CHEN PR’s clients don’t need a long month to rake in a long list of accomplishments

Cyber Security, High Technology, Public Relations Posted Mar 1, 2019 by Doug De Orchis

February has a special place on our calendar as the shortest month of the year – but looking at all that CHEN PR’s clients have achieved this past month, it doesn’t appear they got the memo! From new CEO announcements to security research and new tools to make us safer, our clients have shown us that they are hungry to make a difference, and that this is just the beginning of a hallmark year for cybersecurity and high technology.

 

Cadenza Innovation

Inc., Charging Ahead

In this print/digital feature, Maria Aspan writes that while lithium-ion batteries are essential to our lives and businesses, manufacturers are struggling to keep up with modern demands. She spoke with Cadenza Innovation’s Christina Lampe-Onnerud to learn more about what it takes to build a better battery in the dynamic energy storage industry.

 

Capsule8                                                      

The Register, The D in SystemD stands for Danger, Will Robinson! Defanged exploit code for security holes now out in the wild

This story published by The Register details Capsule8’s work to develop exploits for two vulnerabilities in systemd-journald, which were disclosed by Qualys in January. Capsule8 originally developed the proof-of-concept exploit code for testing whether computers were at risk and to verify that the issued patches worked. And in doing so, Capsule8 researchers came across interesting aspects that were not covered by Qualys’ initial publication. This prompted Capsule8 to publish their research to share with the larger security community.

 

Claroty

WashingtonExec: Former Cyber Command Chief Mike Rogers Named Chair of Claroty’s Board of Advisers

The former head of the National Security Agency and U.S. Cyber Command, retired Navy Adm. Mike Rogers, was named the chairman of the board of advisers for Claroty. Rogers retired from the Navy last year after a 37-year career, including four years as the head of Cyber Command. In this article from WashingtonExec, Claroty explained that as chairman of its board of advisers, Rogers will lead a group of business and security leaders providing guidance and counsel to the company and its customers on emerging cybersecurity trends and requirements.

 

Digital Guardian

CRN, Digital Guardian Snags CA Technologies Security Leader As New CEO

Mordecai (Mo) Rosen was announced as Digital Guardian’s new CEO mid-February. An accomplished security technology executive, CRN reported that Mo previously served as CA Technologies’ security chief. While there, Rosen played an instrumental role in helping the company acquire application security testing vendor Veracode for $614 million in March 2017 and then selling it off to Thoma Bravo in November 2018 for $950 million.

 

Duo Security

ZDNet, A third of all Chrome extensions request access to user data on any site

At the tail end of February, Duo Security announced a new web service that their Duo Labs team developed called CRXcavtor – a tool which helps users and organizations know exactly what Chrome extensions are being used by the web browser, who is using them and how much risk is brought to the organization by their users’ extensions. Duo researchers found that more than a third of all Google Chrome extensions ask users for permission to access and read all their data on any website and also found that roughly 85 percent of the 120,000 Chrome extensions listed on the Chrome Web Store don’t have a privacy policy listed, meaning there’s no legally-binding document describing how extension developers are committing to handling user data. Their new tool helps to eliminate risk of spear-phishing attacks since criminal groups are known to buy extensions from developers who lost interest in maintaining them.

 

Flashpoint

SC Media, Bullish on cybercrime

Diving into the cybercrime market, SC Media spoke with Flashpoint’s David Shear on the adversaries in the sophisticated labyrinth of the dark web. Cloaked in anonymity, this ecosystem isn’t just a place where people sell and buy stolen data, Shear also states that these threat actors advertise their services and look for potential business partners. There is no lack of community on the dark web, but rather the decision on which community to join.

 

RiskLens

CSO, Cyber risk management: There’s a disconnect between business and security teams

In an article for CSO, Jon Oltsik writes about the gap between the business managers’ desire for real-time cyber risk management metrics versus the technical data and periodic reports that cybersecurity teams supply. He says the cyber risk management gap represents a high-priority problem that requires immediate attention, and suggests that CISOs embrace new tools and cyber risk management methodologies, such as the Factor Analysis of Information Risk (FAIR) model. RiskLens’ cyber risk management software is purpose-built on FAIR, the only international standard quantitative model for cyber security and operational risk.

 

SafeBreach

BleepingComputer, AltFS Fileless File Systems Aims to Evade Detection by Security Software

SafeBreach researchers recently developed an open source library that creates a fileless file system residing in operating system resources. Created to help security software detect a fileless file system framework properly, the SafeBreach Labs team advises others to contribute as well, and even created a template for researchers to create their won storage providers using other OS resources. BleepingComputer details how this system works in an exclusive article.