Cyber Security News

Patented directed graph model delivers immediate, low-risk visibility of your identities and access in days, not months   Gold Coast,
LogRhythm Axon is Now Available to RedLegg Customers as Part of its Results-Driven Security Offerings   BROOMFIELD, Colo., April 9,
The U.S. Cyber Safety Review Board found that Microsoft could have stopped Chinese state actors from hacking government emails in
The House of Representatives passed legislation today that would effectively ban TikTok in the United States. Industry experts weigh in:
Today, the White House issued an executive order starting a rulemaking process to add cyber requirements to US ports aimed
By Joe Parkinson and Drew Hinshaw Feb. 18, 2024 1:49 pm ET Christopher Wray warns that pre-positioned malware could be
Report from Sentinel Labs: China launched an offensive media strategy to push narratives around US hacking operations following a joint
Wyden Releases Documents Confirming the NSA Buys Americans’ Internet Browsing Records; Calls on Intelligence Community to Stop Buying U.S. Data
By Gordon G. Chang Jan 22, 2024 Last month, Newsweek reported that the Department of Defense had funded a Chinese-born researcher, Song-Chun Zhu, who
The U.S. presidential election comes at a time of ideal circumstances for disinformation and the people who spread it. By Brandy

Cyber Security News

Why track cyber security news? Cyber security is a world unto itself. It’s a profession, an IT discipline and now a major industry. Companies, consumers and governments are spending billions of dollars a year on cyber security. Security also pervades many areas of life that have little to do, seemingly, with cyberspace. Thus, to keep up with the world in general, it’s helpful to stay aware of news that relates to cyber security.

For example, the dispute between the US government and Huawei is at once about international trade, national security, telecom industry competition… and cybersecurity. Security is a root issue with Huawei, given the suspicions about the company’s connections to the Chinese Communist Party (CCP). However, the company’s size, reach and technological innovation push the matter to the forefront of US-China relations.

cyber security newsOr, take consumer cyber risks. We cover cyber security news that deals with consumers’ exposure to cybercrime and fraud. Consumers are increasingly at risk for identity theft, credit card and other malfeasance at the hands of cyber criminals. The articles we curate on this subject come from law enforcement publications, mainstream media and specialized blogs.

Public policy is now being influenced (or should be) by cyber security news. Policy makers should be aware of how cyber security affect their jobs and constituents’ lives. For instance, the “smart city” is both an innovation and a threat. Using IoT sensors and advanced data analytics to improve municipal services is a great idea. However, the smart city also exposes government data to breach.

This is particularly urgent given the relatively insecure technologies (e.g. Chinese-made sensors) used for the smart city and the wireless connectivity that make it all possible. Add malicious nation-state actors to the mix, such as the ones currently paralyzing American cities with ransomware, and one can see the potential danger.

 

Gathid Sets New Identity and Access Governance Standard with Introduction of Patented Identity Model 

Patented directed graph model delivers immediate, low-risk visibility of your identities and access in days, not months

 

Gold Coast, Australia and Seattle, Washington– April 10, 2024 – Gathid (ASX: GTH) today announced the debut of its new approach to identity and access governance. Inspired by the power of gathered identities, the platform pinpoints identity and access anomalies with its patented directed graph model. Designed for rapid deployment, immediate applicability, and smooth integration across complex IT infrastructures, this solution tackles the critical need for scalable and cost-effective identity management.

 

A New Approach to Identity and Access Governance

Identity and access management (IAM) solutions require centralized approaches. This results in reliance on a single or small handful of vendors to facilitate large-scale continuous deployments that maintain real-time identity concurrency between all systems. These large-scale deployments come at a high cost to purchase, migrate, and enable.

 

Building on 20 years of dedicated experience solving complex physical security challenges for some of the largest companies in the world, Peter Hill, founder and CEO of Gathid, and his team identified a need for a solution that seamlessly integrates with existing infrastructure to help organizations tackle today’s increasingly complex identity security challenges. In Q4 2023, Gathid successfully transitioned from physical security to identity governance to address this gap. This strategic move leverages Gathid’s international scale to address the growing need for robust identity and access management.

 

“While deploying our physical access security products for some of the world’s largest companies, including five of the Fortune 500’s top 50 companies, we saw firsthand how much identity debt most organizations carry,” Hill said. “We realized organizations that are not as mature as these industry giants didn’t have the resources to effectively identify who has access to what and – more importantly – whether they should have access at all. This inspired us to invent a solution that helps organizations gain the visibility they need to strengthen access management without completely overhauling their people, processes, physical infrastructure, and technology.”

 

Key Capabilities

Gathid’s strength lies in its novel application of a patented directed graph model for identity and access improvements. It offers a fast-to-deploy, resource-efficient approach that can function across disconnected systems in hybrid and multi-cloud environments. This dynamic patented identity model, known as the “Gathid Graph,” is automatically reconstructed daily from the ground up, liberating organizations from the constraints of system syncs and incomplete delta reports. If your automation misses a beat, Gathid highlights what’s amiss, directing users’ focus to critical compliance clean-up areas. This ongoing daily refresh cycle is crucial in maintaining an ever-accurate, ever-compliant identity and access ecosystem.

 

Key benefits include:

  • Identity graph technology: Gathid’s patented approach constructs a daily identity graph model, enabling the representation of virtual data relationships between identities and access rights to systems. This provides a comprehensive and holistic view of the entire enterprise identity landscape.
  • Rapid deployment: Gathid offers a streamlined, easy-to-deploy solution that receives and models identity data from any systems and assets, without requiring complex bi-directional integrations. Typically excluded complex and/or disconnected applications, such as legacy, on-premise, shadow IT, operational technology (OT), and physical access control systems (PACS), can now also be analyzed from day one without requiring write access to the source system or complex bi-directional integration. Gathid delivers immediate return on investment (ROI) by connecting inter-system data gaps, providing immediate cross-functional insights, unlike traditional approaches requiring bi-directional integrations to be designed, built, and tested, which can take months or years to design and implement.
  • Affordable insight for every system: Gathid bridges the visibility gap in identity and access governance, offering immediate insight into business roles and the identities and access connected to them. Wherever you are on your role-based access control (RBAC) journey, the Gathid Graph enables you to identify and track changes in roles, identities, and access without the high costs of traditional approaches, which often include manual processes, stale data analysis, and large consulting projects.
  • Continuous Automated User Access Reviews (UAR): With Gathid, you can automate and streamline user access reviews, ensuring that permissions are always up to date.
  • Toxic role combination alerts: Gathid’s advanced algorithms can analyze high-risk identity and segregation of duties (SoD) access data, not only within systems, but also across diverse technologies and monitor potentially toxic access privileges that violate security and compliance policies across applications and assets. This allows organizations to identify and rectify toxic role combinations, ensuring a dynamic, meaningful, and secure identity and access program.
  • Incident memory: Gathid empowers incident response with a historical daily record of identities and access, allowing a comparative review of access rights changes before, during, and after an incident. It can also notify when potential access risk has been determined and provide recommendations for mitigating and preventing future incidents.
  • Compatibility: The Gathid platform is completely independent of existing enterprise applications and can receive identity and access data from any systems and assets, either manually or automatically. The Gathid Graph does not attempt to maintain concurrency of its identity model; it simply receives daily snapshots and rebuilds the identity and access model, archiving the previous model when a new model is created from fresh data.

 

“The divestment of our physical security products and the rebranding to Gathid has allowed us to focus on the rapidly growing identity and access governance global market,” said Hill. “We have successfully migrated our customer base to the new Gathid infrastructure and are leveraging events like AISA CyberCon and strategic collaborations, including with KPMG, to generate high-quality sales opportunities. The market momentum we have achieved, in a short period, positions us for exceptional growth throughout 2024.”

 

Key Resources

To learn more, join the Gathid team at this year’s Identiverse from May 28 to May 31 at the ARIA Resort & Casino in Las Vegas at Kiosk in the Start-Up Pavilion next to Tech Theater 2. Book a meeting here.

 

For those who cannot attend Identiverse, please request a live Gathid demo here.

 

About Gathid

Inspired by the power of gathered identities (pronounced “gathered,” spelled the way an Aussie would say it), Gathid transforms identity and access governance and disrupts identity debt for organizations worldwide. Visualize and manage identity and access data effortlessly with Gathid’s daily, dynamic model for unparalleled governance and instant, actionable insights. ASX-listed and headquartered on the Gold Coast in Australia, Gathid provides an innovative solution to complex identity problems, offering an approach that is fast-to-deploy, resource-efficient, and delivers immediate value even in hybrid and multi-cloud environments. For more information, visit https://gathid.com/

LogRhythm and RedLegg are Now Delivering Cloud-Native SIEM Capabilities to Security Operations Teams

LogRhythm Axon is Now Available to RedLegg Customers as Part of its Results-Driven Security Offerings

 

BROOMFIELD, Colo., April 9, 2024LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced its partnership with RedLegg, a master provider of information security services. This strategic partnership aims to empower businesses with enhanced security capabilities through LogRhythm’s groundbreaking cloud-native SIEM platform, LogRhythm Axon.

 

LogRhythm Axon is revolutionizing security operations with its cloud-native architecture designed to simplify threat detection, investigation, and response. RedLegg’s managed security services combined with LogRhythm Axon provide enterprises with comprehensive security solutions tailored to customers’ unique needs. By leveraging LogRhythm Axon’s advanced features such as cloud-to-cloud security measures, parsing engine insights, and simplified incident response tools, organizations can effectively detect and respond to cybersecurity threats in real-time.

 

“Our partnership with LogRhythm goes beyond technology. We share a common vision of a future where organizations have the tools and expertise needed to effectively combat modern cyber threats,” said Lynn Weddle, Partner at RedLegg. “By partnering with LogRhythm and integrating LogRhythm Axon into our offerings, we are further strengthening our ability to protect our customers’ digital assets and mitigate emerging threats effectively. LogRhythm Axon will also enable us to deliver even more value to our customers by providing them with comprehensive services to manage their security operations.”

 

Key benefits of LogRhythm Axon include:

  • Flexible Cloud-Native SaaS Platform: Easy scaleability as your business grows.
  • Security Analytics: Leverage automated detections for security use cases and out-of-the-box content mapped to the MITRE ATT&CK framework.
  • Automatic Log Collection and Enrichment: Simply onboard and manage on-premises and cloud log sources for maximum visibility.
  • Enhanced Analyst Experience: Spend more time investigating threats versus configuring the platform.
  • Save Time: LogRhythm Axon’s cloud-native architecture removes infrastructure hassles, letting you focus on security priorities.
  • Gain Comprehensive Visibility: Seamlessly collect data from diverse sources, ensuring a centralized, unified console.
  • Swift Threat Identification: Enhance your monitoring, detection, investigation, and response capabilities with LogRhythm Axon’s intuitive tools.
  • Execute Seamlessly: Surface critical threats with LogRhythm Axon’s powerful analytics and simplified incident response tools.

 

 

“At LogRhythm, we are committed to empowering our customers with innovative security solutions that streamline their operations and bolster their defenses,” said Gary Abad, VP of Global Channels at LogRhythm. “RedLegg’s expertise in managed security, combined with the capabilities of LogRhythm Axon, will provide organizations with a powerful joint solution to simplify their security operations and improve their overall security posture.”

 

To learn more about LogRhythm’s partnerships, please visit: https://logrhythm.com/partners/partner-program/

 

About LogRhythm

LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency.

 

With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com.

 

Quartz: Microsoft’s ‘corporate culture’ deprioritized security before China’s ‘preventable’ hack, DHS says

The U.S. Cyber Safety Review Board found that Microsoft could have stopped Chinese state actors from hacking government emails in 2023

By

Microsoft sign shown on top of the Microsoft Theatre
Microsoft.
Photo: Mike Blake/File Photo (Reuters)

Microsoft could have prevented Chinese state actors from hacking U.S. government emails last year, a new federal government report found, in an incident it called a “cascade of security failures.”

The report from the U.S. Cyber Safety Review Board (CSRB) found that Chinese hackers, known as Storm-0558, compromised the Microsoft Exchange Online emails of 22 organizations and more 500 people around the world, including senior U.S. government officials working on national security matters. Commerce Secretary Gina Raimondo and R. Nicholas Burns, the American ambassador to China, were among the U.S. government officials who were hacked.

Read full article: https://qz.com/microsoft-china-hack-dhs-report-security-1851383631 

Legislation Insights: House Passes TikTok Ban

The House of Representatives passed legislation today that would effectively ban TikTok in the United States.

Industry experts weigh in:

Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance (NCA),

TikTok, owned by ByteDance, presents significant cybersecurity concerns for the United States, primarily due to the potential exploitation of its vast user base and the Chinese company’s access to user data. Beyond the immediate privacy implications, there are fears that TikTok could be leveraged as a tool for misinformation campaigns and data collection by foreign actors, particularly the Chinese government. The scale of TikTok’s user engagement, combined with China’s track record of aggressive cyber activities, raises the specter of sophisticated cyber threats targeting American users, including surveillance, data breaches, and manipulation of online discourse.

Moreover, TikTok’s popularity among both adults and children amplifies the potential impact of these cyber threats, as sensitive personal information could be compromised, and disinformation campaigns could spread rapidly. The platform’s interactive nature and extensive reach make it an attractive target for malicious actors seeking to undermine national security or advance foreign interests. As such, policymakers face the critical task of balancing the benefits of information sharing and social connectivity with the imperative to protect citizens from cyber vulnerabilities inherent in platforms like TikTok. Continued investment in cybersecurity infrastructure and regulations is essential to mitigate these risks and uphold the integrity of digital ecosystems in an increasingly interconnected world.

 

James Mawhinney, CEO of Media.com

“A ban on the platform could disrupt the dissemination of false or misleading information to its vast user base, potentially mitigating the harmful effects of viral misinformation campaigns. However, it’s crucial to recognize that the issues of disinformation and online manipulation are not confined to TikTok alone. Other platforms, including Facebook, Twitter, and YouTube, have grappled with similar challenges, highlighting the need for comprehensive approaches to combatting misinformation across the digital landscape.

Furthermore, a nation-wide ban on TikTok could have ripple effects across the broader social media ecosystem. With TikTok’s absence, users may flock to alternative platforms in search of similar content experiences, potentially amplifying the user base of competing apps. This influx of users could reshape the dynamics of the social media landscape, influencing trends in content creation, user engagement, and platform competition. Additionally, the ban could prompt other social media companies to reevaluate their own data security practices and ties to foreign entities, as scrutiny over tech regulation intensifies.”

 

Dr. Nicholas Kardaras, author of Digital Madness
“I think having TikTok no longer being an entity of Bytedance would be a good thing as far as concerns regarding data mining and national security. But as far as having another Big Tech entity like Meta acquiring it–that doesn’t really help with regard to the mental health harms inflicted on our kids. Afterall, Meta and the others have not proven to be very good stewards of the Digital Public Square…so if they take over TikTok, they become an even bigger entity (with anti-trust concerns) and would continue with their current predatory and harmful practices.
But as a Free Speech advocate, I’m not in favor of an outright ban…let the adults be allowed to express themselves, but let’s have better guard rails in place to protect vulnerable kids and teens.”

Policy Insights: Biden’s Executive Order on Maritime Cybersecurity

Today, the White House issued an executive order starting a rulemaking process to add cyber requirements to US ports aimed at increasing defenses through additional authorities to the Coast Guard. The administration also pledged to invest over $20 billion in port infrastructure over five years.

The executive order will require the maritime sector to increase digital defenses and report cyber incidents to the Coast Guard also giving the Coast Guard the authority to respond to cybersecurity incidents, such as controlling the movement of vessels that present a cyber threat.

With concern over Chinese companies owning almost 80% of US ship-to-shore cranes and many controlled remotely, the Coast Guard is issuing a nonpublic maritime security directive that requires cranes manufactured by China to face “a number of security requirements”.

“America’s system of ports and waterways accounts for over $5.4 trillion of our nation’s annual economic activity, and our ports serve as a gateway for over 90% of all overseas trade. Any disruption to the [maritime transportation system], whether manmade or natural, physical or in cyberspace has the potential to cause cascading impacts to our domestic or global supply chains,” Rear Adm. Jay Vann, commander of the U.S. Coast Guard Cyber Command said.

Policy Insights:

Troy Batterberry, CEO, EchoMark:

“It is not only systems that have been infiltrated by foreign states. In my discussions with CISOs across the country, many believe there are employees within their organization that are capable of acting in alignment with foreign states. Unfortunately, 90% of organizations are completely unprepared for the risks imposed by insiders. Dealing with insider risk is the next big area of growth for the cybersecurity industry.”

Emily Phelps, Director, Cyware:

“The executive order is a good step towards securing critical national infrastructure. By mandating enhanced cyber defenses and incident reporting in the maritime sector, we’re addressing a significant vulnerability in our national security framework. The focus on the maritime sector, especially given the strategic importance of ports to our economy and supply chain, is timely and essential. This move, coupled with the substantial investment in port infrastructure, demonstrates a proactive approach to cybersecurity, ensuring the resilience of vital assets against emerging threats.”

 

From WSJ: FBI Director Says China Cyberattacks on U.S. Infrastructure Now at Unprecedented Scale

Christopher Wray warns that pre-positioned malware could be triggered to disrupt critical systems in the U.S.

MUNICH—As intelligence chiefs and policymakers gathered for this city’s annual security conference focused on the wars in Ukraine and the Middle East, the director of the Federal Bureau of Investigation urged them not to lose sight of another threat: China.

Read full article: https://www.wsj.com/politics/national-security/fbi-director-says-china-cyberattacks-on-u-s-infrastructure-now-at-unprecedented-scale-c8de5983

Sentinel Labs: China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

Report from Sentinel Labs:

  • China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about China’s irresponsible behavior in cyberspace.
  • Some PRC cybersecurity companies now coordinate report publication with government agencies and state media to amplify their impact.
  • Allegations of US hacking operations by China lack crucial technical analysis to validate their claims. Until 2023, these reports recycled old, leaked US intelligence documents. After mid-2023, the PRC dropped pretense of technical validation and only released allegations in state media.
  • The cyber-focused media campaign preceded the 2023 efforts of China’s Ministry of State Security to disclose accounts of western spying in the PRC.

Read Report:  https://www.sentinelone.com/labs/chinas-cyber-revenge-why-the-prc-fails-to-back-its-claims-of-western-espionage/

News Insights: NSA Admits to Buying User Browser Data

Wyden Releases Documents Confirming the NSA Buys Americans’ Internet Browsing Records; Calls on Intelligence Community to Stop Buying U.S. Data Obtained Unlawfully From Data Brokers, Violating Recent FTC Order

Washington, D.C. – U.S. Senator Ron Wyden, D-Ore., released documents confirming the National Security Agency buys Americans’ internet records, which can reveal which websites they visit and what apps they use. In response to the revelation, today Wyden called on the administration to ensure intelligence agencies stop buying personal data from Americans that has been obtained illegally by data brokers. A recent FTC order held that data brokers must obtain Americans’ informed consent before selling their data….

Read Full Story: https://www.wyden.senate.gov/news/press-releases/wyden-releases-documents-confirming-the-nsa-buys-americans-internet-browsing-records-calls-on-intelligence-community-to-stop-buying-us-data-obtained-unlawfully-from-data-brokers-violating-recent-ftc-order 

NEW INSIGHTS:

John Gunn, CEO of Token: “Senator Wyden’s efforts are misguided. Instead of working to hinder the critical work of law enforcement agencies that keep everyone safe, he should focus his efforts on the data aggregators. Data purchased by the NSA, marketers, and others is out there in regular commercial markets for anyone to purchase. Nothing is gained by excluding law enforcement from doing their jobs, and people’s privacy is not any more protected by excluding law enforcement from public markets for information. If some of the data being used is obtained illegally, then stop the illegal collection.”

From Newsweek: Why Is the Pentagon Enabling China’s Theft of America’s Tech?

By 

Jan 22, 2024

Last month, Newsweek reported that the Department of Defense had funded a Chinese-born researcher, Song-Chun Zhu, who at the time was openly transferring sensitive technologies to Chinese institutions, including those relating to artificial intelligence with military implications.

It was just the latest sign that China’s espionage has reached crisis proportions. “The U.S. government estimates that China’s intellectual-property theft costs America as much as $500 billion a year,” wrote John Ratcliffe while serving as director of national intelligence in December 2020. He titled his Wall Street Journal piece “China Is National Security Threat No. 1.”

Read full article: https://www.newsweek.com/why-pentagon-enabling-chinas-theft-americas-tech-opinion-1862894

From NBC: Disinformation poses an unprecedented threat in 2024 — and the U.S. is less ready than ever

The U.S. presidential election comes at a time of ideal circumstances for disinformation and the people who spread it.

Disinformation poses an unprecedented threat to democracy in the United States in 2024, according to researchers, technologists and political scientists.

As the presidential election approaches, experts warn that a convergence of events at home and abroad, on traditional and social media — and amid an environment of rising authoritarianism, deep distrust, and political and social unrest — makes the dangers from propaganda, falsehoods and conspiracy theories more dire than ever.

See story:

https://www.nbcnews.com/tech/misinformation/disinformation-unprecedented-threat-2024-election-rcna134290