Tag Archive for: Vendor

SecurityGen earns the praise of mobile operators at the ROCCO Vendor Innovators Awards 2022


The ACE platform is a telecoms industry first: the first completely automated breach and attack simulation platform that is purpose-built for securing mobile networks. ACE provides an automated approach to assess and improve the security posture of mobile operators by continuously testing the strength of their network defences against hackers, fraudsters and other malefactors.

SecurityGen co-founder and Global Head of Operations Paolo Emiliani made a 30-minute presentation on the ACE platform to a judging panel of four “lions” consisting of senior executives from telecom operators – Luc Lamoureux at Reliance Jio, Cameron Dunn at AT&T, and Atim Akeh-Osu at MTN GlobalConnect – plus Stéphanie Fleury, technology entrepreneur and presenter on CNN Brasil.

“Mobile operators worldwide are launching 5G networks and services that promise dramatically faster speeds, lower latency, and connectivity for billions of devices. But the convergence of IT and telecoms brings with it significant new security concerns,” explained Emiliani.

“As operators transition to 5G, they will face new challenges emerging from new technologies like virtualisation and open infrastructure concepts, including open RAN. This new open ecosystem will require operators to critically evaluate their risk postures and adopt new approaches to security. Having a team of virtual experts to support their security teams and ensure proactive security coverage must be a priority.

“This is where SecurityGen has a leading role to play. Our focus is to drive the next phase of telecom security innovation by harnessing the power of research to identify new vulnerabilities and continuously develop proactive security approaches that solve them.”

The ACE platform draws on the vast knowledge and experience of SecurityGen’s core team who have conducted a combined total of more than 300 telecom network security assessments during their careers. Its in-built AI module enables it to constantly learn and enhance its performance by incorporating actual, real-life scenarios and attack vectors that have been identified in the field. And because ACE is available as a cloud-based offering, operators don’t need to install it directly, or…

Source…

City of Fresno launches program to install security cameras on mobile food vendor carts – Bakersfield Now



City of Fresno launches program to install security cameras on mobile food vendor carts  Bakersfield Now

Source…

Top XDR Vendor – Security Boulevard


Are you satisfied with your current XDR Vendor services? If not, are you interested in getting robust security from a reliable Top XDR vendor with advanced capabilities to become your network almost impenetrable? Now, you can.

Seceon’s XDR takes grey and white spaces out of the cyber security canvas, leaving nothing to guesswork, abandonment or fate – making it a truly “One Stop Shop” for multi-layered protection against threats, attacks, compromises and exploits

Seceon provides a powerful security tool that merges multiple security products to create a unified security system for a comprehensive yet simpler outlook of potential threats across the whole network in your business environment.

As cybersecurity experts, Top XDR vendor, Seceon Inc provide a tool that helps identify highly complicated, hidden threats, track threats across various systems, lower the cost of security operations, and boost detection and response speed.

The XDR is Extended Detection and Response cybersecurity tool, a SaaS-based and vendor-specific security threat detection and response tool for improved productivity of operational security components.

We understand an enterprise’s need for a single and proactive security measure. That’s why we designed a tool to defend the entire landscape of different technology assets, such as mobile, cloud workloads, legacy endpoints, and in-house management security resources, without burdening staff or the IT department.

While attackers are developing more complex tactics, procedures, techniques to successfully penetrate and exploit security controls and sensitive information, we are also working on stopping those incidences with security measures that cancel their efforts.

Here are the advantages of using reliable and flagship XDR vendors:

Get Improved Operational Productivity

One of the best-selling points of this incredible cybersecurity tool is the unification of multiple solutions under one accessible interface. For example, you have a single screen to access a wide range of software. It helps your information security team and increases productivity without any potential attack on a network.

Get Reduced Costs & Resource Usage

Every enterprise finds…

Source…

Supply chain and nation-state attacks will highlight 2022, says vendor


Supply chain attacks and nation-state cyber warfare will continue to cause anguish for CISOs in 2022, says Check Point Software in its annual predictions blog.

Supply chain attacks will become more common, the security company said, which will lead to governments beginning to establish regulations to address these attacks and protect networks. They will also look into collaborating with the private sector as well as with other countries to identify and target more threat groups operating on a global and regional scale.

Check Point also expects to discover more about the global impact of the Sunburst attack on SolarWinds Orion network monitoring suite.  “As investigations are still ongoing, security researchers will unveil some of the biggest questions regarding the attack: What were the attackers doing these networks, and how did they benefit from the massive attack?”

“Supply chain attackers take advantage of a lack of monitoring within an organization’s environment,” the blog warns. “The well-known SolarWinds supply chain attack stands out in 2021 due to its scale and influence, but other sophisticated supply chain attacks have occurred, such as Codecov in April, and most recently, Kaseya.  Kaseya provides software for Managed Service Providers (MSPs) and the REvil ransomware gang exploited the company to infect over 1,000 customers with ransomware.  The group demanded a ransom of $70 million to provide decryption keys for all affected customers.

Among other predictions:

The cyber ‘cold war’ intensifies: The cyber cold war is intensifying, and taking place online as more nation-state actors push western governments and continue to destabilize society. Improved infrastructure and technological capabilities will enable terrorist groups and political activists to further their agendas and carry out more sophisticated, widespread attacks. Cyber-attacks will increasingly be used as proxy conflicts to destabilize activities globally;

Attackers leverage vulnerabilities in microservices to launch large scale attacks: The move to the cloud and DevOps will result in a new form of botnet. With microservices becoming the leading method for application development,…

Source…