{"id":5065,"date":"2022-02-13T13:04:00","date_gmt":"2022-02-13T18:04:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/?p=5065"},"modified":"2022-03-05T13:06:01","modified_gmt":"2022-03-05T18:06:01","slug":"soc-news-2022-02-13","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2022\/02\/13\/soc-news-2022-02-13\/","title":{"rendered":"SOC News &#8211; 2022-02-13"},"content":{"rendered":"\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/itsecuritywire.com\/wp-content\/uploads\/2022\/02\/Wire-implements-new-Messaging-Layer-Security-protocol-01-1024x577.jpg\" width=\"16\">&nbsp;<strong>Wire implements new Messaging Layer Security protocol<\/strong><br><em>IT Security Wire<\/em><br>Wire, the world\u2019s most secure collaboration platform, is starting to implement the Messaging Layer Security (MLS) protocol into its platform architecture.<br>This will be the world\u2019s first implementation of the MLS protocol in a federated environment and it marks the start of MLS as an open standard solution for communication.<br><br>Co-initiated by Wire as part of the Internet Engineering Task Force (IETF) Working Group which includes members from Cisco, Mozilla, Google, Facebook, Twitter, the University of Oxford and INRIA, MLS is a new protocol designed to bolster the security of enterprise messaging platforms by using end-to-end encryption within group communication.<br><br>MLS allows users to communicate across devices, within the cloud, while offering maximum fluidity, as it exists within a federated environment, with no central cloud needed for its implementation.<br>This opens up the possibility of using multiple devices in a secure environment, relying fully on an open standard, something that many business or government employees have been doing for some time in insecure environments.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/itsecuritywire.com\/news\/wire-implements-new-messaging-layer-security-protocol\/\">https:\/\/itsecuritywire.com\/news\/wire-implements-new-messaging-layer-security-protocol\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/images.idgesg.net\/images\/article\/2022\/01\/the-enterprise-browser-hello-world_1600x816-1-100917744-large.jpg?auto=webp&amp;quality=85,70\" width=\"16\">&nbsp;<strong>Start-up emerges with an \u2018enterprise browser&#8217;<\/strong><br><em>Lucas Mearian<\/em><br><em>Computer World<\/em><br>The Island browser is based on Chrome and can limit site access and stop employees from uploading and downloading data, copying and pasting information, and even taking screenshots.<br>Admins can fully control last-mile actions, from advanced security demands to more basic data exfiltration protections such as copy, paste, download, upload, screenshots, and other activities that might expose critical data.<br>The browser works with both Windows and macOS; mobile versions (for iOS and Android) as well as for Linux are forthcoming, the company said.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.computerworld.com\/article\/3648597\/start-up-emerges-with-an-enterprise-browser.html\">https:\/\/www.computerworld.com\/article\/3648597\/start-up-emerges-with-an-enterprise-browser.html<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/datacentre.solutions\/news\/63099\/binalyze-secures-104-million-in-seed-funding-for-enterprise-forensics-platform\" width=\"16\">&nbsp;<strong>Binalyze secures $10.4 million in seed funding for enterprise forensics platform<\/strong><br><em>Data Center Solutions<\/em><br>Binalyze, the Enterprise Forensics platform which enables enterprises to respond faster and more effectively to cyber threats, has raised $10.4 million (\u20ac9.1m) in its Seed funding round.<br>The investment will enable further innovation to define the standard for next-generation Enterprise Forensic solutions.<br>It will support the extension of Binalyze\u2019s cloud-native capabilities to enhance coverage in cloud and container environments and enable it to continue to be the fastest and most complete Enterprise Forensics Platform on the market.<br><br>The investment will also accelerate Binalyze\u2019s expansion in the US, Europe, and other key global markets enabling enterprises, MSP, and Incident Response partners to mount a forensic response to cybersecurity attacks in near-real-time.<br>This minimizes damage and cost to the business.<br><br>The investment, which brings total funding to date to $11.7 million, was led by European venture capital firm OpenOcean, with participation from Earlybird Digital East which led Binalyze\u2019s pre-seed round last year.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/datacentre.solutions\/news\/63099\/binalyze-secures-104-million-in-seed-funding-for-enterprise-forensics-platform\">https:\/\/datacentre.solutions\/news\/63099\/binalyze-secures-104-million-in-seed-funding-for-enterprise-forensics-platform<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/dispatchist.com\/assets\/images\/logo.png\" width=\"16\">&nbsp;<strong>CyberCX aquisition of Cyber Research NZ a game-changer<\/strong><br><em>Disp<\/em><br>CyberCX has today announced its successful acquisition of New Zealand cyber security company Cyber Research NZ Ltd, bringing further capability, talent and depth of experience to its service offerings in New Zealand and across the ANZ region.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/dispatchist.com\/news\/cybercx-aquisition-of-cyber-research-nz-a-game-changer\/\">https:\/\/dispatchist.com\/news\/cybercx-aquisition-of-cyber-research-nz-a-game-changer\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/mms.businesswire.com\/media\/20220209005459\/en\/1354131\/23\/founders_vicarius_01.jpg\" width=\"16\">&nbsp;<strong>Vicarius Announces $24 Million Series A Funding to Rebuild the Vulnerability Remediation Market for Today\u2019s Remote, Cloud-Based World<\/strong><br><em>Business Wire<\/em><br>NEW YORK&#8211;(BUSINESS WIRE)&#8211;Vicarius, developers of the industry\u2019s first fully autonomous end-to-end vulnerability remediation platform, today announced a $24M Series A round to breathe new life into the vulnerability remediation market.<br>AllegisCyber Capital, JVP, and AlleyCorp led the round with executives from Okta, SecurityScorecard, and Exabeam providing capital as well.<br><br>Founded by three security experts, Michael Assraf, Yossi Ze\u2019evi and Roi Cohen, Vicarius equips IT and security teams with a fully automated and consolidated platform, TOPIA, to assess, prioritize, and remediate vulnerabilities in applications, assets, and operating systems.<br>Traditional network and scanning-based tools focus exclusively on vulnerability discovery or patch management and can\u2019t adapt to changing WFH infrastructure.<br>Vicarius provides a cloud-first, integrated solution that closes the loop from discovery to remediation for today\u2019s shift to remote work and cloud-based applications.<br><br>Because Vicarius provides threat insight as well as extensive patching capabilities and prioritization, IT and security teams have a deeper understanding of what is vulnerable, how much risk is present, and where patches have been applied.<br>As a result, CISOs and IT administrators achieve safer networks and lower likelihood of exploitation through cooperation.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.businesswire.com\/news\/home\/20220209005459\/en\/Vicarius-Announces-24-Million-Series-A-Funding-to-Rebuild-the-Vulnerability-Remediation-Market-for-Today%E2%80%99s-Remote-Cloud-Based-World\">https:\/\/www.businesswire.com\/news\/home\/20220209005459\/en\/Vicarius-Announces-24-Million-Series-A-Funding-to-Rebuild-the-Vulnerability-Remediation-Market-for-Today%E2%80%99s-Remote-Cloud-Based-World<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/aithority.com\/wp-content\/uploads\/2017\/09\/cropped-AITHORITY-300-x-70-LOGO-1-270x270.png\" width=\"16\">&nbsp;<strong>Cyware Enhances Automated Threat Intelligence Sharing for Auto-ISAC to Promote a Collective Defense<\/strong><br><em>AI Thority<\/em><br>Cyware, the industry\u2019s only Virtual Cyber Fusion Platform provider, announced that it has partnered with the Automotive Information Sharing and Analysis Center (Auto-ISAC) to give its members the ability to automatically aggregate, share, and collaborate on actionable threat intelligence.<br>Over 20+ ISACs \/ ISAOs leverage Cyware solutions as the de facto standard for automated threat intelligence sharing, collaboration, and distribution.<br><br>Auto-ISAC joins a cross-sector, connected network of over 20 other Information Sharing Analysis Centers (ISACs) and Community Emergency Response Teams (CERTs) using Cyware\u2019s Situational Awareness Platform (CSAP) and Threat Intelligence Exchange (CTIX) to boost their overall threat intelligence sharing process, accelerate incident response time, and reduce cybersecurity risk.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/aithority.com\/security\/cyware-enhances-automated-threat-intelligence-sharing-for-auto-isac\/\">https:\/\/aithority.com\/security\/cyware-enhances-automated-threat-intelligence-sharing-for-auto-isac\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/techbeacon.com\/android-chrome-192x192.png\" width=\"16\">&nbsp;<strong>SecOps and XDR: Why trusted digital operations centers are essential<\/strong><br><em>Mark Fernandes<\/em><br><em>Tech Beacon<\/em><br>Security operations are evolving from a purely technical capability to a key contributor to business resiliency, with cybersecurity becoming an imperative for organizations that have become keenly aware of the need to enable their digital future.<br><br>The latest generation of SOCs further extends XDR to turn SOCs into trusted digital operations centers (TDOCs), which bring advanced threat hunting capabilities to infrastructure, network signals, and the cloud.<br>Some of the capabilities of the new TDOC are:<br>Securing the digital value chain, reducing friction to the business, and enabling adoption of innovation to drive new markets and customer value<br>Crossing over electronic capability to enable enterprise resiliency, such as the ability to combine fraud with cybercrime to provide a holistic view of digital risk<br>Tying measurement to performance of business goals to evolve the SOC from a tech-oriented to a business-oriented capability<br>Providing an anti-fragility platform where any systemic threats to the business help strengthen its cyber defense through machine-aided root-cause analysis, learning, and transformational metrics<br>Ensuring self-healing and zero interruption to the business to limit disruption in delivery of value to the customer or stakeholder<br>Moving beyond the reactionary methods of traditional SOCs and XDR centers to build greater sensing and interpretation methods<br>Automating repeatable and expert tasks that are best done by machines so teams can focus on tasks best performed by wetware, such as creative threat hunting<br>Collaborating with trust circles, peers, and other parties to be proactive about threats through tightly coupled and cross-functional intelligence sharing<br>A traditional SOC can&#8217;t be transformed into a TDOC overnight.<br>During the first phase of the plan&#8217;s implementation, the business should establish the basis for the TDOC to accelerate digital transformation by clearly defining governance, capabilities, alignment with the business, and agile structure needed to do so.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/techbeacon.com\/security\/secops-xdr-why-trusted-digital-operations-centers-are-essential\">https:\/\/techbeacon.com\/security\/secops-xdr-why-trusted-digital-operations-centers-are-essential<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/www.enterprisenetworkingplanet.com\/wp-content\/uploads\/2021\/04\/ENP_logo_Favicon.png\" width=\"16\">&nbsp;<strong>Integrating IT Security with DevSecOps: Best Practices<\/strong><br><em>Aminu Abdullahi<\/em><br><em>Enterprise Networking Planet<\/em><br>What Is DevSecOps?<br>==================<br>Why care about DevSecOps.<br>What does it look like in practice?<br>Challenges to Address Before Implementing DevSecOps<br>===================================================<br>Lack of integration between DevOps and IT security tools<br>Software development lifecycle\/pipeline practices<br>Issue detection\/response mechanism<br>Defining ownership<br>Security mindset<br>Why is IT Security Integral to the DevSecOps Cycle?<br>===================================================<br>IT Security and DevSecOps Integration Best Practices<br>====================================================<br>Automate tools and processes<br>Encourage culture change across organizations<br>Test early and often<br>Communicate proactively<br>Adopt static application security testing (SAST)<br>Adopt dynamic application security testing (DAST)<br>Adopt interactive application security testing (IAST)<br>Adopt application security testing as a service (ASTaaS)<br>========================================================<br>Future of DevSecOps in Enterprises<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.enterprisenetworkingplanet.com\/guides\/integrating-it-security-with-devsecops-best-practices\/\">https:\/\/www.enterprisenetworkingplanet.com\/guides\/integrating-it-security-with-devsecops-best-practices\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/dz2cdn2.dzone.com\/themes\/dz20\/images\/favicon.png\" width=\"16\">&nbsp;<strong>8 Penetration Testing Trends You Should Know in 2022<\/strong><br><em>Niranjan Limbachiya<\/em><br><em>D Zone<\/em><br>The Three Kinds of Penetration Testing:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>White-box Testing<\/li><li>Black-box Testing<\/li><li>Grey-box Testing<\/li><\/ul>\n\n\n\n<p>The international pen-testing market is projected to hit a CAGR of around 14.2% during 2018-2027.<br>It is estimated to reach around $ 2.6 billion by the year 2027<br>According to the newest study Penetration Testing Market is anticipated to mature at a CAGR of 24.9% from 2017 to 2025.<br>The pen tests market size was projected to be USD 4,426 million in 2016 and is estimated to reach USD 6,887 million by 2025, registering a CAGR (compound annual growth rate) of 24.9 percent.<br>The pen tests industry is primarily driven by continuous cyber-attacks and mounting cybersecurity threats.<br>The Pen testing market is also estimated to hit 3.2 billion and rise with a 27 percent CAGR (compound annual growth rate) during the prediction period 2016-2023<br>As per Verified Market Research the Pen Testing Market size was valued at $ 1) 39 Billion in 2020 and is estimated to hit USD 7) 79 Billion by 2028, growing at a Compound annual growth rate (CAGR) of 24 percent from 2021 to 2028)<br>Top 8 Penetration Testing Trends to adapt in 2022<br><br>1) DevSecOps<br>2) Blockchain-centric Tech will increase the stakes for Security<br>3) Cloud-Services Attacks<br>4) Integrations with GRC, SIEM, and Helpdesk systems<br>5) Artificial intelligence (AI) -centric Cybersecurity<br>6) Machine learning (ML)<br>7) The Rising Threat of Ransomware<br>8) Environment-friendly 5G networks<br><br>5 Best Security Test Tools Of 2022<br>1- Burp Suite<br>2- AppScan<br>3- Nmap<br>4- Nessus<br>5- Metasploit<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/dzone.com\/articles\/8-penetration-testing-trends-you-should-know-in-20\">https:\/\/dzone.com\/articles\/8-penetration-testing-trends-you-should-know-in-20<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<ul>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Wire implements new Messaging Layer Security protocol<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Start-up emerges with an \u2018enterprise browser&#8217;<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Binalyze secures $10.4 million in seed funding for enterprise forensics platform<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">CyberCX aquisition of Cyber Research NZ a game-changer<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Vicarius Announces $24 Million Series A Funding to Rebuild the Vulnerability Remediation Market for Today\u2019s Remote, Cloud-Based World<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Cyware Enhances Automated Threat Intelligence Sharing for Auto-ISAC to Promote a Collective Defense<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">SecOps and XDR: Why trusted digital operations centers are essential<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">Integrating IT Security with DevSecOps: Best Practices<\/font><\/li>\n<li style=\"-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;\"><font color=\"darkblue\">8 Penetration Testing Trends You Should Know in 2022<\/font><\/li>\n<\/ul>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38],"tags":[],"class_list":["post-5065","post","type-post","status-publish","format-standard","hentry","category-security-operations"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/5065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=5065"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/5065\/revisions"}],"predecessor-version":[{"id":5066,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/5065\/revisions\/5066"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=5065"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=5065"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=5065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}