Skybox Security Download

0 views
Skip to first unread message

Laila Berri

unread,
Aug 5, 2024, 5:48:23 AM8/5/24
to giabunsarea
Skyboxwas founded with a singular vision. Provide the visibility and context across the attack surface that cybersecurity teams need to make proactive, better, and faster security decisions. Soon after, Skybox introduced its first commercial product to the market: Skybox View.

The introduction of Sarbanes Oxley and PCI compliance requirements very soon became extremely onerous for security organizations. Skybox met a new customer need with the introduction of Security Policy Management. As a result, security teams could reduce the resource drain and avoid costly fees by strengthening their security controls, processes, and compliance programs.


Skybox introduced the Skybox Security Posture Management Platform. With the platform, customers could take a common approach across the organization to optimize security planning, deployment, and remediation processes to reduce exposure risk. This was only possible through the implementation of the network model based on an aggregation of essential data from a wide range of security, cloud, and network technologies.


Skybox introduced Vulnerability Control. Customers could discover vulnerabilities across hybrid and multi-cloud environments, prioritize based on exposure-based risk scores, and close with prescriptive remediation options.


Skybox Security added veteran leadership and unveiled its latest improvements to its Continuous Exposure Management Platform. Expanded Attack Surface Management capabilities were added including both a powerful new attack surface map and an enhanced attack path analysis with lateral movement and threat origins. Enhanced Vulnerability Management deepened exposure insights to include celebrity vulnerabilities and SOAR integration capabilities. Skybox continues to be the only solution provider that combines solutions for Attack Surface Management, Vulnerability Management, and Security Policy Management into a single exposure management platform.


We see you are visiting from an Internet Explorer browser. Due to the deprecation of Internet Explorer and for security reasons, the PSG site is not supported in Internet Explorer. For the best experience, please use an alternate browser.


By logging into the PSG Hub you agree that the information contained herein must be kept strictly confidential and may not be reproduced or redistributed in whole or in part without the express written approval of PSG Equity L.L.C.


We use different types of cookies on the site. Some are required for the site to work. You can make choices about cookie use below. For further information about the cookies we use, please see our Privacy Policy.


1. Except Necessary Cookies. Necessary cookies are essential to the proper function of our site. They allow you to move around the site and use its features. Without these cookies, we cannot provide services through the site.


Cybersecurity management platform company Skybox Security Inc. today announced that it has raised $50 million in new funding and has appointed season security expert Mordecai (Mo) Rosen as new chief executive officer.


The solution is vendor-agnostic and optimizes security policies, actions and change processes across all corporate networks and cloud environments. Skybox has more than 500 enterprise and government customers using its services, including Proctor & Gamble Co., Vodafone Group plc, Fuji Xerox Co. Ltd., Husqvarna AB, Aon plc and Estee Lauder Inc.


Rosen joins Skybox as CEO with more than 25 years of experience, most recently serving as president and CEO of data loss prevention software company Digital Guardian. His resume includes serving as corporate senior vice president and general manager for security at CA Technologies, now a Broadcom Inc. company.


Skybox was in the news in October when it launched its Security Posture Management Platform. The platform integrates, identifies and prioritizes vulnerabilities using threat intelligence, identifies gaps in security controls and automatically provides remediation options.


Security is emerging as a key tenet to the successful implementation of digital transformation. This is especially significant as network convergence brings about the inter-operation of IT, OT and industrial IoT networks as security risks and cybercrime rise.


Nozomi Networks and Skybox Security have responded to this challenge by offering a converged network risk profile tool, in the form of a single pane of glass for IT/OT cyber visibility. The response is exemplary among cooperative efforts of governmental and private organizations collecting, sharing, deploying, and responding to cybercriminals in real-time to minimize the impact of these threat actors. This partnership and other collective responses boost the strength of companies to protect their most valuable network-connected and converging assets efficiently and effectively.


One of the implications of IT/OT convergence is the rise of the attack continuum, which point solutions can never adequately address. An example of an inadequate single-purpose solution would be to deploy anti-virus software in an IT domain and assume that it protects a non-segmented OT network.


While virus protection software does thwart some attacks, cyber criminals can often bypass software agents and gain access to secure resources. Having entered the IT network, a cybercriminal can pivot through privileged escalation to compromise mission-critical data storage, operational, and OT systems. This behavior is behind many cyberattacks that have recently been reported in the news.


Pivoting attacks can result in customer data loss, control of subsystems and other control apparatus, and the long-term risk of an undetected malicious presence. This type of attack also requires a coordinated system that reports actionable intelligence in real-time, in the environment in which they occur. Without a swift and agile response, a cybersecurity event such as a ransomware scheme can lead directly to financial losses, unwanted exposure in the press, and uncalculated disruption to a very complex solution that may span from the attainment of raw materials to the delivery of product ready for market inventories.


As discussed, convergence is driven by a collection of value propositions that can be undermined by weak security policy. Many key drivers to digital transformation are manifesting across industries. Fundamentally, cybersecurity has entered the mix of challenges that require a response on behalf of asset owners. It is important to insist on achieving the necessary objectives that are promulgating network convergence. Cybersecurity solutions should contribute those objectives and not diffuse their impact.


The management platform combines infrastructure context with threat intelligence to unlock unprecedented visibility of the expanding attack surface spanning IT, hybrid cloud, and OT environments. This allows enterprise networking and security teams to comply with corporate and regulatory policies, securely automate changes, reduce misconfigurations, improve cyber hygiene, and prioritize remediation of the riskiest vulnerabilities.


Skybox Research Lab has unveiled its 2024 Vulnerability and Threat Trends Report, which covers critical insights, including vulnerabilities discovered over the last year and recommendations for remediation.


The 2024 Skybox Security Vulnerability and Threat Trends Report provides a comprehensive overview of the existing condition of cybersecurity, emphasizing key trends, statistics, the impact of AI use, sector-specific information, and the best practices for remediation and security.


According to the report, a shortage of adequately skilled cybersecurity professionals and poor resource availability are fundamental to improper development and implementation of security solutions. The report emphasizes the need for optimal resource allocation and the adoption of cost-effective security strategies.


The report states that new vulnerabilities have increased by a record-breaking 25% compared to the previous year, reaching 30,000, according to the latest statistics. The rapid increase highlights the growing severity and risks of new cyberattacks. Over the last 30 years, half of the CVEs discovered were found within the past five years. A new vulnerability is found approximately every 17 minutes.


The report also focuses on the growing sophistication of advanced tools and strategies, which makes it challenging for cybersecurity professionals to safeguard assets against such attacks adequately. The transition necessitates a more proactive approach to cybersecurity posture.


The report details how artificial intelligence (AI) has been pivotal in transforming cybersecurity practices and how emerging technology impacts the field. This is key as 85% of cybersecurity professionals attribute the increased attacks to bad actors using generative AI.


The report discusses how AI-based systems are used to rapidly analyze large amounts of data without compromising accuracy to identify vulnerabilities and threats. Such capabilities support faster response times and precise threat mitigation solutions than conventional methods.


Artificial intelligence also allows the automation of routine, repetitive tasks, opening workforce resources to work on more complex problems. Such an approach will enable organizations to manage their cybersecurity efforts more efficiently, which is especially important when there is a shortage of adequately skilled cybersecurity professionals.


As manufacturing processes are increasingly digitized, the sector has become increasingly susceptible to cyber threats. Manufacturers are implementing exhaustive measures to protect assets such as intellectual property and safeguards to bolster operational continuity.


Owing to its high data value, this sector is one of the leading targets for threat actors. Financial bodies such as banks are finding it imperative to upgrade their security measures, including machine learning and artificial intelligence, to ensure security and comply with local and international laws.

3a8082e126
Reply all
Reply to author
Forward
0 new messages