CS Mar-Apr 2024
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
news<br />
TORSION ANNOUNCES FILING OF PATENT-PENDING TECHNOLOGY<br />
Solution 'automatically controls' access to digital resources<br />
Torsion has had its patent application filed at the United<br />
States Patent and Trademark Office for the core technology<br />
underlying its data access security solution. The technology<br />
provides a layer of intelligent automation of 'who has access<br />
to what' within cloud-based collaboration systems, such as<br />
Microsoft 365. It automatically controls access to digital<br />
resources, based on understanding the business reasons why<br />
a person needs access and their ever-changing professional<br />
circumstances.<br />
"Torsion's patent-pending technology is a breakthrough for<br />
businesses wanting to automate the process of understanding<br />
and controlling who has access to what data, to keep data<br />
secure, and to prove that control under audit, to simplify<br />
Peter Bradley, Torsion.<br />
compliance," states Peter Bradley, company CEO and founder.<br />
WIDENING THE 360 VISION<br />
Integrity360 continues international<br />
growth trajectory.<br />
Integrity360 is expanding its portfolio<br />
of Microsoft security services. The rollout<br />
is scheduled to embrace the UK,<br />
Ireland, Bulgaria, Italy, Spain and the<br />
Nordic region.<br />
As well as the expansion of services and<br />
associated tools and processes, the<br />
company states that it has invested in<br />
the training and development of many<br />
employees. It has also rolled out<br />
product and platform development<br />
and integration, as well as proprietary<br />
threat detection content for the<br />
Microsoft ecosystem and threat<br />
response playbook production.<br />
Integrity360's director of product<br />
management, Brian <strong>Mar</strong>tin - pictured<br />
above with <strong>Mar</strong>tina Naughton, global<br />
partner sales director, Microsoft Ireland<br />
- says that Integrity360's new partner<br />
designations "will help us fulfil our<br />
Microsoft services vision and cement<br />
our position in the security marketplace,<br />
while further growing our business".<br />
And <strong>Mar</strong>tin then goes on to say: "We<br />
expect great demand for Microsoft<br />
Threat Protection services, as it is an<br />
area in which many organisations lack<br />
the required skills and capabilities".<br />
STOLEN CREDENTIALS LIST HITS THE ONE BILLION MARK<br />
Have I Been Pwned' confirms almost 71 million more<br />
John Stringer, Next DLP.<br />
seized email addresses<br />
'Have I Been Pwned' recently confirmed it had added almost<br />
71 million email addresses associated with stolen accounts in<br />
the Naz.API dataset to its data breach notification service.<br />
The dataset is home to a collection of one billion credentials<br />
compiled using credential-stuffing lists and data appropriated<br />
by information-stealing malware.<br />
Comments John Stringer, head of product, Next DLP: "A single<br />
credential can give threat actors access to multiple accounts<br />
when used for various logins. This situation highlights the<br />
urgent need for organisations to enhance their cybersecurity<br />
strategies. It's imperative to emphasise employee training and<br />
awareness programs to mitigate the risks of undetected,<br />
malicious activity in organisational devices."<br />
LEGACY IT SYSTEMS AT CRITICAL RISK LEVEL<br />
Dozens of systems vulnerable across public sector<br />
The Central Digital and Data Office IT Risk Assessment has<br />
found that over 43 legacy IT systems in the UK public sector are<br />
at a critical risk level. <strong>Mar</strong>k Jow, technical evangelist EMEA at<br />
Gigamon, says the Central Digital and Data Office's recent data<br />
findings have highlighted the gap between where government<br />
cyber-resilience is now and where it needs to be. "Government<br />
CISOs are still contending with siloed systems, ranging from<br />
complex legacy platforms to new digital hybrid environments,<br />
struggling with scarce resources. These environments will remain<br />
the prime candidates for bad actors to exploit until these CISOs<br />
have the opportunity to get their house in order."<br />
<strong>Mar</strong>k Jow, Gigamon.<br />
6<br />
computing security <strong>Mar</strong>ch/<strong>Apr</strong>il <strong>2024</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk