Tag Archive for: secures

Enea Secures Order for Signaling Security in Mobile Networks from European Operator


Enea has received an order for signaling security in mobile networks from a European telecom operator. 

The agreement covers new business with an existing customer and includes software as well as services in multiple countries. Revenues of EUR 1 million are booked in the fourth quarter of 2022. 

The remaining part is recognized during a three-year period. The total order value is EUR 2.2 million.

Enea is a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide. Enea provides a unique combination of intelligence, expertise in defensive cybersecurity, and award-winning software solutions for advanced threat detection and response.

Jan Häglund, President and CEO of Enea
The geopolitical situation in Europe puts focus on cyber threats against mobile networks. Enea AdaptiveMobile Security products are market leading and play an important role in protecting against intrusion and sabotage attempts.

Source…

Imperva DSF Secures Your Data in Amazon Web Services Enterprise Data Lakes


Data lakes serve as a central repository for storing several data types – structured, semi-structured, and unstructured – at scale. One of the ways data lakes are useful is they do not require any upfront work on the data. You can simply integrate and store data as it streams in from multiple sources.

Amazon’s AWS data lakes are some of the most popular cloud data solutions available on the market today. AWS data lakes are purpose-built to deliver secure cloud architectures to customers. AWS helps relieve its customers’ operational burden by operating, managing, and controlling the components from the host operating system and virtualization layer down to the physical security of the facilities in which the service operates. It is the customer’s responsibility, however, to secure their sensitive data. You can see how this works in the shared responsibility model AWS follows.

Risks to sensitive data start to pick up momentum when organizations move workloads to the cloud quickly and lose track of where their sensitive data resides. To maintain security in these environments, you need a good data catalog, know where data copies are, where snapshots may be, etc. You must also have enforceable access control policies in place around sensitive data. You must have audit trails, the ability to run data through forensics if needed, the ability to validate what entitlements are and reduce them, and the capacity to check for vulnerabilities from a surface area perspective. These aren’t new practices; they have been integral to how organizations have applied data-centric security strategies to data repositories for years. What’s new is the need to apply these practices to cloud-managed environments like AWS data lakes.

Imperva Data Security Fabric (DSF) enables enterprises to protect their sensitive data in AWS enterprise data lakes and help demonstrate data compliance. The Imperva DSF solution enables AWS customers to see and secure their sensitive data through a single comprehensive platform and leverage a unified security model across Amazon Aurora, Amazon Redshift, Amazon Relational Database Service (RDS), Amazon DynamoDB, Amazon Athena, and AWS CloudFormation without…

Source…

Detectify secures $10M more to expand its ethical hacking platform • TechCrunch


Detectify, a security platform that employs ethical hackers to conduct attacks designed to highlight vulnerabilities in corporate systems, today announced that it raised $10 million in follow-on funding led by Insight Partners. CEO Richard Carlsson says that the new cash, which brings Detectify’s total raised to $42 million, will be put toward product development and improving the overall user experience.

Detectify was founded by four ethical hackers from Stockholm, including Carlsson, who realized the business potential in combining security research with automation. In an interview with TechCrunch, Carlsson pointed out that product development workflows have changed dramatically over the past few years, with new teams within organizations spinning up internet-facing apps and adding potentially vulnerable assets to their employer’s environment. The trend toward low- and no-code tools has lowered the app development barrier to entry, but it’s also made the jobs of security specialists that much harder.

Illustrating the challenges, a recent Dark Reading survey found that 26% of IT and security experts don’t trust the platforms used to create low- and no-code apps. Roughly as many — 25% — said that they don’t even know which apps within their companies are being created by these tools.

“While companies should integrate security best practices earlier in their development cycle and try to catch vulnerabilities in development, production is what truly matters,” Carlsson added via email. “Unless you have a completely linear development process, which no company actually has, you will never catch everything. And this legacy mindset and over-reliance on ‘shifting left’ instills a sense of false confidence in organizations that actually increases their risk level.”

Detectify

Image Credits: Detectify

Detectify’s approach crowdsources real payloads — pieces of code that execute when a hacker exploits a vulnerability — from a private community of ethical hackers and uses these contributions for payload-based tests. Carlsson claims that Detectify tests customers’ entire attack surfaces, exposing how malicious attackers might exploit…

Source…

BlueHalo Secures DOD Contract for Titan Unmanned Aerial Systems; CEO Jonathan Moneymaker Quoted


A division of defense and aerospace contractor BlueHalo has secured a contract from the U.S. Department of Defense for a delivery of the company’s unmanned aerial systems.

As a result of the $24 million contract, BlueHalo Titan Defense will provide its Titan Counter-Unmanned Aerial System product, which is designed using artificial intelligence, machine learning and radio frequency, the Arlington, Virginia-based company said Tuesday.

Jonathan Moneymaker, CEO of BlueHalo and a 2022 Wash100 Award, explained that Titan works by utilizing the aforementioned technologies to hone in on threats and maintain thresholds of safety for warfighters.

Moneymaker cited Titan as a “force multiplier” for military personnel and said it is intended to prevent casualties on the battlefield and will help the DOD meet objectives.

The award also comes on the heels of the DOD’s recognition of the Titan platform as a Program of Record technology, after more than five years of proven effectiveness in combat and domestic usages.

Titan’s products will be employed for pre-deployment processes, mobile security, fixed site protection and dismounted operations by a confidential government agency through the new DOD contract. The line of autonomous systems have been contracted in the past by the Army, Navy, Air Force, Marines, U.S. Special Operations Forces and various federal departments.

In May, BlueHalo filled a $4 million order for Titan C-AUS kits from the Army.