2 minute read

The Brief

“With greater connectivity of machines comes greater exposure to new kinds of cyber threats – which the machines are often not equipped to withstand”

Simon Chassar

Advertisement

Chief Revenue Officer, Claroty

READ MORE

“We’ve seen a cybercrime shift from covert shadow groups into these cybercrime cartels, now providing ransomware-asa-service and executing multistage campaigns”

Tom Kellermann

Head of Cybersecurity Strategy, VMware

READ MORE

“It doesn’t help that the salaries on offer are relatively low when compared to the wider industry. Cybersecurity is not an area that can afford to be cut back on in this increasingly digital world”

Kevin Curran

Senior Member IEEE

READ MORE

BY THE NUMBERS

Cause of ransomware infections

66%

33%

LEFT: Phishing emails

RIGHT: Other

DOES A CASHLESS SOCIETY MEAN HIGHER RISK OF FRAUD? Armen Najarian, Chief Identity Officer at Outseer, spoke to Cyber Magazine about malicious apps and fraud within a cashless society

READ MORE

TOP 10 CLOUD SECURITY COMPANIES Security in cloud computing is crucial to any company looking to keep its applications and data secure, we take a look at 10 companies offering protection

READ MORE

HOW RED CANARY HELPS ORGANISATIONS PREVENT BREACHES In a world where cyber attacks are only growing, we take a look at how Red Canary and its Managed Detection and Response (MDR) services help companies

READ MORE

Security automation and accelerating incident response

Recently, it was announced NTT Data – a global leader in IT services and cybersecurity – partnered with Swimlane to reduce risk for shared customers via Swimlane’s low-code automation platform.

Swimlane’s low-code automation platform coupled with NTT Data’s deep industry expertise delivers solutions that enable continuous compliance while preventing data breaches. In doing so, the pair will help security teams to more efficiently manage the growing volume of alerts and complexity of processes.

But, what exactly is security automation?

Security automation is machine-based execution of security actions; it can detect, investigate and remediate cyberthreats with or without human intervention.

This technology can identify incoming threats, triaging and prioritising alerts as they emerge, and performing automated incident response.

With an automation security operations centre (SOC), enterprises will gain faster threat detection by automatically triage alerts and identify real incidents, allowing analysts to identify threats faster.

Additionally, automated tools can execute security playbooks in response to certain types of incidents. With this, threats can be contained or even completely eradicated without human intervention.  PERIMETER 81 Israeli cyber firm Perimeter 81 has said its backers now value the cybersecurity company at US$1bn, bestowing it with unicorn status after the firm raised US$100mn to fund product development.

 OKTA Okta posted its financial results for its first quarter – which ended April 30, 2022 – revealing that the company saw its total revenue grow by an astounding 65% yearon-year, reaching heights of US$415mn.

 NATIONAL SECURITY In the event that Russian hackers decide to retaliate to the U.S. government launching counter attacks against Russia in cyberspace, it's an ongoing possibility that US companies or infrastructure could become collateral damage.

 COSTA RICA This year, notorious Russian ransomware gang Conti threatened to overthrow Costa Rica's government if a ransom wasn't paid, allowing another band of extortionists to attack. The government later admitted that at least 30 of the agency's servers were infected.

This article is from: