Connect with us

News

Google Completes Acquisition of Mandiant

Published

on

Google today announced the completion of its acquisition of Mandiant. Mandiant will join Google Cloud and retain the Mandiant brand. Google and Mandiant share a long commitment to industry-leading security. Over the past two decades, Google has innovated to build some of the most secure computing systems in the world. Google Cloud customers and partners benefit from these pioneering security capabilities including world-class threat intelligence, zero trust architecture, and planet-scale analytics for security operations.

Mandiant, which is known for delivering unparalleled frontline expertise and industry-leading threat intelligence, is a proven first responder to the world’s largest cybersecurity incidents. Mandiant’s services, delivered by their team of security and intelligence individuals spread across 22 countries, are widely recognized for helping top enterprises and organizations prepare for and react to cybersecurity incidents.

With this acquisition, Google Cloud and Mandiant will deliver an end-to-end security operations suite with even greater capabilities to support customers across their cloud and on-premise environments. “The completion of this acquisition will enable us to deliver a comprehensive and best-in-class cybersecurity solution,” said Thomas Kurian, CEO of Google Cloud. “We believe this acquisition creates incredible value for our customers and the security industry at large. Together, Google Cloud and Mandiant will help reinvent how organizations protect themselves, as well as detect and respond to threats.”

Organizations today are facing cybersecurity challenges that have accelerated in frequency, severity and diversity, creating a global security imperative. Enterprises need to be able to detect and respond to malicious actors quickly, with actionable threat intelligence to continually protect their organizations against new attacks.

“Mandiant is driven by a mission to make every organization secure from cyber threats and confident in their readiness,” said Kevin Mandia, CEO, Mandiant. “Combining our 18 years of threat intelligence and incident response experience with Google Cloud’s security expertise presents an incredible opportunity to deliver with the speed and scale that the security industry needs.”

Events

Riyadh Gets Ready for Black Hat MEA 2022

Published

on

Black Hat is gearing up to bring together the top minds in information security to Riyadh this November, as part of an iconic 3-day event. Taking place from the 15 to 17 of November at the Riyadh Front Exhibition Center, Black Hat MEA is set to welcome 30,000 visitors to Riyadh, making it the largest cybersecurity event in the region while featuring the most powerful speaker lineup of any technology show in its first edition.

Following the success of @Hack, Black Hat MEA will host over 250 exhibitors and more than 200 speakers this year. The event will also host international tech giants including Cisco, IBM, Spire, Infoblox, and more. The event is the result of the partnership between the Saudi Federation of Cybersecurity, Programming, and Drones (SAFCSP) and Informa Markets, the largest events company in the world. This strategic partnership highlights the Kingdom’s investments and growth in cybersecurity and the digital space while being a testament to the adaptation of modern technology in the region.

“@hack set the bar for cybersecurity events across the region in 2021, surpassing our expectations across all measures. This success reflects Saudi’s position as a growing center of global cybersecurity excellence & the global ecosystem’s confidence and curiosity in what we are building from the grassroots up” said Faisal Al-Khamisi, Chairman, SAFCSP. “The credibility of evolving @hack to Black Hat MEA is a powerful indicator of our intentions within the cybersecurity space. This partnership will spark innovation, supercharge our capacity building and develop investment opportunities which we are excited to share with the world in November”

“IBM recently reported that a data breach in 2022 can cost a company an average of USD 4.35 million. This cost is at its all-time highest now and sits at a 12.7% increase from 2020. In today’s digitally powered world, this is an alarming situation for all of us, but especially for those who are not aware of nor possess the tools needed to protect their sensitive data. This is where Black Hat MEA comes in and cements its position as a must-attend event to generate awareness, create understanding around the importance of cybersecurity and educate on how to safely use tomorrow’s digital space to its maximum potential.”

Mike Champion, Regional Executive Vice President of Informa Markets, added: “Last year we launched the largest infosec show of 2021, worldwide. This year, it’s grown even more – more than 25,000 visitors have seen it with their own eyes, there’s now only one event that gives you so many elite hackers and CISO speakers, so large a community, such a variety of hacking tools, so much prize money, such a big buzz – and that’s Black Hat MEA in Riyadh.”

Event attendees will get the chance to hear testimonies about cybersecurity and its implications from an exciting line-up of world-renowned speakers from leading companies including CISOs of Equifax, Boom Supersonic, and Lufthansa; Jamil Farshchi, Chris Roberts, and Naby Diaw respectively, as well as Dr. Alissa Abdullah (Dr. Jay), Deputy Chief Security Officer, Mastercard, Ira Winkler, Chief Security Architect, Walmart and Timothy Brown, VP & Global Chief Information Security Officer, SolarWinds among others. The event will also welcome David Colombo, CEO of Colombo Technology, and the teen tech genius, the world-renowned cyber security expert who hacked into Tesla cars. The show will also be home to demonstrations and product launches of the latest cutting-edge security solutions, from across all areas of the industry including software, services, and training.

Black Hat MEA will also feature several different themes and tracks to cater to the diverse audience, including

  • Training – 23 bespoke training sessions by 30 Black Hat-approved trainers in a hands-on environment with training partners like Offensive Security, we45, Orange Cyberdefense and Madiant
  • Executive Summit: The exclusive conference with over 200 senior leaders in information security, including CISOs and senior decision makers in charge of influencing and implementing security strategies.
  • Arsenal – A developer space where the latest open-source tools and products are showcased by developers along with hands-on experience.
  • Briefings – Where infosec experts present research on industry trends, hacking tools, and security vulnerabilities.
  • Capture The Flag – a jeopardy-style hacking tournament for over 1,000 participants to enhance their ethical hacking skills at different difficulty levels for a SAR 700,000 prize fund.

Other competitions include the Bug Bounty Cup with a prize fund of SAR 300,000, a Start-Up competition where the top pitches present to seasoned judges, angel investors, tech experts, and government stakeholders for a cash prize of SAR 90,000. The event will also host a merchandise design competition for talented and unique digital artists who can create artwork exclusively for the Black Hat MEA Cyber Heroes. The winning design will also be printed as a limited collection.

Continue Reading

News

A10 Networks Launches Harmony Controller As-a-Service Release 5.4

Published

on

A10 Networks has just announced the launch of Harmony Controller as-a-service, Release 5.4 with enhancements that ease multi-cloud operational complexity and strengthen security. Network admins for enterprises and service providers all know the pain of growth and change. Rapid or unexpected growth in users, subscribers, and traffic; migration from centralized data centers to edge deployments, cloud, multi-cloud, or hybrid cloud environments; and the pandemic-inspired shift to distributed and suburban/home-based applications means network administrators must continually scramble to ensure capacity is correctly and efficiently deployed to meet demand.

For the critical functions that A10 provides, including Thunder Application Delivery Controller (ADC), Thunder Convergent Firewall (CFW), and Thunder Carrier-grade Networking (CGN), customers are managing their Thunder appliances or virtual machines throughout this massive change using A10 Harmony Controller. The A10 Harmony Controller provides centralized management and analytics for A10 secure application services including A10 Thunder ADC, SSLi, CFW, and CGN in multi-cloud environments for application configuration and policy enforcement. It is available on self-managed (on-premises/cloud) and as-a-service.

Harmony Controller as-a-service has key advantages over self-managed systems, providing organizations a centralized management interface for installation, configuration, monitoring, and troubleshooting of physical and virtual devices wherever they are deployed. Adding or changing Thunder devices used to require manually intensive processes for installation, licensing, and registration of devices. Harmony Controller-as-a-service makes those processes simple and easy to use. The service is operated by A10 to ensure its security and availability. The service creates simpler elastic capacity with a management interface that automatically scales as the system grows, supporting millions of users and thousands of devices.

Harmony Controller as-a-service, Release 5.4, includes the following enhancements:

  1. Stronger Security with Multi-Factor-Authentication (MFA): Now, administrators can enable MFA for all the users in the account. MFA is available when the users are authenticated locally in Harmony Controller. Users need to install the Google Authenticator app on their mobile devices for a one-time setup of MFA. While users can postpone set-up, the administrator can set an enforcement deadline. The device communicator role is created for users who use Harmony Controller to register Thunder devices.
  2. Local Authorization after Remote Authentication: Now, users can authenticate on remote servers, such as LDAP, TACACS +, or RADIUS, and authorize locally in Harmony Controller. The user privileges and access information are stored in Harmony Controller.
  3. Flexible Device Configuration Backup: Now, users can schedule periodic device configuration backups with precise time-zone and frequency.

“With the Harmony Controller, organizations can efficiently automate deployment and operations of application services, increase operational efficiency and agility, enhance end-user experiences and reduce TCO, simplify the management of distributed application services to dramatically shorten troubleshooting times, receive alerts on performance or security anomalies, improve capacity planning and optimize IT infrastructure and cloud environments,” concludes Amr Alashaal, Regional Vice President – Middle East at A10 Networks.

Continue Reading

GITEX

Spire Solutions to Show Off a Triad of Digital, Data, and Cybersecurity at GITEX 2022

Published

on

Spire Solutions has announced that its core focus at GITEX 2022 (October 10 to 14, 2022) will be to help governments and enterprises reimagine the triad of digital, data, and cybersecurity which is timely and crucial given the various digital transformation initiatives around the region. “While organizations are busy implementing several tools, technologies, and workflows, Spire will ensure the overall impact is positive by implementing solutions for efficient and scalable digital infrastructure & operations management with SolarWinds and prioritizing employees’ digital experience with Nexthink,” the company said.

Digitization invariably produces a tremendous volume of data but managing data remains the main challenge for organizations of all sizes. Therefore, with its bespoke data company Spire Data, and partners such as Cribl and Elastic, Spire will show how to manage data end-to-end including governance, observability, modernization, automation, classification, and more. Most importantly, the digital disruption has led to a surge in cyber risks and attacks across different industry verticals so Spire will help organizations strengthen, modernize, automate and transform their cybersecurity strategies by focusing on comprehensive detection & response (XDR) by Elastic & Corelight, continuous attack path visualization by XM Cyber, ultimate network visibility with Gigamon, secure identity governance & access management by CyberArk, digital risks management by Digital Shadows and cyber threat intelligence and attribution by Group IB, to name a few.

Sanjeev Walia, Founder & President at Spire Solutions, said, “We are committed to the national and regional priorities and our goal is to help governments and enterprises achieve a secure and seamless digital transformation. At GITEX 2022, we will share our integrated approach to creating and executing relevant strategies and introduce unique solutions around digitization, data, and cybersecurity along with our technology partners. We will also announce industry shaping partnerships, showcase live demos and run educational sessions on all 5 days.”

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.