East, and Europe as an entrepreneur and as a trusted adviser and consultant.

Over the years, Sebastian has worked as a long-term consultant or employee delivering cybersecurity solutions at companies including Nutanix, Palo Alto Networks, Microsoft, NetApp, AT&T Wireless, Goldman Sachs, and Oracle (PeopleSoft).

Sebastian is a recognized IT security industry leader as the author of two books on Windows Server security as well as co-author of the Security+ certification exam. He has taught numerous courses and speaks frequently at conferences worldwide. He holds a B.S., Applied Economics from the University of San Francisco, and an MBA from the Wharton School of Business at the University of Pennsylvania.

The post What’s Next for Data Security in 2023 appeared first on Cybersecurity Insiders.


January 31, 2023 at 05:45AM

Sontiq’s BreachIQ Recognized as ‘Transformative’ With CyberSecured Fraud Protection Award

BOSTON–(BUSINESS WIRE)–Intelligent identity security firm Sontiq, a TransUnion company, is announcing that it has earned the top spot in the Fraud Protection category for the 2022 CyberSecured Awards. The company was specifically recognized for its proprietary data breach analysis capability, BreachIQ.

The annual CyberSecured Awards are issued by 1105 Media’s Security Today, an industry media brand that provides technology, education and solutions for security professionals. The awards are independently judged and honor outstanding product development achievements “considered particularly noteworthy in the transformation of cybersecurity.”

Everyone has a unique history of data exposure, which means they have different types of risk to their identity. The one-size-fits-all advice that is traditionally offered provides little value to consumers and can amplify fear and confusion, two chief reasons for costly inaction.

Sontiq’s solution is transformative because BreachIQ’s proprietary AI algorithm analyzes more than 1,300 data points using information from publicly reported data breaches, fraud risk patterns, and feeds from the Dark Web and online criminal forums. It then calculates a highly personalized risk score ranging from 1 to 10 based on the severity and risks, and provides the specific steps an individual should take to mitigate their risks.

Jim Van Dyke, senior vice president of innovation at Sontiq and an expert witness in some of the nation’s largest data breach litigation cases, notes that identity theft and fraud caused by data breaches can be financially devastating. The issue is most people aren’t equipped with enough information to respond effectively.

“Consumers and security professionals need specific, actionable insights into data breaches to proactively protect against fraud,” Van Dyke said. “Earning the CyberSecured Award validates our efforts and confirms that the cybersecurity marketplace needs more effective tools to respond to data breaches. We are honored to be recognized as a transformative product. “

He continued, “The advanced technology in BreachIQ makes it possible to mitigate the unique risks a data breach poses by analyzing the pattern of exposed personally identifiable information and recommending specific actions to address those risks.”

BreachIQ is available within Sontiq’s IdentityForce identity security product. As a public service, Sontiq has made a no-cost online version available at www.sontiq.com/breachiq/#search-breached-organizations for anyone who wants a risk assessment and recommended actions for a particular data breach.

About Sontiq

Sontiq (pronounced Son-tick), a TransUnion company, is an intelligent identity security company arming businesses and consumers with a full range of award-winning identity and cyber monitoring solutions, as well as best-in-class restoration and response offerings. Sontiq products empower millions of customers and organizations to be less vulnerable to the financial and emotional consequences of identity theft and cybercrimes. Sontiq has an outstanding track record for delivering high-touch support and fraud remediation services, demonstrated through its 93% customer satisfaction ratings. www.sontiq.com

The post Sontiq’s BreachIQ Recognized as ‘Transformative’ With CyberSecured Fraud Protection Award appeared first on Cybersecurity Insiders.


January 30, 2023 at 09:09PM

Details about TikTok Project Texas of United States

We all know that some states in the United States of America have banned the use of TikTok for causing concerns among users related to data security. To support the ban and to build trust with the populace, the governor of Texas, Greg Abbott has announced a program called ‘Project Texas’ that has a lot to do with the use of app related to the video sharing platform and can help build trust among key government stakeholders.

Project Texas is a program announced to safeguard information related to online service users within America and issues a ban against services and applications in the name of national security.

As a part of this project, the Biden led government will allow the Byte Dance’s business unit to operate its services in the United States of America, provided it follows the cyber security hygiene prescribed by TikTok’s US Data Security Inc.

To those interested, implementing project guidelines will not only be restricted to the state of Texas and will apply to all states or to those 30 states where the mobile app to offer entertainment is blocked from access.

Project Texas will be government by an independent board of experts who will review its operations as per the stipulations planned by the Committee on Foreign Investment in the United States (CFIUS).

This committee will work and deciding on an independent note and will not/never report to ByteDance or deal with the data as per the TikTok’s data dealing guidelines, like transmitting information to servers located to Beijing for further analysis of metadata.

In a news update provided by CFIUS last week, Oracle software, an Austin based company, will deal with information that is being generated and stored on the servers of the entity, most probably on the Oracle Cloud environment.

 

The post Details about TikTok Project Texas of United States appeared first on Cybersecurity Insiders.


January 30, 2023 at 11:32AM

Sunday, January 29, 2023

Identifying and securing your business’s dark data assets in the cloud

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. 

The world runs on data. That has always been true, but the power of data has perhaps never been greater than it is today. We live in the great age of information — where a seemingly infinite repository of knowledge lies at our fingertips.

But data is not, of course, only to be consumed for personal use. Indeed, the greatest impact of data is on the world of business. Data is the fuel that keeps the engines of enterprise humming.

The truth, though, is that businesses, on average, use less than half the data they accumulate. The rest is lost somewhere in the ether, where it becomes so-called “dark data” that puts your customers, your employees, and your company at risk.

What Is dark data?

One of the most significant challenges in dealing with dark data is that many business managers, even at the highest level, don’t know what it is or how to manage it. That’s a problem because all companies generate tremendous amounts of dark data simply while doing business each day.

Dark data refers to information collected through ordinary business transactions that does not serve a specific business function outside of the immediate transaction. It is information that is generated through ordinary business processes and remains even after its immediate purposes have been served.

This information might include customer email or mailing addresses, phone numbers, or purchase logs.

Because the data has no real business utility, it is often left forgotten, unorganized, and insecurely stored. And this is the true threat that dark data poses, because, even when it serves no legitimate function for your business, it can readily be exploited by bad actors for various cybercrimes, from identity theft to financial fraud.

Finding and identifying dark data 

Understanding that dark data exists and is a problem is a necessary but not sufficient step in mitigating the risk. It’s also imperative that business leaders understand where to find it, how to identify it, and what to do about it.

When it comes to finding, identifying, and managing dark data, your best strategy is going to be data mapping. With data mapping, you’ll be able to determine what data is being generated, when, how, and where. Tracing the sources of your data is often the first step in determining where it goes after it has been generated.

This, in turn, enables you to locate all the once-hidden information that has been lurking around your network, particularly in the cloud. And that means you will be better able to identify which data points have eluded your cloud data management processes and related controls.

Organizing and securing dark data in the cloud

After you’ve found and accurately identified the immense repository of dark data that is likely clogging your system (and potentially costing your company millions of dollars in storage fees each year), it’s time to get organized.

As we’ve seen, dark data can pose a significant risk to your network security and undermine your data security compliance. There is a great likelihood that much of this data is sensitive or private and should be secured but isn’t.

Organizing once “dark” data means subjecting it to rigorous analysis to understand exactly where the data should fall within the scope of your company’s system governance processes. The key is to ensure, for example, that you’re protecting your once hidden data from insider threats, such as access or exploitation by employees who do not possess the appropriate permissions.

Properly organizing your hidden data is also critical for installing an added layer of protection around your company’s sensitive information. For instance, cloud data storage, though providing significant security, is by no means invulnerable.

Cloud systems are at risk of data breaches unless proper procedures are instituted to limit access and amplify security. This might include measures to optimize cloud security such as the use of multifactor authentication processes or the encryption of the most sensitive of your now-organized dark data.

The takeaway

Dark data is an omnipresent but relatively little recognized threat to businesses, workers, and consumers today. It is the inevitable result of ordinary processes of doing business, and yet many business leaders, including highly trained tech specialists, do not know what it is or how to manage it.

Dark data is information that is generated through ordinary business transactions but that has no practical business utility beyond that immediate transaction. The data that result does not disappear, however. Rather, they linger and are often forgotten until they are found and exploited for nefarious purposes by bad actors. Learning to find, identify, and organize dark data, especially when it is stored in the cloud, is critical to protecting companies and consumers against a range of threats, including financial fraud and identity theft. 

The post Identifying and securing your business’s dark data assets in the cloud appeared first on Cybersecurity Insiders.


January 30, 2023 at 09:09AM

Versa Networks Hosting Versatility 2023 Annual User Conference Next Month

SANTA CLARA, Calif.–(BUSINESS WIRE)–Versa Networks, the recognized leader of single-vendor Unified Secure Access Service Edge (SASE), today announced that it is hosting its annual user conference “Versatility 2023” on Feb. 8 – 9.

Versatility 2023 will host a global audience of existing and prospective customers and partners presenting on how Versa’s innovations have helped them address their challenges. Participating customers include Exxon, Nordstrom, SLB, FiServ, Enbridge, VS&Co, Booz Allen Hamilton, Victoria Valley College, Starlink and AWS. Conference attendees will learn about best practices directly from their peers and also hear from Versa technology experts to advance their skills as SASE practitioners. This two-day in-person event is taking place at the Marriott in Santa Clara, Calif.

“In 2022, our first annual user conference was held virtually, and we are delighted to announce that this year it will be an in-person event,” said Martin Mackay, CRO with Versa Networks. “As the Unified SASE leader, Versa has unique insights into real-world scenarios and best practices for how SASE helps organizations address their secure networking needs, from digital transformation to supporting the continued work-from-anywhere environment. Next month’s event provides a unique opportunity for participants to meet with Versa leadership and technology experts, while also gaining valuable insight networking with their peers.”

During the event, attendees will have the opportunity to attend multiple keynote sessions where they will learn directly from Versa leaders and customers about the most important business challenges, cybersecurity trends and Versa innovations that are delivering business outcomes. In addition, attendees can participate in the break-out sessions with Versa experts to dive deep into Versa’s products and interact one-on-one with engineers who are driving Versa’s innovations.

Versatility 2023 sessions will be recorded, archived, and available on-demand following the event. Event sponsors include Neeco, Calculus Networks, Lanner, Jabil, Comcast Business, Dell Technologies, Colt, and Advantech. For more information, see https://versa-networks.com/versatility-2023/.

Versa’s single-vendor Unified SASE delivers organically developed best-of-breed functions that tightly integrate and deliver services via the cloud, on-premises, or as a blended combination of both, managed through a single pane of glass. Versa delivers SASE services such as Secure SD-WAN, Next-Generation Firewall, Next-Generation Firewall as a Service, Cloud Network Firewall, Unified Threat Management (UTM) including Advanced Threat Protection (ATP), Secure Web Gateway (SWG), Zero Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), Data Loss Prevention (DLP), Remote Browser Isolation (RBI), and User and Entity Behavior Analytics (UEBA). Versa’s single-vendor SASE platform goes above and beyond management console automation integration by providing the ability to integrate networks, points of presence, policy definitions, application definitions, agent logic, and data lakes.

As the leader in SASE, the fastest growing security and networking category, Versa is the only solution proven to deliver the industry’s leading and differentiated SASE architecture for high performance and security. Dell’Oro Group listed Versa as the 2021 SASE market share leader with 84-percent market share for the unified category in its 4Q21 Network Security Quarterly Report; and Frost and Sullivan ranks Versa as the #2 worldwide market share leader in SASE. Gartner has identified Versa SASE as having the most SASE components out of all 56 vendors Gartner evaluated. Enterprise Management Associates (EMA) also found that Versa SASE has the most SASE supported functions, as published in its industry report.

About Versa Networks

Versa Networks, the leader in single-vendor Unified SASE platforms, delivers AI/ML-powered SSE and SD-WAN solutions. The platform provides networking and security with true multitenancy, and sophisticated analytics via the cloud, on-premises, or as a blended combination of both to meet SASE requirements for small to extremely large enterprises and Service Providers. Thousands of customers globally with hundreds of thousands of sites and millions of users trust Versa with their mission critical networks and security. Versa Networks is privately held and funded by Sequoia Capital, Mayfield, Artis Ventures, Verizon Ventures, Comcast Ventures, BlackRock Inc., Silicon Valley Bank, Liberty Global Ventures, Princeville Capital, RPS Ventures and Triangle Peak Partners. For more information, visit https://www.versa-networks.com or follow Versa Networks on Twitter @versanetworks.

Versa Networks, VOS, the Versa logo, and Versa Titan are or may be registered trademarks of Versa Networks, Inc.

The post Versa Networks Hosting Versatility 2023 Annual User Conference Next Month appeared first on Cybersecurity Insiders.


January 30, 2023 at 09:08AM

Julie Cullivan Joins Astra Board of Directors

ALAMEDA, Calif.–(BUSINESS WIRE)–Astra Space, Inc. (“Astra”) (NASDAQ: ASTR), a provider of products and services to the global space industry, is proud to announce the appointment of Julie Cullivan to the Astra Board of Directors effective February 1, 2023. Ms. Cullivan will also join Astra’s Audit Committee.

Ms. Cullivan has held executive positions at FireEye, Autodesk, Forescout, McAfee, EMC, and Oracle. She is a recognized leader in cybersecurity and compliance and a sought-after speaker on topics including security as a boardroom imperative, women in security, innovation, and building high impact teams.

“Julie’s leadership will be instrumental as Astra focuses on delivering the next version of its launch system and spacecraft engines to support mission-critical applications that demand the highest levels of security and reliability,” said Chris Kemp, Founder, Chairman, and CEO of Astra. “Her perspective and expertise will be invaluable to the organization, and we are excited to have her join our Board of Directors.”

“I am thrilled to be joining Astra’s board during this time of focus on operational excellence and growth,” said Cullivan. “I look forward to bringing my software, security, and operational expertise to the leadership team and the board as we begin scaling production of mission-critical spacecraft engines, and the rigor required to deliver reliable launch services at scale.”

Ms. Cullivan has a B.S. degree in Finance from Santa Clara University and brings extensive business, information technology, and cybersecurity expertise to the Astra Board of Directors. In addition to Astra, she serves on the board of directors for Axon Enterprise, Inc. and HeartFlow, Inc.

About Astra

Astra’s mission is to improve life on Earth from space® by creating a healthier and more connected planet. Today, Astra offers one of the lowest cost-per-launch dedicated orbital launch services of any operational launch provider in the world, and one of the industry’s first flight-proven electric propulsion systems for satellites, Astra Spacecraft Engine™. Astra delivered its first commercial launch to low Earth orbit in 2021, making it the fastest company in history to reach this milestone, just five years after it was founded in 2016. Astra (NASDAQ: ASTR) was the first space launch company to be publicly traded on Nasdaq. Visit astra.com to learn more about Astra.

Safe Harbor Statement

Certain statements made in this press release are “forward-looking statements”. Forward-looking statements may be identified by the use of words such as “anticipate”, “believe”, “expect”, “estimate”, “plan”, “outlook”, and “project” and other similar expressions that predict or indicate future events or trends or that are not statements of historical matters, including the timing of when we may file our quarterly report on Form 10-Q and those risks and uncertainties described from time to time in other reports and other public filings with the Securities and Exchange Commission.

The post Julie Cullivan Joins Astra Board of Directors appeared first on Cybersecurity Insiders.


January 29, 2023 at 09:09PM

ISG to Publish Reports on Power and Utilities Industry

STAMFORD, Conn.–(BUSINESS WIRE)–Information Services Group (ISG) (Nasdaq: III), a leading global technology research and advisory firm, has launched research studies examining providers of services and software platforms to the global power and utilities industry, which is adopting new technologies in response to rising demand for renewable energy and other widespread changes in its business environment and operations.

The study results on power and utilities services will be published in a comprehensive ISG Provider Lens™ report, called Power and Utilities Industry — Services and Solutions 2023, scheduled to be released in June. The report will cover companies offering services for business process management, grid modernization, asset management and customer experience. At the same time, ISG Provider Lens™ will publish the Power and Utilities Industry — Software and Platforms 2023 report, covering providers of enterprise asset management software.

Enterprise buyers will be able to use information from the reports to evaluate their current vendor relationships, potential new engagements and available offerings, while ISG advisors use the information to recommend providers to the firm’s buy-side clients.

Power and utility companies face growing pressures to improve resiliency and reliability, comply with new regulations, change their mix of energy sources and respond to geopolitical disruptions. Demand for renewable energy is soaring, while the growing prevalence of extreme weather events is challenging utilities’ ability to reliably deliver services. Increasingly, the industry is turning to providers of services and software for help in adapting to new requirements, improving customer experience and developing new business models. Efficiency, security, innovation and asset management are among the industry’s growing needs.

“New technology is essential for the power and utility industry to adapt to the unprecedented changes taking place today,” said Jan Erik Aase, partner and global leader, ISG Provider Lens Research. “Leading software and services providers empower clients to strengthen their capabilities with a minimum of technical debt.”

For the Power and Utilities Industry — Services and Solutions study, ISG has distributed surveys to approximately 100 power and utilities service providers. Working in collaboration with ISG’s global advisors, the research team will produce five quadrants representing the services and solutions the typical energy and utilities enterprise is buying, based on ISG’s experience working with its clients. The five quadrants are:

  • Intelligent Business Process Management Services (iBPMS), evaluating providers of BPM services that use automation and analytics to improve management of business processes, including customer service, sourcing and procurement, human resources, finance and accounting and regulatory compliance.
  • Next-Gen IT Services, assessing companies that provide IT managed services, including application development and maintenance (ADM), infrastructure and cybersecurity services and systems integration, to the power and utilities industry.
  • Grid Modernization, covering providers of services, including grid modeling, distributed energy resources management systems (DERMS), geographic information systems (GIS) and supervisory control and data acquisition (SCADA), that help utilities make grids more resilient and responsive to demand.
  • Enterprise Asset Management (EAM), evaluating providers of services and solutions that allow power and utility companies to increase asset performance and life, including asset lifecycle management, remote monitoring, and application maintenance and support.
  • Customer Information Systems (CIS) and Customer Experience (CX), assessing companies offering meter-to-cash (M2C), customer service and business process solutions for power and utility CIS platforms, encompassing account management, order processing, billing, rate design and other functions.

For the Power and Utilities Industry — Software and Platforms study, ISG has distributed surveys to more than 30 power and utilities platform providers. The quadrant to be covered is:

  • Enterprise Asset Management (EAM) Software Solutions, evaluating providers of EAM software that enables power and utility companies to manage and maintain assets throughout the lifecycle, from capital planning and procurement through disposal.

The power and utilities services report will examine products and services available in North America, Europe and Australia. The software and platforms report will examine platforms for the global market. ISG analysts Swadhin Pradhan, Mohd. Aves Malik, Harish B and Sandhya Navage will serve as authors of both reports.

A list of identified providers and vendors and further details on the power and utilities services study is available in this digital brochure; details on the software and platforms report can be found in this brochure. Companies not listed in either brochure can contact ISG and ask to be included in the study.

All 2023 ISG Provider Lens™ evaluations feature expanded customer experience (CX) data that measures actual enterprise experience with specific provider services and solutions, based on ISG’s continuous CX research. Enterprise customers wishing to share their experience about a specific provider or vendor are encouraged to register here to receive a personalized survey URL. Participants will receive a copy of this report in return for their feedback.

About ISG Provider Lens™ Research

The ISG Provider Lens™ Quadrant research series is the only service provider evaluation of its kind to combine empirical, data-driven research and market analysis with the real-world experience and observations of ISG’s global advisory team. Enterprises will find a wealth of detailed data and market analysis to help guide their selection of appropriate sourcing partners, while ISG advisors use the reports to validate their own market knowledge and make recommendations to ISG’s enterprise clients. The research currently covers providers offering their services globally, across Europe, as well as in the U.S., Canada, Brazil, the U.K., France, Benelux, Germany, Switzerland, the Nordics, Australia and Singapore/Malaysia, with additional markets to be added in the future. For more information about ISG Provider Lens research, please visit this webpage.

A companion research series, the ISG Provider Lens Archetype reports, offer a first-of-its-kind evaluation of providers from the perspective of specific buyer types.

About ISG

ISG (Information Services Group) (Nasdaq: III) is a leading global technology research and advisory firm. A trusted business partner to more than 800 clients, including more than 75 of the world’s top 100 enterprises, ISG is committed to helping corporations, public sector organizations, and service and technology providers achieve operational excellence and faster growth. The firm specializes in digital transformation services, including automation, cloud and data analytics; sourcing advisory; managed governance and risk services; network carrier services; strategy and operations design; change management; market intelligence and technology research and analysis. Founded in 2006, and based in Stamford, Conn., ISG employs more than 1,300 digital-ready professionals operating in more than 20 countries—a global team known for its innovative thinking, market influence, deep industry and technology expertise, and world-class research and analytical capabilities based on the industry’s most comprehensive marketplace data. For more information, visit www.isg-one.com.

The post ISG to Publish Reports on Power and Utilities Industry appeared first on Cybersecurity Insiders.


January 29, 2023 at 09:09PM

Saturday, January 28, 2023

Verimatrix Secure Delivery Platform Marks Its First Year with Billions of Video Viewership Licenses Served

AIX-EN-PROVENCE, France & SAN DIEGO–(BUSINESS WIRE)–Regulatory News:

Verimatrix, (Euronext Paris: VMX) (Paris:VMX), the leader in powering the modern connected world with people-centered security, today announced its Verimatrix Secure Delivery Platform quickly reached billions of delivered video viewership licenses in less than a year since its launch. The company also debuts key enhancements that provide even greater value to media companies, content owners, streaming media providers and operators.

As a single pane of glass experience, the Verimatrix platform secures enterprises by protecting and monitoring their content, applications and devices through a streamlined cloud-based solution that brings a highly noticeable combination of cost savings and efficiency while also maximizing agility for the content delivery process. Newly released enhancements include:

  • Full Verimatrix XTD integration, including App Shield and threat monitoring – offering unmatched visibility into potentially dangerous enterprise threat blind spots
  • Integration for Splunk, IBM, QRadar and Elastic Security, allowing users’ SOCs to investigate alerts and related data more deeply
  • Enhanced support for premium video on demand (PVOD) and its associated encryption requirements – new Common Media Application Format (CMAF) support helps lower costs with an “encode and encrypt once, deliver many” approach
  • Support for the widest variety of encoder applications and Content Protection Information Exchange Format (CPIX), enabling a seamless connection with the Verimatrix Platform and providing enhanced support for authentication
  • Cloud-based content protection monitoring capabilities are now available through the Verimatrix Video Content Authority System (VCAS), offering the option of best of cloud-enabled monitoring capabilities to on-premises Verimatrix customers

“Verimatrix is committed to arming customers with the latest technologies that protect their revenues and make scaling easy as well as cost effective,” said Sebastian Braun, head of streaming at Verimatrix. “The release of our platform enhancements fittingly coincides with the milestone of delivering billions of video viewership licenses within the first year of its launch, as they reflect our position as a top innovator that specializes in integrating cybersecurity and anti-piracy technologies in such a way that we serve as a business enablement and growth solution.”

Strategic partners such as encoders, players, middleware vendors and content delivery networks (CDNs) can connect their services to the Verimatrix Secure Delivery Platform to enable free trials, provide faster onboardings, and assist joint customers to improve their bottom line. For more information on the platform, visit www.verimatrix.com/platform.

About Verimatrix

Verimatrix (Euronext Paris: VMX) helps power the modern connected world with security made for people. We protect digital content, applications, and devices with intuitive, people-centered and frictionless security. Leading brands turn to Verimatrix to secure everything from premium movies and live streaming sports, to sensitive financial and healthcare data, to mission-critical mobile applications. We enable the trusted connections our customers depend on to deliver compelling content and experiences to millions of consumers around the world. Verimatrix helps partners get to market faster, scale easily, protect valuable revenue streams, and win new business. Visit www.verimatrix.com.

The post Verimatrix Secure Delivery Platform Marks Its First Year with Billions of Video Viewership Licenses Served appeared first on Cybersecurity Insiders.


January 29, 2023 at 09:08AM

No experience, No Problem – (ISC)² Recruits 140,000 Individuals Interested in a Cybersecurity Career

No experience No Problem(ISC)² launched a new initiative for individuals pursuing or considering a career in cybersecurity. The goal? To create new pathways to cybersecurity career success and decrease the global workforce gap.

Within three months of launching this initiative, we had more than 110,000 individuals sign up to become (ISC)² Candidates. The offering provides education courses, study materials and resources to help prepare those looking to enter cybersecurity. Additionally, the aim is to encourage (ISC)² Candidates to pursue the recently launched entry-level certification (ISC)² Certified in Cybersecurity (CC).

The immediate success of (ISC)² Candidates showed us there was no shortage of interest in cybersecurity; the challenge is creating new pathways for those with no experience or background to enter the field.

In fact, in December, at SECURE Washington, DC, we heard first-hand the impact of (ISC)² Candidates. Christopher Shaw, a first-time attendee of (ISC)² events, recently passed the Certified in Cybersecurity exam. Christopher is seeking a career transition into cybersecurity – and is working on completing relevant training through (ISC)², and practical applications, to kickstart his cybersecurity career. 

What have we learned? There is no single pathway into cybersecurity, which rings true in our 2022 (ISC)² Workforce Study. We are seeing a shift in how people enter the field, with fewer individuals under 30 years of age moving into cybersecurity from a career outside of IT. The evolution showcases the importance of helping those enter the profession through non-traditional methods.

We are thrilled with the early success of (ISC)² Candidates as it showcases a steady interest in cyber education and training for individuals looking to enter the field. At (ISC)², we are preparing these individuals by providing a new entry path into the profession through this initiative.

It's not too late to sign up to become an (ISC)² Candidate! To sign up:

  1. Register for free at isc2.org/candidate. You will be prompted to create an account with (ISC)² and answer a few questions about your cybersecurity career goals.
  2. After completing the (ISC)² Candidate registration, you will be redirected to the benefits page. From there, you can enroll in the Online Self-Paced Training and get instructions for redeeming your free exam when you're ready to take the test.

Your first year as an (ISC)² Candidate is free, so don’t miss out. Questions? Talk to us at candidate@isc2.org – we hope you'll join us!

The post No experience, No Problem – (ISC)² Recruits 140,000 Individuals Interested in a Cybersecurity Career appeared first on Cybersecurity Insiders.


January 28, 2023 at 09:09PM

RealDefense Acquires SUPERAntiSpyware From Support.com

PASADENA, Calif.–(BUSINESS WIRE)–RealDefense LLC, a company that specializes in privacy, security, and productivity software and services, has completed its roll-up of SUPERAntiSpyware from Support.com for an undisclosed amount. This transaction marks the fifth consumer software brand acquisition for RealDefense since 2017, as part of its roll-up strategy.

SUPERAntiSpyware, founded in 2004, is known for its AI-powered malware detection engine and database. Its flagship product has over 65 million downloads and more than one million active users. The sale allows Support.com to focus on its core business of providing technical support solutions.

RealDefense plans to leverage its successful roll-up and M&A strategy of up-selling, cross-selling, and technology licensing to scale SUPERAntiSpyware to its full potential. RealDefense’s roll-up strategy focuses on acquiring software companies that offer privacy, cybersecurity, and productivity for PCs, Macs, and mobile devices, which it can market to consumers and small businesses through its network of 20,000+ retail stores, resellers, licensing partners, and affiliates in 33 countries.

“We’re excited to welcome SUPERAntiSpyware into our portfolio of brands as part of our roll-up strategy, and we congratulate the team on building an amazing technology and product,” said Gary Guseinov, CEO of RealDefense.

About RealDefense LLC

RealDefense LLC, headquartered in Pasadena, CA, develops award-winning software that optimizes and secures digital devices. Its flagship product, iolo System Mechanic®, is consistently rated #1 by PC Magazine and has more than 1 million customers. Other privacy and security software brands in the RealDefense portfolio include: iolo, STOPzilla, MyCleanID, MyCleanPC, USTechSupport, Iolo VPN, GetMyDrivers, WarrantyStar, iolo SafeSearch, and SUPERAntiSpyware.

By leveraging telemetry and AI, RealDefense partners with leading brands to provide white-labeled privacy, security and productivity features and services to existing products.

Visit realdefen.se for more information.

The post RealDefense Acquires SUPERAntiSpyware From Support.com appeared first on Cybersecurity Insiders.


January 28, 2023 at 09:09PM

Friday, January 27, 2023

IronNet Announces Receipt of Continued Listing Standard Notice from NYSE

MCLEAN, Va.–(BUSINESS WIRE)–IronNet, Inc. (NYSE: IRNT) announced today that it received written notice on January 24, 2023 from the New York Stock Exchange (NYSE) that the Company is not in compliance with the NYSE continued listing standards, which require it to maintain: (i) a minimum average closing price of at least $1.00 per share over a consecutive 30-day trading period; and (ii) an average global market capitalization of at least $50.0 million over a consecutive 30-day trading period and, at the same time, a total stockholders’ equity equal to or greater than $50.0 million. In accordance with applicable NYSE procedures, the Company has 45 days from receipt of the notice to submit a plan that would bring it into compliance with the minimum global market capitalization listing standard within 18 months of receipt of the notice. As previously announced, the Company has until April 25, 2023 to achieve compliance with the minimum share price listing standard deficiency.

The Company intends to develop and submit a plan to bring it into compliance with the NYSE listing standards within the required time-frame by pursuing measures that are in the best interests of the Company and its shareholders.

The notice has no immediate impact on the Company’s common stock, and provided the NYSE approves the plan, the Company’s common stock will continue to be listed and traded on the NYSE under its existing ticker symbol, with the addition of a suffix indicating the “below compliance” status of its common stock, as “IRNT.BC.” The notice does not affect the Company’s business operations, or its Securities and Exchange Commission reporting requirements, and does not conflict with or trigger any violation under the Company’s material equity and debt financing agreements.

About IronNet

Founded in 2014 by GEN (Ret.) Keith Alexander, IronNet, Inc. (NYSE: “IRNT”) is a global cybersecurity leader that is transforming how organizations secure their networks by delivering the first-ever Collective Defense platform operating at scale. Employing a number of former NSA cybersecurity operators with offensive and defensive cyber experience, IronNet integrates deep tradecraft knowledge into its industry-leading products to solve the most challenging cyber problems facing the world today. For more information, visit www.ironnet.com.

Forward-Looking Statements

This press release includes “forward-looking statements” within the meaning of the “safe harbor” provisions of the United States Private Securities Litigation Reform Act of 1995, including, without limitation, statements regarding IronNet’s intent to submit a plan bring it into compliance with the NYSE listing standards. When used in this press release, the words “estimates,” “projected,” “expects,” “anticipates,” “forecasts,” “plans,” “intends,” “believes,” “seeks,” “may,” “will,” “should,” “future,” “propose” and variations of these words or similar expressions (or the negative versions of such words or expressions) are intended to identify forward-looking statements. These forward-looking statements are not guarantees of future performance, conditions, or results, and involve a number of known and unknown risks, uncertainties, assumptions and other important factors, many of which are outside IronNet’s management’s control, that could cause actual results or outcomes to differ materially from those discussed in the forward-looking statements. Important factors, among others, that may affect actual results or outcomes include: IronNet’s ability to continue as a going concern; risks and uncertainties associated with a potential filing for relief under the United States Bankruptcy Code; IronNet’s inability to recognize the anticipated benefits of collaborations with IronNet’s partners and customers; IronNet’s ability to execute on its plans to develop and market new products and the timing of these development programs; the rate and degree of market acceptance of IronNet’s products; the success of other competing technologies that may become available; the performance of IronNet’s products; potential litigation involving IronNet; and general economic and market conditions impacting demand for IronNet’s products. The foregoing list of factors is not exhaustive. You should carefully consider the foregoing factors and the other risks and uncertainties described under the heading “Risk Factors” in IronNet’s Annual Report on Form 10-K for the year ended January 31, 2022, filed with the Securities and Exchange Commission (the “SEC”) on May 2, 2022, IronNet’s most recent Quarterly Report on Form 10-Q for the quarter ended July 31, 2022, filed with the SEC on September 14, 2022, and other documents that IronNet files with the SEC from time to time. These filings identify and address other important risks and uncertainties that could cause actual events and results to differ materially from those contained in the forward-looking statements. Forward-looking statements speak only as of the date they are made. Readers are cautioned not to put undue reliance on forward-looking statements, and IronNet does not undertake any obligation to update or revise any forward-looking statements, whether as a result of new information, future events or otherwise, except as required by law.

The post IronNet Announces Receipt of Continued Listing Standard Notice from NYSE appeared first on Cybersecurity Insiders.


January 28, 2023 at 09:09AM

AT&T Cybersecurity awarded the Palo Alto Networks 2022 Partner of the Year Award

AT&T Cybersecurity received the Palo Alto Networks 2022 Partner of the Year Award for its managed security services at the annual Palo Alto Networks Ignite 2022 conference. The awards are presented to an elite group of Palo Alto Networks partners that have excelled in performance, enablement, and engagement over the past year.

In an era where security collaboration continues to grow in importance, AT&T Cybersecurity stressed the significance of its relationship with Palo Alto Networks. Danessa Lambdin, President of AT&T Cybersecurity explains:

 As one of the largest MSSPs in the world, we are in a unique position to help secure innovation at scale and bring those lessons learned to our broader customer base. Our technology alliances are a fundamental part of evolving our cybersecurity services to meet our customer needs today and tomorrow.  AT&T has long worked with Palo Alto Networks, building new services atop their technology platforms to meet tomorrow's security challenges, especially as customers move to the cloud and edge.

By maintaining a strong relationship with Palo Alto Networks, AT&T Cybersecurity is able to provide cutting-edge security products while leveraging its managed services to make security more accessible by offering trainings, consulting, and management. Don Jones, senior vice present of Ecosystems at Palo Alto Networks states:

Palo Alto Networks partners share our vision of a world where each day is safer and more secure than the one before. Now more than ever, a trusted ecosystem of partners is essential to enabling organizations to easily, more confidently, and more securely transform. We’re proud to recognize AT&T Cybersecurity as Palo Alto Networks 2022 Partner of the Year and we look forward to our continued work together helping mutual customers achieve better security outcomes.

AT&T Cybersecurity combines cybersecurity with consulting services to help organizations meet their network transformation goals. With AT&T’s support, overcome resource obstacles and ease the burden on short-staffed, in-house teams by working with AT&T’s cyber experts to identify and understand cybersecurity risks and exposures, thereby making it safer for businesses to innovate through network resiliency.

For more information on AT&T Cybersecurity please visit this page. For more information on Palo Alto Networks, please visit this page.

The post AT&T Cybersecurity awarded the Palo Alto Networks 2022 Partner of the Year Award appeared first on Cybersecurity Insiders.


January 27, 2023 at 09:09PM