Monthly newsletter March 2024: Supply Chain Cybersecurity, a pressing requirement for any organization
Safetech Innovations
SAFETECH INNOVATIONS is a Cyber Security company from Romania, listed on the Bucharest Stock Exchange (BVB: SAFE).
In February, a staggering 105 hospitals across Romania fell victim, directly or indirectly, to a ransomware attack targeting the eHealth platform provider—a system integral to all these institutions. Exploiting a vulnerability, hackers successfully encrypted data on the production servers of 26 hospitals, prompting preventive disconnection measures for the remainder.
This incident serves as a stark reminder of the critical imperative to secure the entire ecosystem of an organization, encompassing partners, subcontractors, and suppliers alike. Indeed, such vigilance is expressly mandated by Directive NIS 2, slated to take effect in October 2024.
The following article not only provides pertinent statistics on supply chain attack incidents but also offers a series of pragmatic recommendations for fortifying security within a business ecosystem.
We recommend that you consider cyber security beyond the perimeter of your own organization and ensure that it is a priority for all service providers, especially digital ones.
Technology news
Check Point Software introduced Harmony SaaS, one of the most advanced solutions for safeguarding against SaaS-based threats. With Harmony SaaS, organizations can safeguard their SaaS ecosystem against threats such as data theft and account takeover. Unlike traditional solutions, Harmony SaaS installs within minutes, continually reduces your attack surface, and automatically prevents threats as they arise.
Key Harmony SaaS Features include:
One Identity announced the general availability of One Identity Cloud PAM Essentials. This innovative SaaS-based solution will simplify privileged access management (PAM) across the enterprise, with a specific focus on cloud applications and infrastructures.
领英推荐
The surge in cloud migration, coupled with the expansion of the attack surface and the growing sophistication and frequency of cyberattacks, underscores the critical need for effective PAM solutions. By tightly controlling and auditing access to privileged accounts, PAM plays a pivotal role in bolstering an organization’s security posture and mitigating identity-based attacks.
Key features of PAM Essentials include:
Tenable? announced innovative enhancements to?ExposureAI, the generative AI capabilities and services within its?Tenable One Exposure Management Platform. The new features enable customers to quickly summarize relevant attack paths, ask questions of an AI assistant and receive specific mitigation guidance to act on intelligence and reduce risk. The platform’s generative AI-powered search and chat applications are fueled by Google Cloud – including Gemini models in Vertex AI.
These new AI capabilities enable virtually anyone in the security team to digest and take action on the most complex attack paths across various exposures to?stay steps ahead of attackers. Added functionality includes:
Corero Network Security unveiled its latest innovation in the fight against DDoS attacks – the Corero DDoS Intelligence Service, an automated, AI-assisted subscription service for Corero SmartWall ONETM customers that delivers pre-emptive, predictive attack mitigation, before the first attack is even seen.??
The DDoS Intelligence Service works hand in glove with SmartWall ONE – a top-tier, automated DDoS protection solution capable of handling existing, new, and zero-day DDoS attacks – to fortify its defenses, ensuring maximum protection for customers. Powered by the Corero Threat Research Team, the DDoS Intelligence Service is available as an annual subscription for all SmartWall ONE customers that are subscribed to the Corero SecureWatch Attack-Time assistance service.