USS White Plains (CVE-66)

Cycode Launches Raven, an Open Source Security Scanner to Bolster CI/CD Pipeline Security

Retrieved on: 
Wednesday, October 25, 2023

SAN FRANCISCO, Oct. 25, 2023 (GLOBE NEWSWIRE) -- Cycode , makers of the leading Application Security Posture Management (ASPM) platform, today announced the release of Raven, a CI/CD pipeline security scanner.

Key Points: 
  • SAN FRANCISCO, Oct. 25, 2023 (GLOBE NEWSWIRE) -- Cycode , makers of the leading Application Security Posture Management (ASPM) platform, today announced the release of Raven, a CI/CD pipeline security scanner.
  • As companies migrate to the cloud, security leaders are seizing the opportunity to "shift security left."
  • And, despite the increasing overlap between security and development teams, they continue to work in silos, compounding miscommunications and process breakdowns.
  • "Similar to Cimon , Raven is another free tool created by the Cycode team to help organizations strengthen their pipeline security and AppSec posture,” said Oreen Livni, Senior Security Researcher at Cycode.

FortiGuard Labs: Organizations Detecting Ransomware Decline as the Volume and Impact of Targeted Attacks Continue to Rise

Retrieved on: 
Monday, August 7, 2023

Highlights of the report follow:

Key Points: 
  • Highlights of the report follow:
    Organizations Detecting Ransomware Are on the Decline: FortiGuard Labs has documented substantial spikes in ransomware variant growth in recent years, largely fueled by the adoption of Ransomware-as-a-Service (RaaS).
  • However, FortiGuard Labs found that fewer organizations detected ransomware in the first half of 2023 (13%) compared to this time five years ago (22%).
  • This first-of-its-kind analysis can serve as the canary in the coal mine, giving CISOs and security teams an early indication of targeted attacks against their organizations.
  • Learn more about FortiGuard Labs threat intelligence and research and Outbreak Alerts , which provide timely steps to mitigate breaking cybersecurity attacks.

Forward Networks Recognized with Global InfoSec Award for Cloud Security

Retrieved on: 
Tuesday, May 9, 2023

SANTA CLARA, Calif., May 9, 2023 /PRNewswire/ -- Forward Networks announced today it has been recognized with the Hot Company in Cloud Security Award from Cyber Defense Magazine's 2023 Global InfoSec Awards. The company is revolutionizing the way large networks are managed through its advanced software that delivers a "digital twin" of the network, enabling network operators to visualize the network, confirm policy compliance, and simplify network management. The platform supports devices from all major networking vendors and cloud operators, including AWS, Azure, and Google Cloud Platform.

Key Points: 
  • SANTA CLARA, Calif., May 9, 2023 /PRNewswire/ -- Forward Networks announced today it has been recognized with the Hot Company in Cloud Security Award from Cyber Defense Magazine's 2023 Global InfoSec Awards.
  • The platform supports devices from all major networking vendors and cloud operators, including AWS, Azure, and Google Cloud Platform.
  • "We're honored to receive the Hot Company in Cloud Security award from Cyber Defense Magazine's Global InfoSec Awards," said David Erickson, CEO and co-founder, Forward Networks.
  • The full list of 2023 Cyber Defense Magazine Global InfoSec Award winners can be found here: http://www.cyberdefenseawards.com/

92% of Network Operations and Security Professionals Say There are More Network Updates Needed Than They Can Keep Up With

Retrieved on: 
Tuesday, March 28, 2023

DALLAS, March 28, 2023 /PRNewswire/ -- BackBox, the world's most trusted network automation company, has released the results of its "2023 Network Operations and Security Survey," conducted by Wakefield Research. This survey of 250 Network Operations and Security professionals at companies with 500 or more employees was completed last month. The results show the frustration felt by these key IT professionals due to the increase in network update velocity and tech stack sprawl, a lack of support from leadership, along with disagreements and concerns around the approach to fixing network issues.

Key Points: 
  • This survey of 250 Network Operations and Security professionals at companies with 500 or more employees was completed last month.
  • The vast majority of network security and operations pros (92%) say there are more network updates needed than they can keep up with.
  • On average, network security and operations professionals make use of four tools for network automation, including nearly half (45%) who use five or more.
  • Overcoming barriers to increasing network automation may be difficult, but it is crucial to make the most of network security and operations professionals' expertise.

Nozomi Networks Labs Report Finds Ruin vs. Ransom Dominates 2022 Threat Landscape

Retrieved on: 
Wednesday, January 18, 2023

SAN FRANCISCO, Jan. 18, 2023 (GLOBE NEWSWIRE) -- The latest OT/IoT security report from Nozomi Networks Labs finds wiper malware, IoT botnet activity, and the Russia/Ukraine war significantly influenced the 2022 threat landscape.

Key Points: 
  • SAN FRANCISCO, Jan. 18, 2023 (GLOBE NEWSWIRE) -- The latest OT/IoT security report from Nozomi Networks Labs finds wiper malware, IoT botnet activity, and the Russia/Ukraine war significantly influenced the 2022 threat landscape.
  • “Over the past six months, cyberattacks have increased significantly, causing major disruption to industries ranging from transportation to healthcare,” said Roya Gordon, Nozomi Networks OT/IoT Security Research Evangelist.
  • Nozomi Networks Labs uncovered growing security concerns as botnets continue to use default credentials in attempts to access IoT Devices.
  • Nozomi Networks’ “OT/IoT Security Report: A Deep Look into the ICS Threat Landscape” provides security professionals with the latest insights needed to re-evaluate risk models and security initiatives, along with actionable recommendations for securing critical infrastructure.

Four Reasons Why You Shouldn't Miss the GreyNoise "Stop Chasing Ghosts" Road Show

Retrieved on: 
Thursday, October 6, 2022

WASHINGTON, Oct. 6, 2022   /PRNewswire-PRWeb/ -- GreyNoise Intelligence, the cybersecurity company analyzing internet scanning traffic to separate threats from background noise, today announced that registration has opened for its "Stop Chasing Ghosts" Road Show, to be held in six cities throughout the United States in the month of October 2022:

Key Points: 
  • "Our workshop series is called 'Stop Chasing Ghosts' because it is dedicated to helping security teams focus on legitimate cybersecurity threats, rather than wasting time investigating irrelevant alerts."
  • The GreyNoise "Stop Chasing Ghosts" Road Show is designed to help security teams learn to quickly identify threats, prioritize alerts, and pinpoint trending internet attacks targeting specific vulnerabilities and CVEs.
  • Here are four key things you will learn how to do in this half day workshop:
    To see the agenda and register for the GreyNoise "Stop Chasing Ghosts" Roadshow, please visit https://www.greynoise.io/road-show-2022-request-invite .
  • GreyNoise is trusted by Global 2000 enterprises, government organizations, top security vendors and tens of thousands of threat researchers.

DHS CISA Expands the Continuous Diagnostics and Mitigation Approved Product List to Secure Firmware Supply Chain, A First for the Agency

Retrieved on: 
Tuesday, July 19, 2022

Eclypsium today announced that it has been added to Cybersecurity and Infrastructure Security Agencys (CISA) Continuous Diagnostics and Mitigation (CDM) Approved Products List (APL).

Key Points: 
  • Eclypsium today announced that it has been added to Cybersecurity and Infrastructure Security Agencys (CISA) Continuous Diagnostics and Mitigation (CDM) Approved Products List (APL).
  • As of July 9, 2022, the list contained 786 actively exploited CVEs, 185 of which were caused by firmware vulnerabilities.
  • The immediate actions of CISA are a strong defense against the large-scale firmware attacks targeting enterprise and network infrastructure.
  • The Eclypsium platform secures your hardware supply chain by monitoring devices for firmware threats, critical risks, and patching firmware across the entire hardware fleet.