Cyber Security Trends

WAGO and Radiflow enter into a partnership and combine their competencies in the future: WAGO is one of the leading
Resecurity, Inc. (USA), a Los Angeles-based cybersecurity company protecting major Fortune 500 giants worldwide, proudly announces its recognition as a
Cutting-edge insights from AI and cybersecurity leaders empower students to protect systems against emerging threats   SANTA CLARA, Calif. –
As the digital landscape continues to evolve, the importance of robust cybersecurity measures is of high importance and foremost priority. 
Interoperability brings best-in-class OT threat visibility and detection together with secure remote access to meet needs of organizations navigating digital
Company launches revolutionary CNAPP with unique Offensive Security Engine™ that thinks like a hacker to move beyond the theoretical and
Partners to offer each other’s category-leading threat intelligence services to strengthen network visibility and better defend customer networks Mandiant OT
Company unleashes power of Singularity™ Data Lake and Purple AI to transform security operations through new autonomous capabilities in the
The new Seeq Vantage app scales subject matter expert-driven insights for accelerated value across the enterprise MIAMI, May 7, 2024
Company to Provide Role-based Training on the ISA/IEC 62443 Series of Industrial Automation and Control Systems Cybersecurity Standards with Experts

Why Cyber Security Trends Matter

Cybersecurity is a growing, dynamic field. Even six months ago, the outlook was different. New vendors appear in the market. New threats emerge. Geopolitical concerns evolve over time. For this reason, to stay well-informed, it’s necessary to keep up with cyber security trends.

cyber security trends

For example, a few years ago, most people—even in the industry—probably didn’t think much about the security of connected vehicles. Now, automotive cybersecurity is a multi-million dollar category. Venture money is pouring in. New technological solutions are coming online to defend cars and trucks from cyberattack, GPS spoofing and digitally-based theft.

Or, consider the issue of quantum computing. Until pretty recently, quantum computing was one of those subjects that drew interest and excitement, but few firm productions. It was coming, maybe in the next decade or perhaps the next century. Then, suddenly, it’s on the verge of happening, for real. The breakthroughs are causing a news trend related to the breakdown of traditional cryptography.

Cyber security trends also reveal themselves to be relevant in subjects like regular encryption. For example, KeyFactor recently revealed that it has detected vulnerabilities in over a quarter of a million RSA keys.

The challenge with cyber security trends, however, has to do with the volume of news. Every day, there are hundreds, perhaps thousands, of articles and press releases coming out that relate to cyber security trending topics. How can you keep up with them? That is one of the purposes of this site.

We review the industry news for you and post our selections of the most relevant cyber trends for your consumption. We drink from the firehose so you don’t have to. We cover trends in AI in cybersecurity, ransomware, phishing, privacy, threats, financial services cyber risks, cloud security, endpoint security, government cybersecurity healthcare security, industrial and IoT cyber trends and more.

Photo: https://www.pexels.com/@pixabay

WAGO and Radiflow Join Forces to Strengthen OT Security for Customers

WAGO and Radiflow enter into a partnership and combine their competencies in the future: WAGO is one of the leading international suppliers of electrical interconnection and automation technology. As a specialist in OT cybersecurity, Radiflow offers globally successful cybersecurity solutions and services for critical infrastructure and industrial automation. Together, they aim to strengthen resilience against potential cyber threats and make the OT networks of critical infrastructure and industrial environments as secure as possible.

 

In today’s interconnected world, cyber threats are more acute than ever, and pose significant challenges to organizations of all sizes. Cyber attacks on OT networks, systems and devices can disrupt operations, compromise security and lead to significant financial losses. “At WAGO, we are convinced that protecting digital and electrical systems goes beyond physical components – it requires a comprehensive approach to cybersecurity. We want to help our customers effectively protect their systems from ever-new cyber threats,” said Thomas Burklé, Vice President of Automation Sales & Industry Management EMEA.

WAGO and Radiflow bundle their strengths to offer comprehensive OT security solutions worldwide that are tailored to the individual needs of specific markets, such as smart factory, smart building or smart energy. Kilian Fröhlich, Global Business Development Manager at WAGO, looks confidently at the partnership: “We are about to reach the next level. Our expertise in industrial automation and Radiflow’s advanced OT cybersecurity solutions, will enable us to provide integrated cybersecurity consulting in the future.”

 

By integrating Radiflow’s innovative cybersecurity software solutions into WAGO’s industry- leading products and services, customers benefit in many ways:

 

●        Advanced threat detection:

WAGO Cyber Security Network Sight software is based on iSID from Radiflow and enables real-time monitoring and detection of anomalous network behavior.

Continuous monitoring helps companies identify cyber threats at an early stage and respond to them as quickly as possible.

 

●        Increased security through network segmentation:

WAGO Cyber Security Analysis, based on Radiflow’s CIARA, is an automated risk assessment and management platform for companies from the industrial, energy and building sectors. Based on the analysis results, users can implement robust network segmentation strategies and significantly minimize the risk of unauthorized access.

 

●        Inventory and risk assessment:

WAGO Cyber Security Analysis is used to create a resource management tailored to the customer and to perform a risk assessment. This allows an up-to-date inventory of the OT measures implemented, proactively identify vulnerabilities and measure the effectiveness of risk reduction strategies.

 

“The partnership with WAGO leverages our shared strengths to provide robust, safe and

efficient solutions for industrial automation and cybersecurity requirements. Radiflow’s expertise in OT cybersecurity complements WAGO’s product portfolio in all target markets, benefiting customers seeking integrated solutions,” says David Moss, VP of Sales at Radiflow. This comprehensive approach allows WAGO and Radiflow companies to maximize the benefits of Industry 4.0 while minimizing the risks associated with cyber threats.

 

Additional information about WAGO and Radiflow is available at:

Cybersecurity in Digitalization | WAGO and OT Cybersecurity | Risk Management | Radiflow

 

 

About WAGO:

The WAGO Group is one of the leading international suppliers of electrical interconnection and automation technology and offers a comprehensive portfolio of products and services for industrial automation, building technology and renewable energies. With more than 60 years of experience, WAGO is constantly driving innovation forward and shaping the future of industrial automation.

 

 

About Radiflow:

Radiflow is a global leader in cybersecurity solutions and services for critical infrastructure and industrial automation. With extensive cyber expertise, Radiflow enables organizations to maintain continuous operational security while managing risk, optimizing security budgets, and adhering to regulations (such as NIS2) and industry best practices.

 

Radiflow’s cybersecurity solutions and services are used in more than 8,000 locations worldwide. Radiflow is part of the Sabanci Group, an international group active in financial services, energy, cement, retail and other critical infrastructure, as well as industrial activities.

Resecurity Honored with President’s “E Star” Award – Recognized Leader in Cybersecurity Exports

Resecurity, Inc. (USA), a Los Angeles-based cybersecurity company protecting major Fortune 500 giants worldwide, proudly announces its recognition as a recipient of the esteemed President’s “E Star” Award,  the highest recognition any U.S. entity may receive for making a significant contribution to the expansion of U.S. exports, at a ceremony hosted by U.S. Secretary of Commerce Gina M. Raimondo in Washington, D.C. This award underscores Resecurity’s unwavering commitment to advancing cybersecurity exports and marks a significant milestone in the company’s illustrious journey.

Created in 1961 by Executive Order of the President, the President’s “E” Award is the highest recognition a U.S. entity can receive for significantly contributing to the expansion of U.S. exports. U.S. companies that have successfully grown their exports in overseas markets, along with companies or organizations that have facilitated the exports of others, are nominated by the International Trade Administration’s (ITA) U.S. Commercial Service within the U.S. Department of Commerce.

“Trade impacts the lives of every American worker, business, and community,” said U.S. Secretary of Commerce Gina Raimondo. “I am proud to recognize this year’s President’s “E” and “E Star” award recipients for their efforts and contributions to increase economic prosperity across our country and further position the U.S. private sector as the partner of choice in markets around the globe.”

With a mission to safeguard digital ecosystems against evolving threats, Resecurity continues to push the boundaries of innovation, setting new standards for excellence in the cybersecurity industry.

“To receive the ‘President’s E-Award’ is a tremendous honor for our team”, said Gene Yoo, Resecurity CEO. “This recognition validates our deep commitment to making an impact in the global market. Resecurity remains committed to promoting U.S. cybersecurity technologies internationally. We support our partners and industry peers around the world with the best solutions to protect what matters.”

Through strategic partnerships, groundbreaking research, and a customer-centric approach, Resecurity remains at the forefront of cybersecurity innovation, empowering businesses to navigate the digital landscape with confidence and resilience.

The need for robust cybersecurity measures has never been more critical as the world becomes increasingly interconnected. Resecurity’s receipt of the President’s “E Star” Award underscores its pivotal role in advancing America’s cybersecurity exports. It signifies a testament to its unwavering commitment to excellence in safeguarding digital assets and infrastructure.

Looking ahead, Resecurity remains steadfast in its commitment to driving innovation, forging strategic partnerships, and empowering organizations to navigate the ever-evolving cybersecurity landscape with confidence and resilience. With this prestigious recognition, Resecurity reaffirms its position as a trailblazer in America’s cybersecurity exports and a driving force behind its digital resilience.

For more information about Resecurity and its innovative cybersecurity solutions, please visit https://www.resecurity.com.

About the International Trade Administration
The International Trade Administration (ITA) at the U.S. Department of Commerce is the premier government resource for American companies competing in the global marketplace. Operating in more than 100 U.S. locations and 80 markets worldwide, ITA promotes trade and investment, assists U.S. businesses and workers to export and expand globally, and ensures fair trade and compliance by enforcing U.S. trade laws and agreements. For more information on ITA, visit www.trade.gov.

 

About Resecurity
Resecurity® is a cybersecurity company that delivers a unified endpoint protection, risk management, and cyber threat intelligence platform. Known for providing best-of-breed data-driven intelligence solutions, Resecurity’s services and platforms focus on early-warning identification of data breaches and comprehensive protection against cybersecurity risks. Founded in 2016, it has been globally recognized as one of the world’s most innovative cybersecurity companies with the sole mission of enabling organizations to combat cyber threats regardless of how sophisticated they are. Most recently, Resecurity was named one of the Top 10 fastest-growing private cybersecurity companies in Los Angeles, California, by Inc. Magazine. An Official Partner of the Cybercrime Atlas by the World Economic Forum (WEF), Member of InfraGard National Members Alliance (INMA), AFCEA, NDIA, SIA, FS-ISAC and the American Chamber of Commerce in Saudi Arabia (AmChamKSA), Singapore (AmChamSG), Korea (AmChamKorea), Mexico (AmChamMX), Thailand (AmChamThailand), and UAE (AmChamDubai). To learn more about Resecurity, visit https://resecurity.com.
 

AttackIQ Academy Launches Online AI Security Course to Help Security Teams Bridge the Knowledge Gap 

Cutting-edge insights from AI and cybersecurity leaders empower students to protect systems against emerging threats

 

SANTA CLARA, Calif. – May 15, 2024AttackIQ®, the leading independent vendor of breach and attack simulation (BAS) solutions and founding research partner of the MITRE Engenuity Center for Threat-Informed Defense (CTID), today announced the launch of a new AttackIQ Academy course, “Foundations of AI Security.” The free course addresses the urgent need to secure artificial intelligence (AI) systems as they become increasingly intertwined with daily life.

 

The accelerating adoption of AI makes understanding and combating its inherent dangers crucial for businesses and individuals. With cybercrime damages predicted to cost the world $10.5 trillion annually by 2025, this course equips professionals with the tools and knowledge necessary to safeguard their systems and protect against devastating losses.

 

The new course is led by Keith Wilson, a seasoned information security professional with over a decade of industry experience. Wilson’s career, marked by collaborations with top global companies, equips him with the insights to guide participants through the intricate world of AI security.

 

“AI technology is advancing rapidly, often outpacing the preparedness of our security frameworks,” said Wilson. “With ‘Foundations of AI Security,’ we’re shifting the paradigm, equipping security professionals with the understanding and tools to stay ahead of emerging threats. We’re not just raising awareness, we’re providing the solutions needed to take concrete action.”

 

Hands-on instruction for cyber professionals, developers and policymakers 

 

The “Foundations of AI Security” course is designed to immerse participants in the complexities of AI technologies and their unique security challenges. Over 4.5 hours of expert-led instruction, this intermediate-level course provides an overview of AI systems, many of the risks they present, and in-depth explorations of leading security frameworks, including MITRE ATLAS, AI RMF, and OWASP. The course is tailored for cybersecurity professionals eager to specialize in AI, developers involved in AI projects, and policymakers overseeing tech integration.

 

For cybersecurity experts, it offers a pathway to becoming proficient in AI-specific security measures. AI developers will learn to embed security into their systems from the start, adhering to industry best practices. Meanwhile, policymakers and business leaders will gain the knowledge needed to make informed, secure decisions regarding AI implementation.

 

Unique in its approach, the course fills a significant gap in AI security education, providing both theoretical knowledge and practical skills applicable in real-world scenarios. Participants will leave with a robust understanding of how to assess and mitigate AI vulnerabilities effectively, ensuring they are well-prepared to face today’s security demands.

 

“I just finished the course and exam, and this is absolutely great work from the AttackIQ team,” said Dirk Praet, Principal Information Systems Security Consultant at Toreon. “This is a total must for anyone even remotely involved in AI systems threat modeling and risk management. It’s a real eye-opener even for me.”

 

Commitment to the cybersecurity community

 

With the launch of “Foundations of AI Security,” AttackIQ reaffirms its commitment to giving back to the community. With 60,000 students in 190+ different countries, AttackIQ Academy courses are delivered at no cost as a public good. All courses are eligible for ISC(2) CPE credits.

 

For more information, course schedules, and enrollment details, please visit AttackIQ Academy.

 

Optima Technologies Introduces Cybersecurity Courses to Empower Organizations and Individuals in the Digital Age

As the digital landscape continues to evolve, the importance of robust cybersecurity measures is of high importance and foremost priority. 

Copenhagen–May 10, 2024–In response to the growing demand for comprehensive cybersecurity training, Optima Technologies today announced the launch of a new suite of online courses: Cybersecurity 1, Cybersecurity 2, Cybersecurity 3, and Bundle 1 + 2 + 3.

These courses are designed to cater to a diverse audience, ranging from top management to employees at all levels within organizations. They provide invaluable insights and practical knowledge to fortify cyber defenses and safeguard critical assets against ever-evolving threats.

The audience for these courses include C-suite executives, directors, and managers responsible for strategic decision-making and overseeing organizational security initiatives. System administrators, network engineers, and cybersecurity specialists tasked with implementing and maintaining security measures will find the courses to be useful for improving their professional capabilities. Professionals who are tasked with ensuring adherence to industry regulations and standards such as GDPR, HIPAA, and PCI DSS will benefit from the courses, as will entrepreneurs and small business owners seeking to protect their digital assets and customer data, software developers and programmers interested in integrating security best practices into their applications, analysts and consultants focused on identifying and mitigating cybersecurity risks within organizations, and individuals pursuing careers in cybersecurity or related fields, looking to acquire foundational knowledge and skills.

Optima Technologies’ Cybersecurity courses offer a comprehensive curriculum developed by industry experts. They cover essential topics tailored to address the diverse needs and skill levels of participants. Here’s why individuals and organizations should consider enrolling:

 

  • Each course is meticulously crafted to provide practical insights and real-world scenarios, ensuring immediate applicability in professional settings.
  • With online delivery, participants have the flexibility to learn at their own pace, accommodating busy schedules without compromising the quality of education.
  • Led by seasoned cybersecurity professionals, the courses offer unparalleled expertise and guidance, enriching the learning experience and fostering skill development.
  • Engaging content, interactive quizzes, and hands-on exercises enhance retention and comprehension, making complex concepts accessible to learners of all backgrounds.
  • Upon successful completion, participants receive industry-recognized certification, validating their proficiency and enhancing career prospects in the competitive cybersecurity landscape.

 

Optima Technologies’ Cybersecurity courses stand out from traditional offerings due to several distinctive features:

 

  • The tiered structure of Cybersecurity 1, 2, 3, and Bundle 1 + 2 + 3 facilitates a progressive learning journey, allowing participants to build upon foundational knowledge and advance their expertise incrementally.
  • The courses adopt a holistic approach to cybersecurity, addressing technical, operational, and human factors to provide a comprehensive understanding of threats and mitigation strategies.
  • Recognizing the diverse needs of learners, the courses offer multidimensional modules and topics, empowering individuals and organizations to tailor their learning experience to specific areas of interest or concern.
  • Beyond course completion, participants gain access to a community of peers and instructors, as well as ongoing resources and updates to stay abreast of emerging threats and industry trends.
  • Emphasizing hands-on learning and practical application, the courses equip participants with the skills and confidence to implement effective cybersecurity measures in their respective roles and environments.

 

Whether the prospective student is a seasoned cybersecurity professional looking to stay ahead of emerging threats or a newcomer seeking to enter this dynamic field, Optima Technologies’ Cybersecurity courses offer a gateway to knowledge, empowerment, and professional growth.

 

Optima Technologies has launched best-in-class cybersecurity online courses in 2024:

 

  • Cybersecurity 1
  • Cybersecurity 2
  • Cybersecurity 3
  • Cybersecurity Bundle 1 + 2 + 3

 

Why participate in Optima Technologies’ cybersecurity online courses? All companies should focus more on protecting their assets and keeping criminal hackers away. Everyone in the organization must learn basic cybersecurity skills, and contribute to this protection.

 

If everyone is equipped with the same basic cybersecurity skills, then the organization will be sure to have a better understanding of developing and implementing a professional cybersecurity strategy.

 

It is important to work professionally with cybersecurity in the whole organization, so that all employees can contribute with cybersecurity and make the necessary actions that must be conducted to help to protect the assets of companies.

 

For further information and enrollment visit Optima Technologies’ website at:

 

https://optimatechnologiesglobal.com/academy/

 

About Optima Technologies

Optima Technologies is a global cybersecurity company committed to helping organizations worldwide optimize their cybersecurity. We work with customers across the private, public, and social sectors to solve complex cybersecurity challenges and protect their company assets. We combine coherent cybersecurity strategies and transformative technologies to help organizations optimize their cybersecurity performance. We want to build a strong brand in the cybersecurity industry worldwide. Our purpose is to help our customers to protect their assets from cyber criminals. We are the professionals in cybersecurity.

 

END

###

 

CONTACT

 

Optima Technologies International, Inc.

Skyttebjerg 8

2850 Naerum – Copenhagen

Denmark

 

Ib Knudsen, Chief Executive Officer

+[45] 27 83 23 20

 

ib.knudsen@optimatechnologiesglobal.com

Optimatechnologiesglobal.com

 

SOURCE Optima Technologies

 

 

Cyolo Partners with Dragos to Unveil Holistic Secure Remote Access Solution for Critical Infrastructure

Interoperability brings best-in-class OT threat visibility and detection together with secure remote access to meet needs of organizations navigating digital transformation initiatives

 

Mountain View, Calif. – May 8th, 2024 Cyolo, the secure remote access company for operational technology (OT) and industrial control systems (ICS), today announced a strategic partnership with Dragos, a global leader in cybersecurity for ICS/OT. Under the umbrella of Cyolo’s CyoloVerse  partner program,  Cyolo’s PRO Secure Remote Access Platform will work with Dragos’s industry-leading OT cybersecurity platform. This collaboration will provide organizations with a robust and interoperable solution to protect their critical infrastructure against cyber threats.

 

New technology implementations in ICS/OT environments pose unique risks for critical infrastructure. Today’s risks include lack of support for modern authentication or connectivity methods in traditional environments, connecting existing infrastructure with highly vulnerable end-of-life operating systems, or risk of breaches from third-party remote access.

 

This interoperability is designed to provide OT customers visibility and management of their asset inventory and enhance asset vulnerability detection and remediation capabilities through a seamless secure controlled access platform.

 

“Cyolo ICS/OT security and safety expertise are changing the way organizations understand secure remote access,” said Matt Cowell, VP of Business Development at Dragos. “With our companies’ complementary capabilities and unique strengths, we can manage security through the different layers of the operational environment and protect a wider array of organizations across critical infrastructure. Ultimately reducing risk as they expand connectivity.”

 

Bringing the Cyolo PRO platform alongside the Dragos OT-native network visibility and monitoring offerings gives an unparalleled advantage. The Dragos Platform enables organizations to scale protection, the threat intelligence to keep on top of current threats, and the tools to respond quickly to incidents. With Cyolo’s robust role-based access, application, and policy control, in the future the Dragos Platform will be able to manage Cyolo’s Identity-based parameters (users, applications, resources, policy) in accordance with SOC / IR policies and guidelines.

 

Together Cyolo and Dragos deliver a comprehensive ICS/OT security framework based on the five critical controls of effective ICS/OT security:

  • ICS incident response—which integrates operational insights into incident handling, enhancing system integrity and recovery (Dragos)
  • Defensible architecture—ensuring robust visibility, segmentation, and enforcement mechanisms to bridge technological and human aspects of security (Dragos and Cyolo PRO)
  • ICS network visibility monitoring—employing continuous monitoring and protocol-aware tools to detect and address potential vulnerabilities (Dragos)
  • Remote Access Security—ensuring safe and secure stringent access control in the face of evolving hybrid work environments (Cyolo PRO).
  • Risk-based vulnerability management—prioritizing and addressing vulnerabilities based on their potential to pose significant operational risks, thereby ensuring proactive prevention, response, and recovery actions (Dragos and Cyolo PRO).

 

 

The solution plans to integrate Cyolo PRO and the Dragos Platform through an API architecture or operator console. It will deliver unsurpassed visibility and control of critical digital assets through secure identity-based access. Together, both companies will deliver simpler, stronger, and more efficient security controls that lay the foundation for Zero Trust (NIST 800-207).

 

“With this industry leading partnership, Cyolo joins Dragos to address security and operational challenges impacting OT environments,” said Joe O’Donnell, EVP Corporate Development and OT GM at Cyolo. “The interoperability of the Dragos Platform and Cyolo PRO provides OT practitioners and industrial organizations with the full spectrum of cybersecurity services across the 5 ICS/OT Critical Controls. The timing could not be better as the world aggressively embraces Industry 4.0.”

 

Dino Busalachi, CTO and Co-Founder at Velta Technology – a joint partner – also highlighted that “In light of the surge in cyber threats, the growing adoption of Industry 4.0, and the inherent risks within OT environments, Velta Technology understands the critical need to partner with Cyolo and Dragos. Their joint solutions will provide our customers in the industrial sector with a tailored approach that strengthens their access security and elevates their overall security posture.”

 

Dragos and Cyolo respond to the need for secure industrial networks without disrupting operations, compromising safety or risking non-compliance.

 

The Dragos Platform offers the most effective industrial cybersecurity technology, giving customers visibility into their ICS/OT assets, vulnerabilities, threats, and response actions. The strength behind the Dragos Platform comes from Dragos’s ability to codify industry-leading OT threat intelligence, and insights from the Dragos services team into the software.

 

About Cyolo

Cyolo helps OT and ICS organizations stay secure and productive in an era of distributed workforces and unprecedented cyber threats. Cyolo’s platform enables all users, including employees, third parties, and remote or on-site workers, to connect to their working environments seamlessly and securely via modern identity-based authentication. With one unified solution that integrates with your existing tech stack, Cyolo makes securely connecting people to their work simple. To learn more, visit https://cyolo.io

 

SentinelOne® Redefines Cloud Security

Company launches revolutionary CNAPP with unique Offensive Security Engine™ that thinks like a hacker to move beyond the theoretical and deliver Verified Exploit Paths™

 

SAN FRANCISCO–(BUSINESS WIRE)–Attackers are targeting the scope and scale of the cloud to run rapid and coordinated threat campaigns. A new approach is needed to defend against them, and SentinelOne (NYSE: S), a global leader in AI-powered security, is delivering it, with the launch of Singularity™ Cloud Native Security. A revolutionary solution built on SentinelOne’s acquisition of PingSafe in February 2024, the agentless Cloud Native Application Protection Platform (CNAPP) is uniquely designed to assess environments like a hacker would, simulating attack methods to provide a prioritized, evidence-based list of exploit pathways that security teams can use to prioritize their time and prevent attacks before they happen. The news came during RSA 2024, being held at the Moscone Center in San Francisco this week.

“With SentinelOne Singularity Cloud Native Security, defenders can see things from an attacker’s perspective, understand how they operate, and stop them in their tracks.”

“Attackers today think and act in totally different ways, and to keep their systems and information safe, security teams need to do the same,” said Anand Prakash, Senior Director of Product Management at SentinelOne and a top-five ethical hacker. “With SentinelOne Singularity Cloud Native Security, defenders can see things from an attacker’s perspective, understand how they operate, and stop them in their tracks.”

Cut through the Noise

Cloud environments are an ever-expanding and inherently noisy attack surface. SentinelOne Singularity Cloud Native Security cuts through the noise using a unique Offensive Security Engine™ that safely simulates attacker methods to provide false positive-free insights into what assets in a cloud environment are verified to be exploitable. Armed with this information, security teams can optimize their time to focus on risks that require immediate attention and take action.

“Singularity Cloud Native Security’s agentless CNAPP platform is significantly less noisy and its alerts powered by Offensive Security Engine are more actionable as compared to alternatives,” said Daniel Wong, CISO at Skyflow, an early adopter of the technology. “Along with differentiators like secret scanning capabilities, the solution, as part of the larger Singularity Cloud Security platform is poised to be an integral part of our security landscape for the future.”

Detect and Protect

Detecting threats is one thing. Protecting against them is another, and requires a solution that combines the stopping and forensics power of an agent with the speed and breadth of agentless security. With Singularity Cloud Native Security, SentinelOne provides a comprehensive CNAPP that blocks attacks, combining its Cloud Native Security with AI-powered Cloud Workload Security and Cloud Data Security threat protection products to deliver visibility and mitigation capabilities in a single cloud security platform.

“At SentinelOne, we understand that detection is great, but being able to prevent and protect is better,” said Ely Kahn, Vice President of Product Management, Cloud Security, SentinelOne. “By combining our agent and agentless capabilities, security teams gain the visibility needed to detect attacks and capabilities that empower them to protect against them at machine speed.”

Availability

Singularity Cloud Native Security is available to customers in North America today and on full display at RSA 2024. To see the solution in action, visit Booth N-5863. To learn more about the value it can deliver, click here.

About SentinelOne

SentinelOne is a global leader in AI-powered security. SentinelOne’s Singularity™ Platform detects, prevents, and responds to cyber attacks at machine speed, empowering organizations to secure endpoints, cloud workloads, containers, identities, and mobile and network-connected devices with speed, accuracy, and simplicity. Leading enterprises, including Fortune 10, Fortune 500, and Global 2000 companies, as well as prominent governments, trust SentinelOne to secure tomorrow. To learn more, visit www.sentinelone.com

Contacts

Karen Master
SentinelOne
karen.master@sentinelone.com

Nozomi Networks and Mandiant Extend Strategic Partnership to Improve Threat Detection and Response for the World’s Critical Infrastructure

  • Partners to offer each other’s category-leading threat intelligence services to strengthen network visibility and better defend customer networks
  • Mandiant OT incident response teams will expand their use of Nozomi sensors in their investigations and assessments
  • Nozomi customers will gain streamlined access via Mandiant Assist to Mandiant’s world-class incident response services

 

SAN FRANCISCO – May 8, 2024 – Nozomi Networks, the leader in OT and IoT security, and Mandiant, part of Google Cloud, today announced they have expanded a longstanding global partnership to further strengthen and streamline the way industrial and enterprise CISOs and their teams anticipate, diagnose and respond to cyber threats across all their critical business operations. Through this partnership expansion, Nozomi Networks and Google Security Operations customers will have the option to combine Mandiant threat intelligence and incident response with Nozomi Networks threat intelligence to gain comprehensive access to real-time information about threats to their IT, OT and IoT systems.

 

“The cybersecurity threat landscape is rapidly evolving, with attacks growing in both number and impact enterprise-wide,” said Edgard Capdevielle, CEO Nozomi Networks. “To minimize risk and maximize operational resilience, CISOs and their security teams need comprehensive solutions that enable them to quickly assess and respond to threats across their IT, OT and IOT systems. We are pleased to be able to give our customer the option to easily incorporate Mandiant’s world-class threat intelligence and threat hunting services as part of a whole solution that delivers superior security outcomes.”

 

“For almost a decade, Mandiant and Nozomi Networks have partnered to deliver advanced, AI-powered OT and IoT security solutions to customers,” said Melissa Smith, Google Cloud’s Head of Strategy & Technology Partnerships. “This latest expansion is another critical step in our journey to combine threat intelligence sources and defenses for the best possible security outcomes for the world’s critical infrastructure. By blending Mandiant’s threat intelligence and expertise with Nozomi Networks’ OT threat intelligence and tools, we can enable critical infrastructure organizations to enhance their threat intelligence and investigations for a stronger defense.”

 

History shows effective IT security visibility and management combined with OT/IoT threat awareness plays a key role in stronger security for OT. Because most cyber-attacks that slow or shut down operations start at an IT entry point, having the ability to combine and leverage the industry’s leading IT, OT and IoT threat intelligence services gives critical infrastructure CISOs the most comprehensive, up-to-date set of threat intelligence to work with for the strongest possible defense.

 

Nozomi Networks and Google Security Operations customers who wish to gain comprehensive access to real-time information about threats to their IT, OT and IoT systems can combine Mandiant threat intelligence and incident response with Nozomi Networks threat intelligence. The new offering extends Nozomi Networks’ advanced OT and IoT threat intelligence by providing organizations with a deeper understanding of the coinciding IT threat landscape. This makes it possible to holistically monitor and respond to all emerging threats for the strongest possible security outcomes enterprise wide.

 

Additionally, by year end, Nozomi Networks customers will be able to add Mandiant Assist to the Nozomi Networks platform, for push-button access to Mandiant incident response services.

 

Finally, Mandiant will expand the use of Nozomi Networks sensors by enabling the capability to hunt for malicious activity and indications of compromise within the IT systems that directly support OT, IIoT and IoT.

 

Recognized as a market leader in OT and IoT security, Nozomi Networks is valued for superior operational visibility, advanced OT and IoT threat detection and strength across deployments. Nozomi Networks solutions support more than 105 million devices in thousands of installations across energy, manufacturing, mining, transportation, utilities, building automation, smart cities, and critical infrastructure. Nozomi Networks products are deployable onsite and in the cloud, and span IT, OT and IoT to automate the hard work of inventorying, visualizing and monitoring industrial control networks through the innovative use of artificial intelligence. Use cases stretch beyond cybersecurity, and include troubleshooting, asset management and predictive maintenance.

 

By combining their market leadership in OT, IT & IoT cybersecurity, Nozomi Networks and Mandiant are bringing a new level of cyber defenses to critical infrastructure organizations worldwide.

About Nozomi Networks
Nozomi Networks accelerates digital transformation by protecting the world’s critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com

 

About Mandiant

Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats. Mandiant is part of Google Cloud.

 

About Google Cloud

Google Cloud accelerates every organization’s ability to digitally transform its business and industry. We deliver enterprise-grade solutions that leverage Google’s cutting-edge technology, and tools that help developers build more sustainability. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.

 

Press Contacts:

Jil Backstrom

jil.backstrom@nozominetworks.com – 303.913.1650

Follow the Nozomi Networks Blog

Follow @nozominetworks on X

Visit and follow Nozomi Networks on LinkedIn

SentinelOne® Unveils Future of Autonomous Security

Company unleashes power of Singularity™ Data Lake and Purple AI to transform security operations through new autonomous capabilities in the Singularity Platform.

SAN FRANCISCO–(BUSINESS WIRE)–SentinelOne (NYSE: S), a global leader in AI-powered security, today announced new capabilities within its Singularity Platform designed to democratize advanced cybersecurity operations. The company unveiled the capabilities, which make top-tier Security Operations Centers (SOC) a reality for companies of all sizes, at RSA 2024.

“The combination of the Singularity Data Lake and Purple AI removes much of this burden through automation, empowering the SOC to focus on the most critical task – keeping the organization safe.”

“Imagine a future where security solutions not only help enterprises respond to threats, but anticipate and mitigate them before they lead to a security incident. This is the future we are creating at SentinelOne,” said Tomer Weingarten, CEO of SentinelOne. “Our solutions are designed to transform how security teams manage the complexity of their environments and defend threats. With our latest innovations, customers can move from the reactive operating paradigm of today and enable a predictive and autonomous future.”

With today’s news, SentinelOne is democratizing cybersecurity through AI and automation, enabling every enterprise to operate at the same scale, speed and sophistication, regardless of budgets and resources. When combined with the visibility of the Singularity Platform and the breadth and scale of the Singularity Data Lake, Purple AI provides an always-on, expert analyst to augment the skills of any security team and supercharge their capabilities.

“It’s no secret that security teams are overwhelmed with data, alerts and labor-intensive triage,” said Ric Smith, Chief Product and Technology Officer, SentinelOne. “Purple AI doesn’t just do what you ask it to, it does what you need it to.”

Beyond a chatbot or virtual assistant, Purple AI is an advanced AI security solution that not only creates complex data queries from natural language, but anticipates what security analysts need to do and recommends next steps. Key features demonstrated and in use today include:

  • AI-powered anomaly detection: Purple AI surfaces correlated risks from integrated log sources.
  • Automated alert triage: The technology analyzes trillions of anonymized data signals at a global scale to evaluate how security analysts assess and respond to similar alerts and provides automated verdicts and recommended actions.
  • AI-powered response recommendations and hyper automation rules: Using global similarity analyses, Purple AI provides intelligent response recommendations based on how others have responded to similar alerts and smart recommendations to turn those actions into hyper automation rules to put response actions in autonomous mode.
  • 24/7 Auto-investigations: Through zero-touch auto-investigation capabilities, Purple AI eliminates the need for human-driven investigations and empowers security teams to focus on validating and mitigating threats at scale.

All current and future Purple AI capabilities are deeply embedded across the Singularity Platform and accessible via a new unified security console, the Singularity Operations Center.

“For years, security vendors have claimed unified dashboards and a single pane of glass. SentinelOne’s Singularity Operations Center delivers on that promise and represents a massive leap forward in simplifying the analyst experience by unifying alert triage and workflows across all event collections,” Smith said.

Now generally available, the Operations Center consolidates security management with unified alerts, inventory management, correlation engine, and a contextualized Singularity Graph to accelerate detection, triage, and investigation.

“For the first time, security analysts of any level can benefit from the tools, velocity, and performance once reserved for the largest organizations and budgets,” Smith added.

Both Purple AI and the Singularity Platform have the unified Singularity Data Lake at their core. Built on the Open Cybersecurity Schema Framework (OCSF), source telemetry is rapidly ingested from any source, normalized, processed, and stored with critical issues escalated for analyst attention.

“Having all of the data is one problem. Being able to process it fast enough to find the insights with enough time to action them is something else entirely,” Smith said. “The combination of the Singularity Data Lake and Purple AI removes much of this burden through automation, empowering the SOC to focus on the most critical task – keeping the organization safe.”

Democratizing the SOC

And analysts see it as game changing.

“The combination of AI, data and autonomous capabilities in a single platform is powerful,” said Steve McDowell, Chief Analyst, NAND Research. “Generative AI gives you a window into everything that’s happening across your environment and allows you to have a real, data-driven conversation with your infrastructure. Combining that with a unified data lake and platform-driven approach can accelerate and simplify how you protect the enterprise.”

Act Now to Secure Tomorrow

To learn more about SentinelOne’s advanced, AI-powered cybersecurity platform and how it can help your organization secure tomorrow, click here. To see the new Purple AI capabilities in action, visit Booth N-5863.

About SentinelOne

SentinelOne is a global leader in AI-powered security. SentinelOne’s Singularity™ Platform detects, prevents, and responds to cyber attacks at machine speed, empowering organizations to secure endpoints, cloud workloads, containers, identities, and mobile and network-connected devices with speed, accuracy, and simplicity. Leading enterprises from the Fortune 10 to Global 2000 trust SentinelOne to secure tomorrow. To learn more, visit www.sentinelone.com

Contacts

Karen Master
SentinelOne
karen.master@sentinelone.com

Seeq Announces Industrial Enterprise Monitoring Capabilities with Seeq Vantage at Conneqt 2024

The new Seeq Vantage app scales subject matter expert-driven insights for accelerated value across the enterprise

MIAMI, May 7, 2024 /PRNewswire/ — Seeq, a leader in industrial analytics and AI, today announced the launch of the Seeq Industrial Enterprise Monitoring Suite with the release of Seeq Vantage, the company’s first industrial enterprise monitoring app, at the company’s global industry conference, Conneqt, in Miami.

Today’s industrial operations face numerous enterprise-level reliability, performance, and sustainability challenges, which are difficult to systematically identify, prioritize and correct to maximize operational potential. With siloed teams and information, and limited visibility to historical knowledge and insights from previous operations and events, it can be challenging for organizations to achieve measurable impact.

The Seeq Industrial Enterprise Monitoring Suite provides a comprehensive, automated view into operational performance-past and present. This broader view enables better decision making and continuous improvement across today’s complex, industrial ecosystems. The Seeq Industrial Enterprise Monitoring Suite leverages the combined power of the Seeq Industrial Analytics and AI Suite and the context that only teams of experts can provide-all at the scale needed to drive truly impactful results across the operational footprint.

The Seeq Industrial Enterprise Monitoring Suite provides the flexibility, speed, and robust capabilities needed to operationalize a condition-based prioritization and decision strategy. Grounded in frontline expertise and insights, Seeq Industrial Enterprise Monitoring helps ensure decision-makers have key insights at their fingertips, allowing for faster, better decisions and actions.

“Industrial Enterprise Monitoring builds upon and elevates the Seeq mission to enable the creation of the insights that empower decisions and actions that increase operational excellence, drive sustainable manufacturing and, ultimately, the customer’s bottom line,” said Mark Derbecker, Chief Product Officer of Seeq. “We’ve always known that the people across the organization are the secret ingredient, and Industrial Enterprise Monitoring enables a company to turn local insights and expertise into a powerful system-wide advantage.”

Through the Seeq Vantage app, industrial organizations can tailor, deploy and automate enterprise-level use cases, such as asset and process monitoring, condition-based maintenance, reliability and downtime tracking and more. Coupled with the Seeq Industrial Analytics and AI Suite, customers now have an integrated ecosystem to capture, analyze, aggregate, monitor, triage, investigate, and document insights and actions at the local level and the enterprise level. The app provides proactive and automated enterprise surveillance for daily operational decisions, and comprehensive assembly of operational effectiveness and utilization understanding to prioritize longer-term investment decisions.

“Seeq empowers industrial organizations by turning their expert knowledge into a strategic asset,” says Niels Andersen, Principal Research Analyst at LNS Research. “The Seeq Vantage app significantly enhances their enterprise monitoring and AI capabilities.”

Seeq Vantage is scheduled for general release in June 2024 and will be showcased at Conneqt from May 6-8, 2024.

Themed “Unleash,” Conneqt 2024 will bring together Seeq customers, partners, and other industry experts for interactive sessions examining how industrial organizations can unleash the power of their operational data and people with industrial analytics and AI.

“Conneqt provides a collaborative environment for the Seeq community to exchange ideas, data-driven insights, and industrial expertise,” says Dr. Lisa Graham, CEO at Seeq. “By leveraging the insights gained at Conneqt, along with the latest innovations in industrial analytics and AI, Seeq customers can unleash digital transformation outcomes across their organizations to enhance operational excellence and profitability.”

Conneqt 2024 will feature main stage and breakout sessions from industrial leaders representing various industries, such as oil & gas, chemicals, pharmaceuticals, and mining, metals, and materials. Customer presentations will showcase Seeq industrial analytics and AI use cases and best practices for addressing digital transformation, workforce empowerment, profitability, and sustainability initiatives.

During the customer keynote address, “Manufacturing Digital Transformation Journey: Unleash the Power of Data and AI/Analytics,” Dr. Sami Bahroun, Head of Industrial Data Science & Advanced Automation at Syensqo, will discuss how Syensqo, a multibillion-dollar specialty chemicals company, is scaling digital transformation and leveraging advanced analytics and AI to derive valuable data insights and drive progress toward strategic initiatives.

“Successful digital transformation requires industrial organizations to intentionally develop an open, digital ecosystem that both speeds up value creation and fosters a data-driven decision-making culture,” says Bahroun. “During my keynote, I will discuss how Sysensqo has developed our digital ecosystem and the key role Seeq plays in it by driving our vision for AI and analytics.”

Sessions will be recorded at Conneqt and offered on-demand on the Seeq website following the conference.

Conneqt 2024 has garnered support from key Seeq partners, including:

  • Executive Sponsor – AVEVA
  • Gold Sponsor – Amazon Web Services
  • Silver Sponsor – BKO AI
  • Silver Sponsor – IOTA Software

Seeq and sponsors will showcase their newest technologies at Conneqt at the Sponsor Expo. To learn more about Seeq, Conneqt, and future events, visit Seeq.com

About Seeq Corporation
Seeq, a global leader in advanced analytics and AI for industrial companies, delivers a self-service, enterprise SaaS platform and solutions to accelerate critical insights and action from historically unused data. Oil and gas, pharmaceutical, specialty chemical, utility, renewable energy, and numerous other vertical industries rely on Seeq to optimize business and production outcomes, including yield, margins, quality, and sustainability. Seeq is a privately held virtual company with employees across the United States, Asia, Canada, Europe, and South America. To learn more about Seeq, visit www.seeq.com.

 

Armexa Partners with ISA to Offer Standards-based OT Cybersecurity Training

Company to Provide Role-based Training on the ISA/IEC 62443 Series of Industrial Automation and Control Systems Cybersecurity Standards with Experts Who Have Applied Them for over a Decade

 

Houston, TX – May 2, 2024 – Armexa, a cybersecurity company that specializes in helping industrial companies achieve secure, safe, reliable, and compliant operations, announced today that it has recently entered into a course licensing agreement with the International Society of Automation (ISA) to deliver its industrial cybersecurity training suite of courses to clients based in North America.

 

Operational technology (OT) cybersecurity industry veteran John Cusimano, VP of OT Cybersecurity, will lead the program for Armexa. The company will conduct its first training in May for 100 employees of a global chemical company.

 

“Role-based training and awareness is crucial for the success of any program aimed at securing technology in operational environments.  By combining recognized standards, quality training materials, and expert instruction, Armexa’s ISA training customers will be well-equipped with the knowledge to identify security risks, understand the impact of their decisions, and adopt practices that reduce vulnerabilities.

 

With customized training that goes beyond the standard curriculum, we can incorporate elements tailored to the specific organization’s risks and needs. This means that the training not only covers essential cybersecurity concepts but also addresses the unique aspects of their operations,” said Cusimano.

 

The following courses are available and will be taught by Armexa’s highly experienced and qualified instructors:

 

  • Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32)
  • Introduction to Industrial Automation Security and the ISA/IEC 62443 Standards (IC32C)
  • Assessing the Cybersecurity of New or Existing IACS Systems (IC33)
  • IACS Cybersecurity Design & Implementation (IC34)
  • IACS Cybersecurity Operations & Maintenance (IC37)

 

Courses will be available in both in-person classroom settings and virtual, instructor-led formats, making it easy for professionals everywhere to participate.  Interested students who successfully complete a designated ISA/IEC 62443 training program are eligible to sit separately for the related certificate program exam.

 

“Armexa’s trainers bring an unprecedented wealth of practical experience, that will enhance our already industry-leading course material with examples from real-life scenarios.” said Dalton Wilson, ISA’s Managing Director of Education Services.  “This approach helps participants understand how to apply their learning in everyday situations. We are excited that Armexa will be helping us bring this much-needed offering to the OT cybersecurity marketplace.”

 

For more information or to schedule a training, visit https://armexa.com/services/governance/industrial-cybersecurity-training/.

 

About Armexa

Armexa, an industrial cybersecurity company, is a team of dedicated operational technology (OT) cybersecurity experts with decades of hands-on experience working in gas plants, refineries, pipelines, manufacturing facilities and offshore facilities to help those operations run safely, reliably and securely. Armexa helps organizations build and commission OT cybersecurity programs that align with industry regulations, standards, and companies’ existing IT security policies and standards. Visit Armexa.com to learn more.

 

About ISA

The International Society of Automation (ISA) is a non-profit professional association founded in 1945 to create a better world through automation. ISA’s mission is to empower the global automation community through standards and knowledge sharing. ISA develops widely used global standards and conformity assessment programs; certifies professionals; provides education and training; publishes books and technical articles; hosts conferences and exhibits; and provides networking and career development programs for its members and customers around the world. Learn more at www.isa.org.