Endpoint Security and Network Monitoring News for the Week of February 9; Diversified, iboss, LimaCharlie, and More
The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of February 9. This curated list features endpoint security and network monitoring vendors such as Diversified, iboss, LimaCharlie, and more.
Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.
Endpoint Security and Network Monitoring News for the Week of February 9
Diversified and GroCyber Join Forces to Deliver “Media-Centric” Cybersecurity Solutions
Diversified, a global technology solutions provider, this week announced a partnership and trio of solutions with GroCyber. Together, the companies are “empowering AV and media companies to improve their cybersecurity stance” by providing a “clean bill of health” for their digital media environments, ensuring hardware and software are current, and protecting media storage and devices against the threat of malware. The new Diversified-GroCyber cybersecurity solutions include cyber certification, cyber hygiene and monitoring, and vulnerability management. “Many organizations around the world have parts of their environments that are not cyber ready. This can put them at risk for attacks from vulnerabilities or methods that are many years old,” said Mat Newfield, president and chief commercial officer of Diversified. “The issue for many media and AV organizations is that the security solutions today do not always cater to the specific needs of their industry. So, Diversified – which has deep expertise in AV and media – has joined forces with GroCyber to deliver media-centric solutions to help companies in this space increase their cyber resiliency.”
CrowdStrike Tames Cybersecurity’s Wild West in New Super Bowl Commercial
CrowdStrike announced this week that it’s returning with a Super Bowl commercial for the second consecutive year, featuring CrowdStrike’s AI-powered cybersecurity heroine Charlotte as she tackles modern cyber adversaries and stops breaches. Titled “The Future,” the new commercial brings a stylized spin to a classic Western tale to show how CrowdStrike is “securing the future of the digital frontier.” The spot will be broadcast during the two-minute warning in the first half. The 30-second commercial was directed by award-winning director Tarsem Singh and produced by CrowdStrike’s newly formed internal creative agency, redbird, in collaboration with talented industry leaders Howdy Sound, Lime Studios, Nice Shoes, RadicalMedia, Union Editorial and Zoic Studios.
iboss Launches ChatGPT Risk Module
iboss, a cloud-based cybersecurity solutions provider, has recently launched its ChatGPT Risk Module. This addition to its Zero Trust Security Service Edge (SSE) solution is specifically designed to monitor and secure user interactions with ChatGPT, a leading artificial intelligence technology. This initiative is aimed at ensuring exceptional data security and compliance in dynamic digital environments. Key features of the iboss ChatGPT Risk Module include comprehensive logging to ensure detailed records of all ChatGPT conversations, enabling full audit and oversight. It also employs robust data loss prevention capabilities to detect and prevent the transmission of sensitive information. Administrators are provided with the option to set up custom banners displaying tailored messages to promote responsible AI usage.
FBI: “Chinese Hackers Have Lurked in US Infrastructure Systems for At Least Five Years”
The Chinese hackers behind a campaign to infiltrate transportation hubs and other critical American infrastructure have had access to some of their targets’ computer networks for “at least five years,” according to a new report by US and allied security agencies obtained by CNN. The campaign is part of a long-running effort by the hackers to position themselves for potentially crippling cyberattacks that could disrupt water and electricity, according to US officials. US intelligence chiefs sounded the alarm about the threat to Congress last week, saying Beijing could use the hackers to disrupt a US response if China invades Taiwan. FBI Director Christopher Wray told lawmakers last week that the hackers could “wreak havoc and cause real-world harm” to the US.
LimaCharlie Lands $10.2 Million Series A Funding
LimaCharlie, a SecOps solutions provider, this week celebrated a $10.2 million Series A investment round led by Sands Capital with follow-on from new and previous investors, including CoFound Partners, Long Journey Ventures, Lytical Ventures, Myriad Venture Partners, StoneMill Ventures, and Strategic Cyber Ventures. As the demand for a flexible, scalable approach to security grows, the funding will accelerate team expansion and introduce new capabilities to the SecOps Cloud Platform. “The SecOps Cloud Platform is transforming cybersecurity from disjointed tools to integrated solutions tailored to each organization’s needs. LimaCharlie’s vision is to make security operations as flexible as the cloud made IT operations— reducing inefficiencies, security gaps, and extreme costs,” said Maxime Lamothe-Brassard, Founder and CEO of LimaCharlie. “This investment allows us to continue leading the paradigm shift toward the public cloud model for cybersecurity. Companies are embracing our vision for flexible, on demand security infrastructure they can leverage to consolidate tools and customize defense.”
Expert Insights Section
Watch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from Insight Jam, Solutions Review’s enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.
Live This Week: The Information Risk Podcast with David Loshin, Powered by Insight Jam
Recognized worldwide as an information management thought leader. David is a monthly columnist for TechTarget and frequently presents at The Data Warehousing Institute World Conferences, Enterprise Data World, the Data Governance and Information Quality conferences, and web-based seminars.
What to Expect at Solution Review’s Solution Spotlight with Broadcom on March 14th
Solutions Review’s Solution Spotlight with Broadcom is an hour-long discussion and software demo focusing on key challenges and best practices for NOC operations. In this session, you will learn the best practices for overcoming modern network complexity hindering quality network delivery experiences. This includes networks you manage and those you don’t, such as ISP and cloud providers. Proven outcomes include optimizing your NOC operations, proving your innocence faster, and achieving 85 percent alarm noise reduction. Featuring NetOps by Broadcom’s Chief Technical Evangelist, Jeremy Rossbach, as guest speaker.
Your Employees Are an Overlooked Corner in Your Attack Surface
Rahul Kannan of Securin shines a light in the dark corner of your attack surface to reveal an overlooked X factor: the employees. The numbers don’t lie— securing your organization and what matters most requires a comprehensive and robust cybersecurity strategy, and at the heart of this strategy are humans. However, humans can be both an asset and a potential liability in cybersecurity, as attackers use social engineering tactics to deceive employees into providing unauthorized access to company systems. The potential fallout, as seen in the MGM Hotels hacking incident, underscores the critical need for comprehensive training programs aimed at enhancing awareness and resilience against these methods. Humans remain an integral part of a successful cybersecurity strategy. Their ability to utilize intuition, critical thinking, and creativity is essential in interpreting and validating complex threats that automated systems might miss. Human expertise is vital in crafting effective cybersecurity policies, adapting strategies to evolving threats, and responding swiftly to incidents.