BrandProtect Announces Major Updates to threatSMART Platform

Posted by Greg Mancusi-Ungaro

Thu, Apr 28, 2016

New Features Enhance Proactive Defenses Against Modern Cyber Exploits, Including Socially Engineered Spear Phishing, Ransomware and other BEC Attacks

TORONTO – April 27, 2016BrandProtect has significantly extended its industry leading threatSMART™ platform for cyber threat monitoring, intelligence, and mitigation with key features designed to speed analysis and enhance proactive defenses against modern cyber exploits, including socially engineered spear phishing, ransomware, and other business email compromise (BEC) attacks. New platform enhancements include MX-Record Monitoring, Advanced Incident Correlation, the BrandProtect ThreatCenter™, and new direct connections of threatSMART data feeds to popular enterprise threat analytics platforms Splunk and HP ArcSight.

“Enterprise-targeted cyberattacks are evolving rapidly. Socially engineered phishing, BEC and other focused, and unfortunately, effective schemes dominate the concerns of enterprise CISOs everywhere,” said Roberto Drassinower, BrandProtect CEO. “Today we announce the latest of our continuous enhancements to our threatSMART platform, again directly addressing the most important pain points that CISOs now face. We are filling the gaps for threat detection, intelligence, and mitigation of cyber threats that arise beyond the traditional security perimeter.”

Read More

Topics: Domain Management, cybersquatting, Phishing, cyber threats, Spear Phishing, CSO, threatSMART, ThreatCenter, MX Records, Splunk, ArcSight

threatSMART Platform Now Connects to HP ArcSight and Splunk

Posted by Greg Mancusi-Ungaro

Sat, Apr 23, 2016

 

BrandProtect has completed testing on new connections between its threatSMART threat detection, intelligence, and mitigation platform, and Splunk and HP ArcSight, popular enterprise security operations center applications. These connections are now officially released and usable by BrandProtect customers who wish to take advantage of these new data transfer options.  The initial release of HP ArcSight and Splunk support focuses on phishing data. 

Read More

Topics: analytics, threatSMART, Threat Intelligence, Splunk, SOC, ArcSight

BrandProtect ThreatCast: Cast Your Nets to Catch Next Generation Phishers

Posted by Greg Mancusi-Ungaro

Tue, Apr 12, 2016

Webcast Replay:

The Latest on Attack Trends, Threat Evolution 
and Defensive Strategies for Top Cyber Threats

At the 2015 Black Hat conference, leading CISOs, asked about their top ten security pain points, ranked sophisticated cyber-attacks, phishing, and spear phishing far ahead of all other cyber risks. Even after 20+ years, phishing and related attacks are still the number one concern. And no industry is immune to phishing, spear phishing, and BEC attacks.

Phish in the wild threaten customers
• Specifically targeted phish attack executives, employees and partners
• Sophisticated spear phish can directly threaten institutional business processes.

In this one hour webcast, targeted specifically to CISOs and Security Operations leaders at financial institutions, insurance companies, health care providers, and other firms that are threatened by phishing, spear phishing and BEC attacks,

Read More

Topics: Phishing, cyber threats, Spear Phishing, CISO, BEC Attacks

Marilee Philen, Senior Cyber Threat Analyst, To Speak At Atlanta Cyber Security Summit

Posted by Greg Mancusi-Ungaro

Thu, Mar 31, 2016

Marilee Philen, senior cyber threat analyst at BrandProtect, will be speaking at next week's Atlanta Cyber Security Summit .  She will join U.S. Assistant Attorney General, the Honorable John P. Carlin along with experts from the FBI, US Secret Service and other cyber security leaders in an all day exploration of emerging cyber threats related to new risks presented by Internet of Things, the vulnerabilities of big data and cloud computing deployments. The day will close with a discussion of the state of cyber threats and the strategies to combat them.

Philen is uniquely qualified to join in this discussion, she is an ex-USAF Intelligence Analyst, with a 20+ year career in intelligence collection, analysis, and reporting.

She has served with the U.S. Air Forces-Europe, U.S. Air Force Special Operations Command, and the U.S. Strategic Command Center (USSTRATCOM).

Read More

Topics: cybercrime, Internet Threats, cyber threats, OSINT, CISO, InfoSec, Internet of Things, Threat Intelligence

BrandProtect Anti Phishing Adds MX Record Monitoring.
CISOs: Why This Matters To You.

Posted by Greg Mancusi-Ungaro

Thu, Mar 24, 2016

Over the past 18 months there has been a phenomenal increase in the frequency of socially targeted email attacks. 

The FBI recently reported that global losses related to these Business Email Compromise (BEC) scams experienced a 270% increase from January to August 2015. These kinds of attacks do real damage, including the compromise of internal networks, the inappropriate disclosure of company IP or PII, the incorrect transfer of funds from the company treasury, to name a few of the most common outcomes. Hundreds of millions of dollars have been stolen through these schemes, directly affecting corporate bottom lines.

In these sophisticated attacks, employees, and/or business partners are targeted

Read More

Topics: Identity Theft, Domain Management, cybersquatting, Phishing, cyber threats, online risk, Spear Phishing, CISO, CSO, FFIEC

Latest Political Cyber Fraud: Warren Endorses Sanders??!  No... It's Fake. (She Remains Neutral)

Posted by Greg Mancusi-Ungaro

Sat, Mar 05, 2016

2016 Elections Project Update:  On Monday, just before the Super Tuesday Democratic Primaries, this "NY Times" article made the rounds on social media:

It wasn't legitimate.  And it wasn't a parody.  It was a fraud, pure and simple. 

News of this fake article exploded on Monday, sending the NY Times and many other news organizations scrambling to disavow the article and have it removed from the web. Within a few hours, it was gone. But the damage may have already been done - the article was shared over 50K times, including 15K Facebook shares.  It was probably viewed by hundreds of thousands of people across all kinds of social channels.  Enough to swing an election? Possibly!   

Read More

Topics: scam, brand abuse, Reputation Management, Social Media Monitoring, cyber threats, impersonation, CISO, threatSMART, 2016 Elections

The Evolving Cyber Threat Environment: Why Your Business Needs External Monitoring

Posted by Greg Mancusi-Ungaro

Thu, Feb 11, 2016

Regardless of industry or market, CISOs are facing new classes of attackers, from sophisticated teams of hackers who want to obtain an enterprise’s lucrative customer data to activists who want to ruin a company’s reputation and fraudsters who imitate a brand for financial gain. Cybercrime has become organized crime and criminals are finding new ways to harm businesses and individuals on a daily basis.

Without being alarmist, depending on the size and notoriety of your company, it's not unreasonable to assume that while you are reading this, someone is working to pry private, sensitive data from your servers. CISOs must stay ahead of the curve to combat the rapidly evolving cyber threats that have resulted from an increasingly global and digital business landscape.

The Necessity of Regulatory Compliance

In addition to general security regulation put forth by governmental agencies in North America, certain industries have other regulatory bodies with which they must comply. For example, financial institutions in the U.S. must comply with FDIC and FFIEC regulations to help ensure the integrity of communications and online activity. On a global scale, foreign financial institutions with a large presence in the U.S. subject to those same U.S. regulations. However, compliance initiatives are not usually sufficient to stem security concerns.

To better understand potential security gaps, especially in regards to cyber threats beyond the perimeter, many enterprises have joined their industry’s ISAC organization, such as FS-ISAC, the premier security working group for financial services industry. Through organizations like this, and emerging ISACs and ISAOs, institutions and enterprises are able to pool knowledge and plan for the latest kinds of cyber threats, and implement robust threat detection architectures, controls and information sharing programs.

But even as organizations develop and implement strategies for staying ahead of the cybercriminals, they have been unable to solve their security problems – particularly when relying solely on in-house resources. Because of the massive costs and resource requirements necessary to build a team to detect and manage outside threats, outsourcing a portion of cyber security has become the norm for most companies.

Ensuring Security Beyond the Perimeter

A large North American firm with a global presence recently worked with BrandProtect to estimate the costs of protecting the firm (employees, assets, partners, reputation) from third party cyberattacks and brand abuse through a wholly in-house effort. It determined that it would have to assemble a team of at least six people and invest between $2 to $3 million annually to create coverage that at best would only attain a small fraction of the coverage that it enjoyed through its partnership with a security firm – in this case, BrandProtect.

A strong partnership with a security services provider effectively adds highly trained, deeply experienced cyber threat specialists to a firm’s existing security team without the need for additional training or technology investments. From phishing scams and domain abuse to mobile application fraud and sophisticated identity theft schemes, a dedicated managed service can provide multiple layers of threat detection, analysis, threat correlation, and threat mitigation. All day, every day, these services will patrol online sites and markets to discover and understand any threats to a business and unauthorized or infringing online content related to the firm or its employees.

An increased use of technology across all business models has led to more threat vectors than ever before, as attackers have exploited gaps formed by business being transacted digitally and employees having access to an organization’s data outside of its walls. As a result, cyber threats are moving beyond the traditional security perimeter, which is making it harder for organizations to detect potential attacks using existing perimeter-focused tools. Without the proper preparations, such as implementing holistic external monitoring and collaborating with security experts, organizations will struggle to detect and diffuse online threats. Forward-thinking CISOs are already adopting external monitoring to better protect their organizations, and that number will increase throughout 2016.

Will you be ready?

Read More

Topics: Security, internet security, cyber threats, CISO, InfoSec

Will the Real Donald J. Trump Please Stand Up?

Posted by Peter Dylan

Thu, Jan 28, 2016


As part of the BrandProtect 2016 Elections Project, we’ve been looking at The Donald’s use of Twitter. 

Or, more accurately, we’ve been looking at how others have been using Donald Trump's identity to promote their twitter activity.  There are lots of them.....

 

Read More

Topics: cybersquatting, online identity, twitter, brandprotect, cyber threats, Donald Trump, 2016 Elections

Free Case Study

Viewpost Chooses BrandProtect To Extend Cyber Security Beyond the Perimeter

The Viewpost team describes the issues, the potential risks, and their solution strategy.

Download the Case Study

 

Subscribe to receive a weekly summary of our latest posts

Posts by Topic

see all