In the Enterprise news, ShieldX adds lateral movement prevention to the Elastic Security Platform for AWS, Tenable Integrates with Google Cloud Security Command Center, Capsule8 to help Google Cloud SCC members consolidate findings and speed up response, and Evident and Okta partnership simplifies identity verification and reduces risk for businesses!
ShieldX adds lateral movement prevention to the Elastic Security Platform for AWS - ShieldX, the leader in elastic security, announced the addition of lateral movement prevention to the ShieldX Elastic Security Platform for AWS. Also known as East-West security, enterprises can now for the first time monitor and prevent lateral movement inside the AWS public cloud to complement ShieldX’s existing capability for VMWare ESXi and Microsoft Azure.
Threat Stack Cloud Security Platform features improved visibility of Kubernetes environments - As companies adopt Kubernetes to help orchestrate their container infrastructure, security processes and policies have been slow to adapt. This has led to increased risk as companies deploy containers without the appropriate security processes and tools in place. Threat Stack is enabling its customers to securely adopt containers and Kubernetes by eliminating the additional risk associated with the lack of visibility into their container infrastructure.
Tenable Integrates with Google Cloud Security Command Center - Tenable®, Inc. announced the integration of Tenable.io® — for vulnerability management in the Cloud — with Google Cloud Security Command Center (Cloud SCC). This provides organizations with enhanced visibility into their cloud assets, both public and private, delivered via a single dashboard. Cloud-focused organizations can now confidently manage Cyber Exposure across the entire modern attack surface and reduce cyber risk in their environments.
Quest Software announced the introduction of Foglight Container Management - Quest Software announced the introduction of Foglight Container Management, a solution that provides real-time and historical analytics of containers and its hosts across physical, virtual and cloud environments. Foglight Container Management supports business’s container initiative by empowering IT infrastructure teams to quickly identify incidents and proactively prevent issues from happening. With Foglight Container Management, businesses can make faster, smarter decisions when it comes to container deployment.
Flashpoint Strengthens Intelligence Platform with New Dashboards and Analytics, Expanded Collections and Tailored Alerting by Industry - The new innovations and enhancements strengthen Flashpoint Intelligence Platform, which grants access to the company’s archive of finished intelligence reports, data from illicit forums, marketplaces, chat services, paste sites, technical data, card and account shops, and vulnerabilities, in a finished intelligence experience. The platform scales Flashpoint’s internal team of specialised, multilingual intelligence analysts’ ability to quickly provide responses to customers. The platform now features new dashboards and analytics, expanded datasets, chat services and communities, and industry alerting that simplify an organisation’s consumption and automation of intelligence.
RiskSense Research Report Finds Attackers Weaponized More Security Vulnerabilities Last Year than Ever Before - 2018 was most weaponized year on record Despite a 31% decrease in vulnerabilities compared to the high reached in 2016, last year had the most weaponized vulnerabilities ever (177), which represents a 139% increase compared to 2017 (74). Meanwhile, the percentage of vulnerabilities weaponized in 2018 (47.3%) was double compared to 2017 (20.6%) and 2016 (23.2%). Most exploits are available before a patch is 2018 also had the highest number of exploits in the wild before a patch was available (50), compared to the previous record set in 2010 (18). This represents a nearly 200% increase.
Visit https://securityweekly.com/esw for all the latest episodes!
[caption id="attachment_210" align="alignleft" width="120"] Paul Asadorian - CTO, Security Weekly.[/caption]
[caption id="attachment_210" align="alignleft" width="120"] Matt Alderman - CEO, Security Weekly.[/caption]
Register for our upcoming webcasts by going to securityweekly.com/webcasts . If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand. Also, you can now submit your suggestions for guests in our recently released guest suggestion form! Go to securityweekly.com/guests and enter your suggestions!
Security experts are saying that Missouri's governor is mischaracterizing the actions of a journalist who reported a data leak vulnerability in a state website, demonstrating a clear lack of understanding among some politicians about the inner workings of the cyber community.
The Department of Justice will more aggressively pursue contractors and grantees for misrepresenting their cybersecurity posture to the government. While few doubt there's a real problem to be solved, some in the legal and contracting community have raised questions about whether it could clash with other Justice and Biden administration cybersecurity priorities, and whether a good intentioned initiative could create a chilling effect among companies seeking government opportunities.