Scary Good October Press Hits
Uncategorized Posted Nov 2, 2018 by Courtney Kruzement-Prykhodko
As the Halloween month of ghouls and goblins comes to a close and bone-chilling weather sets in, it’s time to take a look at some of our top press hits for October. From product reviews to ‘Power Lunch’-ing, not even a zombie apocalypse could’ve stopped our clients from hitting the headlines. Check out these treats:
Cadenza Innovation
Inc.: Meet Inc.’s Female Founders 100: Reese Witherspoon, Sallie Krawcheck, Anne Wojcicki, and More
Cadenza Innovation’s Founder and CEO Christina Lampe-Onnerud made Inc.’s Female Founders 100 list for her work on building a smarter battery. She was also featured on Inc.’s 11 Serial Entrepreneurs list for her founding work on Boston-Power and Cadenza Innovation.
Claroty
CNBC: Supply chain attacks most coveted and hardest for nation states to affect, says security expert
Dave Weinstein, VP of Threat Research for Claroty, and Suzanne Spaulding, Homeland Security former undersecretary for the national protection and programs directorate, joined CNBC’s ‘Power Lunch’ to discuss supply chain cyber threats after Bloomberg Businessweek reported that China had purportedly hacked Amazon and Apple motherboard servers by installing chips early on in the supply chain.
Digital Guardian
Channel Partners: 8 Top Trends in Talent Retention
In an industry that’s very short on qualified talent, retaining cybersecurity employees is of utmost importance. In this article, Tim Bandos, VP of Cybersecurity for Digital Guardian, offers some talent retention tips that have served him well as a manager over the years.
Duo Security
Dark Reading: Battling Bots: How to Find Fake Twitter Followers
Following an investigation on detecting Twitter bot characteristics this past summer, Duo Security analysts, Jordan Wright and Olabode Anise published a new report explaining how to find fake Twitter followers. Their analysis covers how fake followers operate, how they discovered an initial list of fake followers, and how they leveraged that list to unearth a botnet of at least 12,000 Twitter accounts.
Flashpoint
Forbes: Get Ahead Of The Cybersecurity Bad Guys: The Key Role Of Threat Intelligence
Flashpoint’s CEO Jeff Lefkowitz spoke with Forbes Contributor Dan Woods on the importance of keeping intelligence requirements at the forefront when fine-tuning a cybersecurity portfolio. Throughout this feature, Jeff offers tangible advice on how to use business risk intelligence – generated by monitoring online communities, chat rooms and the dark web and other sources to understand emerging threats and how best to defend against them.
Forum Systems
CSO: Review: Protecting API connections with Forum Sentry
Industry veteran John Breeden reviewed the Forum Sentry API Security Gateway, noting the easy install, clear visualization, powerful single sign on and easy API management. He writes, “One thing that makes Forum Sentry so powerful is the fact that almost every conceivable legacy protocol and program type has been built into the appliance… it goes beyond access control and deep into security, monitoring all those connections that it forms and enforcing very granular security policies.”
RiskLens
Wall Street Journal Cybersecurity Pro: Cyber Daily: Measuring ‘Fair’ Value of a Breach
Catherine Stupp takes a look at how Charles Schwab Corp. is using a concept known as Factor Analysis of Information Risk, or FAIR for short. It’s different from more traditional threat assessment methods because it calculates the cost of risk based on a business’ broader structure, she reports. The RiskLens platform is the only product built on FAIR, the only standard quantitative model for cybersecurity and technology risk.
SafeBreach
Threatpost: Shining a Light on a New Technique for Stealth Persistence
CTO and Co-Founder, Itzik Kotler pens this byline that describes a new technique the SafeBreach Labs team is using to “out-innovate” the bad guys. Itzik and his team have devised a post-intrusion attack that uses existing system binaries to achieve arbitrary code execution to maintain stealth and persistence. Throughout this article, Itzik details this new technique of maintaining backdoor access to systems and how to remain stealthy in an effort to turn a one-time root access into a persistent root access.