Extra, extra! Read all about..CHEN PR’s client coverage for the month of June!
Cyber Security, High Technology, Public Relations, Technology Posted Jun 28, 2019 by Gabrielle Kondracki
Ahh, June! The glorious month that turns rain into shine, warm into warmer, chilly nights into beach BBQ’s, the time when Spring finally turns into Summer! While the days may be calmer and the sun may have us all feeling at ease, the CHEN PR clients certainly did not sit down, relax and enjoy the weather this month. Instead, they were fueling the news engine with handfuls of interesting stuff. What stuff you may ask? Whether it be product announcements, online attacks on Russia’s power grid, or questioning whether a password is a secure form of protection (or if it ever was), CHEN’s clients had a hot list of news to share this month, and believe it or not, we’ve compiled a list of the most compelling ones for you!
This month, Aviatrix has expanded its Multi-Cloud Backbone portfolio by adding a firewall network service that deploys the Palo Alto Networks VM-Series next-generation firewalls. In a Tech Target article by Tanner Harding, she gives a full run down on what exactly this firewall network service expansion brings with it. From removing the restrictions of deploying VM-Series firewalls in an AWS Transit Gateway to avoiding asymmetric routing when using equal-cost multipath routing to scale in a native AWS Transit Gateway implementation, she gives a full recap on what Aviatrix is adding to their product!
Low-code and no-code development promises to speed up the deployment of new applications and allows non-technical users to create apps, but it does not come risk-free. Kelly Shortridge, VP of Product Strategy at Capsule8, makes the argument that while there are inherent risks to this coding practice, that fact it depends on standard platforms makes the approach far safer on average compared to in-house, do-it-yourself coding.
In this news-breaking feature story three months in the making, The New York Times revealed the previously unreported deployment of American computer code inside Russia’s grid and other targets as a classified companion to more publicly discussed action directed at Moscow’s disinformation and hacking units around the 2018 midterm elections. Dave Weinstein, Claroty’s Chief Security officer and former U.S. Cyber Command analyst, was quoted in the story to provide historical context in the escalating cyber attack exchange between Russia and the U.S.
Exciting heist stories have been a staple in our TV and movie cultures for decades. And when you think of such stories, they usually involve a bank or art museum robbery. In this article written by Tim Bandos, VP of Cybersecurity for Digital Guardian, he reveals that real modern-day heists look very different. In a world where stolen intellectual property commands a high price, Tim walks his readers though several ways he’s seen hackers try to pull off a would-be heist by stealing intellectual property from various companies.
With the Digital Age fully making our IRL lives and our internet lives inseparable, we’re in the midst of an online identity crisis. How can we truly secure our most protected secrets and data, beyond just typing in our usernames and passwords? Are passwords even secure, have they ever been secure? In Motherboard VICE’s CYBER podcast, Cisco’s Duo Security Head Advisory CISO, Wendy Nather shares insight into online identity and
Earlier this month, authorities in the U.S. and Europe staged a crackdown on two of the largest drug markets – Wall Street Market and Valhalla – on the dark web. Despite successful law enforcement actions that have led to site shutdowns and criminal arrests, illegal online markets continue to pop up because people think they can do better. Flashpoint Analyst Ian Gray says that many new entrants appear to have concluded that the previous takedowns were a result of mistakes or small problems rather than any fundamental flaw in their business or technology.
RiskLens’ Director of Risk Science, Jack Freund, penned this article on accounting for “Supra Threat Actors” or STAs when modeling risk in a given security environment. Recently, threat intel researchers at Alphabet’s Chronicle borrowed the apex predator concept from ecology to describe today’s organizational structure and the STAs that exist in the cyber world. As STAs are considered “above” regular threat actors, they quickly become an organization’s biggest concern – however, should businesses be throwing everything they can at these threats and see what sticks? Freund describes how this new class of adversaries affects an organization’s typical risk posture and ways to allocate remediation efforts against STAs.