Scary Good October Press Hits

Uncategorized Posted Nov 2, 2018 by Courtney Kruzement-Prykhodko

As the Halloween month of ghouls and goblins comes to a close and bone-chilling weather sets in, it’s time to take a look at some of our top press hits for October. From product reviews to ‘Power Lunch’-ing, not even a zombie apocalypse could’ve stopped our clients from hitting the headlines. Check out these treats:


Cadenza Innovation

Inc.: Meet Inc.’s Female Founders 100: Reese Witherspoon, Sallie Krawcheck, Anne Wojcicki, and More

Cadenza Innovation’s Founder and CEO Christina Lampe-Onnerud made Inc.’s Female Founders 100 list for her work on building a smarter battery. She was also featured on Inc.’s 11 Serial Entrepreneurs list for her founding work on Boston-Power and Cadenza Innovation.



CNBC: Supply chain attacks most coveted and hardest for nation states to affect, says security expert

CNBCDave Weinstein, VP of Threat Research for Claroty, and Suzanne Spaulding, Homeland Security former undersecretary for the national protection and programs directorate, joined CNBC’s ‘Power Lunch’ to discuss supply chain cyber threats after Bloomberg Businessweek reported that China had purportedly hacked Amazon and Apple motherboard servers by installing chips early on in the supply chain.


Digital Guardian

Channel Partners: 8 Top Trends in Talent Retention

In an industry that’s very short on qualified talent, retaining cybersecurity employees is of utmost importance. In this article, Tim Bandos, VP of Cybersecurity for Digital Guardian, offers some talent retention tips that have served him well as a manager over the years.



Duo Security

Dark Reading: Battling Bots: How to Find Fake Twitter Followers

Following an investigation on detecting Twitter bot characteristics this past summer, Duo Security analysts, Jordan Wright and Olabode Anise published a new report explaining how to find fake Twitter followers. Their analysis covers how fake followers operate, how they discovered an initial list of fake followers, and how they leveraged that list to unearth a botnet of at least 12,000 Twitter accounts.



Forbes: Get Ahead Of The Cybersecurity Bad Guys: The Key Role Of Threat Intelligence

Flashpoint’s CEO Jeff Lefkowitz spoke with Forbes Contributor Dan Woods on the importance of keeping intelligence requirements at the forefront when fine-tuning a cybersecurity portfolio. Throughout this feature, Jeff offers tangible advice on how to use business risk intelligence – generated by monitoring online communities, chat rooms and the dark web and other sources to understand emerging threats and how best to defend against them.


Forum Systems

CSO: Review: Protecting API connections with Forum Sentry

Industry veteran John Breeden reviewed the Forum Sentry API Security Gateway, noting the easy install, clear visualization, powerful single sign on and easy API management. He writes, “One thing that makes Forum Sentry so powerful is the fact that almost every conceivable legacy protocol and program type has been built into the appliance… it goes beyond access control and deep into security, monitoring all those connections that it forms and enforcing very granular security policies.”



Wall Street Journal Cybersecurity Pro: Cyber Daily: Measuring ‘Fair’ Value of a Breach

Catherine Stupp takes a look at how Charles Schwab Corp. is using a concept known as Factor Analysis of Information Risk, or FAIR for short. It’s different from more traditional threat assessment methods because it calculates the cost of risk based on a business’ broader structure, she reports. The RiskLens platform is the only product built on FAIR, the only standard quantitative model for cybersecurity and technology risk.



Threatpost: Shining a Light on a New Technique for Stealth Persistence

CTO and Co-Founder, Itzik Kotler pens this byline that describes a new technique the SafeBreach Labs team is using to “out-innovate” the bad guys. Itzik and his team have devised a post-intrusion attack that uses existing system binaries to achieve arbitrary code execution to maintain stealth and persistence. Throughout this article, Itzik details this new technique of maintaining backdoor access to systems and how to remain stealthy in an effort to turn a one-time root access into a persistent root access.