28.02.2024 Views

CS Mar-Apr 2024

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

news<br />

TORSION ANNOUNCES FILING OF PATENT-PENDING TECHNOLOGY<br />

Solution 'automatically controls' access to digital resources<br />

Torsion has had its patent application filed at the United<br />

States Patent and Trademark Office for the core technology<br />

underlying its data access security solution. The technology<br />

provides a layer of intelligent automation of 'who has access<br />

to what' within cloud-based collaboration systems, such as<br />

Microsoft 365. It automatically controls access to digital<br />

resources, based on understanding the business reasons why<br />

a person needs access and their ever-changing professional<br />

circumstances.<br />

"Torsion's patent-pending technology is a breakthrough for<br />

businesses wanting to automate the process of understanding<br />

and controlling who has access to what data, to keep data<br />

secure, and to prove that control under audit, to simplify<br />

Peter Bradley, Torsion.<br />

compliance," states Peter Bradley, company CEO and founder.<br />

WIDENING THE 360 VISION<br />

Integrity360 continues international<br />

growth trajectory.<br />

Integrity360 is expanding its portfolio<br />

of Microsoft security services. The rollout<br />

is scheduled to embrace the UK,<br />

Ireland, Bulgaria, Italy, Spain and the<br />

Nordic region.<br />

As well as the expansion of services and<br />

associated tools and processes, the<br />

company states that it has invested in<br />

the training and development of many<br />

employees. It has also rolled out<br />

product and platform development<br />

and integration, as well as proprietary<br />

threat detection content for the<br />

Microsoft ecosystem and threat<br />

response playbook production.<br />

Integrity360's director of product<br />

management, Brian <strong>Mar</strong>tin - pictured<br />

above with <strong>Mar</strong>tina Naughton, global<br />

partner sales director, Microsoft Ireland<br />

- says that Integrity360's new partner<br />

designations "will help us fulfil our<br />

Microsoft services vision and cement<br />

our position in the security marketplace,<br />

while further growing our business".<br />

And <strong>Mar</strong>tin then goes on to say: "We<br />

expect great demand for Microsoft<br />

Threat Protection services, as it is an<br />

area in which many organisations lack<br />

the required skills and capabilities".<br />

STOLEN CREDENTIALS LIST HITS THE ONE BILLION MARK<br />

Have I Been Pwned' confirms almost 71 million more<br />

John Stringer, Next DLP.<br />

seized email addresses<br />

'Have I Been Pwned' recently confirmed it had added almost<br />

71 million email addresses associated with stolen accounts in<br />

the Naz.API dataset to its data breach notification service.<br />

The dataset is home to a collection of one billion credentials<br />

compiled using credential-stuffing lists and data appropriated<br />

by information-stealing malware.<br />

Comments John Stringer, head of product, Next DLP: "A single<br />

credential can give threat actors access to multiple accounts<br />

when used for various logins. This situation highlights the<br />

urgent need for organisations to enhance their cybersecurity<br />

strategies. It's imperative to emphasise employee training and<br />

awareness programs to mitigate the risks of undetected,<br />

malicious activity in organisational devices."<br />

LEGACY IT SYSTEMS AT CRITICAL RISK LEVEL<br />

Dozens of systems vulnerable across public sector<br />

The Central Digital and Data Office IT Risk Assessment has<br />

found that over 43 legacy IT systems in the UK public sector are<br />

at a critical risk level. <strong>Mar</strong>k Jow, technical evangelist EMEA at<br />

Gigamon, says the Central Digital and Data Office's recent data<br />

findings have highlighted the gap between where government<br />

cyber-resilience is now and where it needs to be. "Government<br />

CISOs are still contending with siloed systems, ranging from<br />

complex legacy platforms to new digital hybrid environments,<br />

struggling with scarce resources. These environments will remain<br />

the prime candidates for bad actors to exploit until these CISOs<br />

have the opportunity to get their house in order."<br />

<strong>Mar</strong>k Jow, Gigamon.<br />

6<br />

computing security <strong>Mar</strong>ch/<strong>Apr</strong>il <strong>2024</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!