📡 Cybersecurity Innovation Pulse #23: Cyberwarfare; Cloud Identity Sprawl; Vendors Add AI/ML Security Features; and More!
Covering Sept. 8th - Sept. 14th
Welcome to Issue 23 of the Cybersecurity Innovation Pulse! I'm Darwin Salazar, your guide to the dynamic world of cybersecurity innovation. Each week, I deliver the latest on product launches, groundbreaking innovations, strategic collaborations, and other developments at the intersection of innovation and cybersecurity. If you find value in these updates, consider becoming a subscriber to ensure you receive these insights directly to your inbox, saving time and keeping you ahead of the curve.
🗞️Top Stories🗞️
How Cyberattacks Have Transformed Warfare
While working towards my master's in homeland security, I spent hours poring over the potential future landscape of cyber warfare and what the cyberarms race might look like in the years to come. While it was somewhat anticipated that North Korea, China, and Russia would persist as the principal threats to the U.S., reflecting on the actual extent and repercussions of the attacks they have orchestrated not just against the U.S., but numerous other nations, is truly staggering. The unprecedented toll on infrastructure, the private sector, and the economy goes beyond what many could have envisioned, underscoring the critical importance of evolving our defensive strategies and working together with our allies and across sectors. Below are a few highlights from The Hacker News piece on this topic:
On China
"China probably currently represents the broadest, most active, and persistent cyber espionage threat to US Government and private-sector networks," - 2023 Annual Threat Assessment report of the Office of the Director of National Intelligence (ODNI)
On North Korea
A Chain Analysis report found that in 2022, North Korea-linked hackers stole a record $1.7 billion, quadrupling its yearly activity for cryptocurrency theft from $429 million in 2021. - Chain Analysis
On Russia
"Over the past 7-8 years, Russia has turned Ukraine's cyberspace into a battleground for training and honing skills for cyberattacks," - Engineering Manager at MacPaw's Moonlock Lab.
Source: The Hacker News
IAM: The Next Frontier in Cloud Infrastructure Security
However, while the sudden appearance of fresh functionality is not the customers' choice, they are the ones who have to manage the privileges for all of these new services, "and that growing pattern is not slowing… So – more entitlements, more permissions for you to manage." - Henrique Texeira, Sr. Director @ Gartner
It’s clear that the identity sprawl introduced by non-human identities and multi-cloud deployments in large enterprise environments is a large tangled mess with no end in sight. This is the main reason why the IAM space has been booming this year in terms of acquisitions, new startups, and incumbent vendors doubling down on Cloud Infrastructure Entitlement Management (CIEM). As we sail further into the cloud era, tools like CIEM will be indispensable in thwarting cloud-based attacks.
Source: The Register
Cars and Data Privacy: A Bumpy Road Ahead
Bruce Schneier dives into the concerning state of data privacy in modern vehicles. Cars are now a rich source of data, collecting a vast amount of information about their users. The article raises alarms about the potential misuse of this data and the urgent need for regulatory frameworks to ensure user privacy. As cars transform into data hubs on wheels, the road to ensuring data privacy seems to be a bumpy one.
Source: Schneier on Security
🛰️Security Product Innovation🛰️
JFrog Leverages Machine Learning for Enhanced Security
JFrog has introduced Machine Learning (ML) security capabilities to streamline ML security. The new features include:
Proxy the ML repository Hugging Face to cache essential open-source AI models, safeguarding them from deletion or alteration
Scan ML model licenses for compliance with company policies
Detect and block the utilization of malicious models
Store in-house or enhanced models with strong access controls and version history, promoting transparency
Bundle and distribute models seamlessly in any software release
Source: SiliconANGLE
Sentra's Adds LLM Support
Sentra has updated its data classification engine to support large language models (LLMs), enhancing the identification and understanding of sensitive unstructured data including employee contracts, user-generated content, and source code. This development not only facilitates a clearer comprehension of the business context of customer data but also aids enterprises in meeting compliance standards such as GDPR, CCPA, and HIPAA.
Source: SiliconANGLE
Cloudflare Enhances Cyber Insurance with Security Insights
Cloudflare is taking a significant step in the cyber insurance space with the launch of Cloudflare Security Insights to refine cyber insurance risk modeling. This initiative is designed to offer businesses an in-depth analysis of their application’s security posture, potentially leading to better insurance terms. Cowbell Cyber is the first to integrate Cloudflare's security data into its cyber risk modeling, a move that aims to bring substantial benefits to policyholders using Cloudflare. This is the type of modernization in the cyber insurance industry that we want to see.
Source: II Reporter
Wiz Runtime Sensor: Real-Time Detection and Protection
Wiz has announced the general availability of its Runtime Sensor, enhancing real-time detection and protection capabilities to attacks at runtime. In their release post, Wiz mentions that while in public preview, the sensor has already stopped countless Pyloose and crypto-mining attacks. If you’re a ‘CNAPP’ with no strong runtime protection capabilities, it’s time to hit the gas pedal because it will become tablestakes.
Source: Wiz Blog
Wiz and Fortinet Join Forces for Cloud-Native Security Protection
Wiz has partnered with Fortinet to deliver cloud-native security protection. The collaboration combines Fortinet’s top-tier network security with Wiz’s market-leading CNAPP capabilities into an integrated solution. The offering is a big win for mutual customers.
Source: Wiz Blog
Microsoft and Google Target Obsolete TLS Protocols
Microsoft is phasing out older versions of the Transport Layer Security (TLS) protocol to enhance network and internet security. While the option to use older versions remains for necessary applications, the company encourages businesses to upgrade to TLS v1.2 or 1.3. This move aligns with industry trends and regulatory guidelines advocating for improved security measures. It also follows Google's suggestion to limit TLS certificate lifespans to a maximum of 90 days, a substantial decrease from the existing 398-day validity period.
Source: Dark Reading
What Else I Read This Week 🔎
The Power Law: Venture Capital and the Making of the New Future by Sebastian Mallaby
How Threat Research Can Inform Your Organization’s Cloud Security Strategy
Conclusion
Aaand that's a wrap for this week, folks! Your feedback is the fuel that keeps this newsletter going, so don't hesitate to let me know what you loved, hated, or would like to see improved. If you found value in this issue, why not share it with a friend or consider becoming a paid subscriber? Each week, I sift through over a thousand headlines to bring you the most impactful stories that are driving innovation in cybersecurity. Your support lets me know that this work is making a difference.