Table of Contents
Breach Secure Now!’s New Breach Prevention Platform Provides MSPs with Tools to Minimize the Chance of Client Data Breaches
Data Breach Digest: Breach trends that will define incident response
Risk analytics market to experience serious growth
Diagnosis SOC-atrophy: What To Do When Your Security Operation Center Gets Sick
Corax Selects Splice Machine’s Dual-Engine RDBMS to Deliver Faster, Real-Time Cyber Security Analytics to its Customers
Increased Complexity of Attacks to Create Opportunities for the Global Security Intelligence and Analytics Solutions Market Through 2020, Reports Technavio
Breach Secure Now!’s New Breach Prevention Platform Provides MSPs with Tools to Minimize the Chance of Client Data Breaches
Breach Secure Now! has released its highly anticipated Breach Prevention Platform, a suite of security tools to help MSPs reduce the likelihood of their clients having a data breach.
MSPs can add these breach prevention tools to their portfolio of IT services, and offer them to clients under their own label.
Breach Prevention Platform sits behind the MSP’s branded security portal and lets clients access a variety of tools, from automated security risk assessments (SRA) and simulated phishing attacks to security policies and ongoing employee security training.
A new addition to the Breach Prevention Platform is the variety of employee security training tools, since the majority of breaches happen due to human error.
The security training starts with an overview of security threats, such as phishing scams, ransomware, social media hoaxes, hackable wifi, etc., and the information is bolstered with ongoing lessons aimed at reinforcing the initial material.
As an option, MSPs can add $100,000 of financial protection and breach response services to the Breach Prevention Platform.
These value-added services can provide the critical help their clients will need to survive and recover if a breach does occur.
The breach response services supplement the services MSPs already provide to their clients.
Unlike the MSP’s typical security offerings of firewalls, anti-virus and security patches that are invisible to clients, Breach Prevention Platform is customer-facing and interactive.
Link: http://www.pressreleaserocket.net/breach-secure-nows-new-breach-prevention-platform-provides-msps-with-tools-to-minimize-the-chance-of-client-data-breaches/467332/
Data Breach Digest: Breach trends that will define incident response
Along with being a great way to make sense of the major security news we see every day, a key part of effective breach response is being able to anticipate the emerging threats and effectively integrate them into the incident response process.
The following reviews a few of our 2015 predictions to see how they fared and some fresh threats for businesses to consider:
EMV Chip and PIN Liability Shift Will Not Stop Payment Breaches
The Healthcare Industry Will Face New Attacks and Stay in the Crosshairs
Cyber Conflicts Between Countries Will Leave Consumers and Businesses as Collateral Damage
The first half of 2016 has also presented several threats that companies must be on the lookout to address:
Phishing for Data (Not Malware)
Username and Password Hacks Are Back in Style
Corporate Extortion
Link: http://www.securityinfowatch.com/article/12228883/data-breach-digest-breach-trends-that-will-define-incident-response
Risk analytics market to experience serious growth
The risk analytics market is estimated to grow from USD 16.55 billion in 2016 to USD 30.18 billion by 2021, at a Compound Annual Growth Rate (CAGR) of 12.8%, according to MarketsandMarkets.
The major vendors in the Risk Analytics Market include IBM, SAP, SAS Institute, Oracle, FIS Global, and Verisk Analytics, along with others.
The GRC software is expected to dominate the market from 2016 to 2021.
This is due to the fact that this software empowers organizations with the ability to identify, manage, monitor, and analyze risk and compliance across the enterprise in a single integrated solution.
Scorecard and visualization tools software is expected to gain traction in the next five years as it enables representation of multi-dimensional data to enhance the quality of analysis and insight by facilitating rapid and accurate observations.
The manufacturing segment is expected to grow at a rapid rate from 2016 to 2021 in the Risk Analytics Market.
The high growth rate can be attributed to the rapidly changing customer expectations, fierce market competition, and stringent regulatory constraints faced by the manufacturing industries.
North America is expected to have the largest market share and dominate the Risk Analytics Market from 2016 to 2021, due to increasing adoption of risk analytics software and services by organizations in order to safeguard their businesses from losses and also because of the stern non-compliance measures adopted by the government and various regulatory bodies in this region.
APAC offers potential growth opportunities due to the rise in technology penetration and presence of large number of SMEs which are under tremendous competitive pressure from large enterprises.
Link: https://www.helpnetsecurity.com/2016/07/06/risk-analytics-market/
Diagnosis SOC-atrophy: What To Do When Your Security Operation Center Gets Sick
Congratulations, you’re the new CISO.
Whether you have served in the role previously or it’s new to you, you’ll be asked to observe your new organization, to develop a 100-day plan, to evaluate people, processes, and technology, and of course you’ll need to tell the CEO where you would attack the organization and how you will protect against that.
It’s a daunting and exciting task to be the new CISO.
Your SOC became sick for several reasons.
The technology you have is antiquated and completely signature-based, best suited for static threats, not advanced threats.
While signature-based solutions have a role, it’s a secondary protection role.
The organization failed to keep up with technology and the evolving threat.
For years, the organization has relied on incremental funding.
This budget strategy has a typical result; a disparate mix of capabilities purchased individually as security silos without consideration for how the capabilities will work together.
The tools don’t work together.
It’s an integration nightmare!
Your goal now is to bring it back to a healthy state.
Here are five strategies to overcome SOC-atrophy.
– Research to understand all SOC investments.
– Perform a SOC-focused assessment.
– Study the threat landscape.
– Resist the urge to fund your tools piecemeal.
– Encourage cross-organizational collaboration.
Link: http://www.darkreading.com/threat-intelligence/diagnosis-soc-atrophy-what-to-do-when-your-security-operation-center-gets-sick/a/d-id/1326118
Corax Selects Splice Machine’s Dual-Engine RDBMS to Deliver Faster, Real-Time Cyber Security Analytics to its Customers
SAN FRANCISCO, July 6, 2016 /PRNewswire/ — Splice Machine, the dual-engine RDBMS for mixed operational and analytical workloads, powered by Hadoop and Spark, today announced that Corax, a startup company that provides cloud-based cyber security operations, analysis and reporting software, has selected Splice Machine to manage its risk quantification calculations, store large datasets and meet future scalability requirements.
Leveraging machine learning and a streamlined user interface, Corax will be able to provide faster, meaningful recommendations to its customers about cyber security actions, investment and insurance, helping them make decisions that prevent cyber crime and data loss.
Splice Machine is a dual-engine RDBMS for mixed operational and analytical workloads, powered by Hadoop and Spark.
Instead of having to synchronize data across multiple compute engines like a traditional Lambda architecture, Corax is able to rely on a less complex architecture with a dual-engine RDBMS, enabling its analytical systems to propagate threat data in real-time, while simultaneously performing compute-heavy analytics jobs – all from one data source.
Link: http://finance.yahoo.com/news/corax-selects-splice-machines-dual-120000362.html
Increased Complexity of Attacks to Create Opportunities for the Global Security Intelligence and Analytics Solutions Market Through 2020, Reports Technavio
LONDON–(BUSINESS WIRE)–Technavio analysts forecast the global security intelligence and analytics solutions market to grow at a CAGR of over 10% during the forecast period, according to their latest report.
The research study covers the present scenario and growth prospects of the global security intelligence and analytics solutions market for 2016-2020.
The report also lists security intelligence and security analytics as the two main product segments, with security intelligence accounting for more than 71% of the market share.
Most internet service providers have a distributed architecture hence, a security solution at the network level cannot limit the threat of attacks.
Most attacks on systems originate from the web.
For consumers, most threats are sourced from web interactions and peer-to-peer usage.
As these threats target specific systems, they are difficult to detect and prevent at the network level.
Therefore, end-users are increasingly adopting security intelligence and analytics solutions at a rapid pace, as these solutions help in detecting and eliminating the threats.
According to Amrita Choudhury, a lead analyst at Technavio for IT security research, “Security breaches pose the threat of loss of end-user data and will lead potential customers away from the company as well as erode the brand image and equity of the company.
Thus, investments in threat intelligence security have considerably increased due to increased need for enterprises to preserve their reputation and brand image.”
The complexity of threats directed toward end-users is increasing.
For instance, threats such as advanced persistent threats are on the rise.
Unlike the traditional threats that were individual in nature and were targeted at a single system, these threats are targeted at a whole setup.
Furthermore, they have the capability to bring down the infrastructure of a whole entity.
Hence, to counter these attacks, which are increasing in both frequency and complexity, end-users are adopting security analytics solutions at a rapid pace.
Growing use of mobile devices such as laptops, smartphones, and other handheld devices is contributing to the growth of the market.
The increased use of mobile devices leads to the storage of critical information and easy access to this information.
This increases the need to protect these devices.
Link: http://www.businesswire.com/news/home/20160705005292/en/Increased-Complexity-Attacks-Create-Opportunities-Global-Security