CHEN PR’s clients don’t need a long month to rake in a long list of accomplishments
Cyber Security, High Technology, Public Relations Posted Mar 1, 2019 by Doug De Orchis
February has a special place on our calendar as the shortest month of the year – but looking at all that CHEN PR’s clients have achieved this past month, it doesn’t appear they got the memo! From new CEO announcements to security research and new tools to make us safer, our clients have shown us that they are hungry to make a difference, and that this is just the beginning of a hallmark year for cybersecurity and high technology.
Inc., Charging Ahead
In this print/digital feature, Maria Aspan writes that while lithium-ion batteries are essential to our lives and businesses, manufacturers are struggling to keep up with modern demands. She spoke with Cadenza Innovation’s Christina Lampe-Onnerud to learn more about what it takes to build a better battery in the dynamic energy storage industry.
This story published by The Register details Capsule8’s work to develop exploits for two vulnerabilities in systemd-journald, which were disclosed by Qualys in January. Capsule8 originally developed the proof-of-concept exploit code for testing whether computers were at risk and to verify that the issued patches worked. And in doing so, Capsule8 researchers came across interesting aspects that were not covered by Qualys’ initial publication. This prompted Capsule8 to publish their research to share with the larger security community.
The former head of the National Security Agency and U.S. Cyber Command, retired Navy Adm. Mike Rogers, was named the chairman of the board of advisers for Claroty. Rogers retired from the Navy last year after a 37-year career, including four years as the head of Cyber Command. In this article from WashingtonExec, Claroty explained that as chairman of its board of advisers, Rogers will lead a group of business and security leaders providing guidance and counsel to the company and its customers on emerging cybersecurity trends and requirements.
Mordecai (Mo) Rosen was announced as Digital Guardian’s new CEO mid-February. An accomplished security technology executive, CRN reported that Mo previously served as CA Technologies’ security chief. While there, Rosen played an instrumental role in helping the company acquire application security testing vendor Veracode for $614 million in March 2017 and then selling it off to Thoma Bravo in November 2018 for $950 million.
SC Media, Bullish on cybercrime
Diving into the cybercrime market, SC Media spoke with Flashpoint’s David Shear on the adversaries in the sophisticated labyrinth of the dark web. Cloaked in anonymity, this ecosystem isn’t just a place where people sell and buy stolen data, Shear also states that these threat actors advertise their services and look for potential business partners. There is no lack of community on the dark web, but rather the decision on which community to join.
In an article for CSO, Jon Oltsik writes about the gap between the business managers’ desire for real-time cyber risk management metrics versus the technical data and periodic reports that cybersecurity teams supply. He says the cyber risk management gap represents a high-priority problem that requires immediate attention, and suggests that CISOs embrace new tools and cyber risk management methodologies, such as the Factor Analysis of Information Risk (FAIR) model. RiskLens’ cyber risk management software is purpose-built on FAIR, the only international standard quantitative model for cyber security and operational risk.
BleepingComputer, AltFS Fileless File Systems Aims to Evade Detection by Security Software
SafeBreach researchers recently developed an open source library that creates a fileless file system residing in operating system resources. Created to help security software detect a fileless file system framework properly, the SafeBreach Labs team advises others to contribute as well, and even created a template for researchers to create their won storage providers using other OS resources. BleepingComputer details how this system works in an exclusive article.