Cybersecurity Roundup: Scary Stats, Vade Secure, eSentire and Forcepoint
… other companies.
“There is a misconception that larger or more widely known organizations represent a more lucrative target and that hackers are more likely to focus on them,” he said. “However, companies of all sizes, both public and private, can be prime targets for hackers if they have inadequate protections in place — no matter how ‘under the radar’ they may believe themselves to be. Additionally, cybercriminals will often target organizations that they believe have large amounts of desirable information (such as health care, financial services or government entities).”
When implementing BYOD, it is essential that organizations add proper security controls at the same time, not weeks, months or years after the fact, Serpa said. It’s also important to remember that insider threats come in many forms — some are malicious, while others stem from carelessness or poor security practices exhibited by employees throughout an organization.
Security controls that can help prevent insider threats and their resulting data breaches include:
- Single sign-on (SSO), which serves as a single entry point which securely authenticates users across all of an enterprise’s cloud applications.
- Multifactor authentication (MFA), which requires a second method of identity verification before employees or other users are allowed to access corporate resources.
- User and entity behavior analytics (UEBA), which provide a baseline for normal user activity and detect anomalous behavior and actions in real time, allowing IT departments to respond accordingly and automatically.
- Data loss prevention (DLP), which allows blocking or limits data access.
Vade Secure Unleashes Computer Vision Engine
Vade Secure‘s new Computer Vision Engine, now available in all of its products, aims to enhance phishing detection accuracy.
Trained to view web pages and emails as humans see them, Computer Vision Engine identifies brand logos, machine-readable codes and text-based images, thwarting phishing attacks designed to bypass content filtering technologies and even computer vision algorithms relying on template matching or feature matching.
Adrien Gendre, Vade’s chief solution architect, tells us the core email security service his company’s partners are providing to their clients has been improved, with no additional cost and no additional effort/configuration required on their part.
“It just works,” he said. “The MSP has one action to define the antiphishing policy and they transparently receive periodic updates with new, innovative technologies; thus, they’re constantly offering their clients better protection. Moreover, the way the technology works addresses a common issue MSPs face with every day — complaints from end users who report a threat one day and then receive what appears to be the exact same email the next day.”
Other computer vision algorithms that rely on template matching or feature matching can only detect exact matches of images, Gendre said.
“Essentially, the original image has a signature and the algorithm will only recognize images with the same signature,” he said. “By analyzing the rendering instead of the code, Vade’s Computer Vision Engine can accurately detect logos and other images, such as …