Posts

How Next Gen Security Can Help Finance Firms Stay on the Right Side of New Euro Laws

Financial services firms have never faced a more agile and determined online foe. Barclays Global CISO Troels Oerting said recently that elite cybercrime gangs armed with advanced malware and a sophisticated skillset pose a major threat to the industry. They can get deeper inside networks, stay hidden for longer and steal more data than ever before. Additionally, as if that weren’t enough to worry about, coming European data protection laws will introduce a stringent new set of requirements and penalties on businesses, forcing improvements to cybersecurity.

Read more

Deception Technology Grows and Evolves

Deception technologies such as honeypots are becoming increasingly popular with enterprises as the products get more flexible and the tools allow security analysts swamped with incident reports to zero in on cases of actual ongoing infiltration. According to a report released in August by research firm Technavio, the deception technology market is growing at a compound annual growth rate of 9 percent, and is predicted to reach $1.33 billion by 2020.

GuardiCore Unveils Infection Monkey Open Source Cyber Security Testing Tool, Presents at Black Hat 2016

Modern, Disruptive Testing Tool Now Available to Public Security Community

San Francisco, CA and Tel Aviv, Israel – GuardiCore, a leader in internal data center security and threat detection, today made its Infection Monkey testing tool freely available to the public security community at large. Designed to test the resiliency of modern data centers against cyber attacks, the Infection Monkey was developed as an open source tool by GuardiCore’s research group, led by seasoned cyber security researcher Ofri Ziv.

Read more

Deception-Based Security Gains Steam as GuardiCore Raises $20m

Organizations have historically dealt with breach attempts by trying to block the hacker as fast as possible and only stopping to investigate after the fact. But now, the security community is starting to adopt a new approach: Letting attacks play out in controlled conditions to gain a deeper understanding of the threat. The method is being popularized mainly by emerging startups like Israel’s GuardiCore Ltd., which raised $20 million in funding this morning to fuel its efforts.

GuardiCore Raises $20 Million in Series B Funding to Deliver Protection for the Enterprise Data Center

Cisco Investments Joins Existing Investors Battery Ventures and 83North to Back Next-Generation Security Platform

San Francisco, CA and Tel Aviv, Israel – GuardiCore, a leader in internal data center security and threat detection, today announced that the company has raised $20 million in Series B funding. The latest round is led by existing investors Battery Ventures and 83North (formerly Greylock IL) and joined by Cisco Investments, bringing the company’s total funding raised to date to $33 million.

Read more

A New Cloud Security Unicorn Will Rise From The Cybersecurity Ashes

CISOs developing a roadmap to secure their cloud environments should be prepared for significantly more orchestration work than for securing SaaS. With the extra work will come significant rewards. Bold CIOs and CISOs will take a leap of faith and partner with security innovators to orchestrate their own cloud security systems. GuardiCore and deception technology is listed as one of them.

Product Review on Emerging Products: Active Breach Detection

SC Magazine recently featured GuardiCore in its Emerging Products review on Active Breach Detection. Said SC Magazine about GuardiCore: “This tool is the whole package: active breach detection, deception technology, advanced analytics, forensic analysis in real time, and real-time remediation.”

Companies Look beyond Firewalls in Cyber Battle with Hackers

With firewalls no longer seen as enough of a defense against security breaches, companies are looking at new tools to foil hackers trying to enter a computer network. U.S. and Israeli startups are leading the way, with new approaches such as “honeytraps” that lure a hacker to fake data or “polymorphic” technology that constantly changes the structure of applications running on a computer.

The most innovative and damaging hacks of 2015

The year’s most significant attacks highlight how hackers are changing tactics — and how IT security must evolve in the year ahead. Not a week went by in 2015 without a major data breach, significant attack campaign, or serious vulnerability report. Many of the incidents were the result of disabled security controls, implementation errors, or other basic security mistakes, highlighting how far organizations have to go in nailing down IT security basics.

Caught red handed – Alex

Opportunistic hackers are far from the limelight these days but they still exist and can cause large amounts of damage if they manage to break into your systems. We’ve recently observed our Data Center Security Suite catch such a hacker, an “Alex” from Romania who has kindly enough supplied his own name and private domain for publicity.

Read more