Archive for November 1, 2023

Cyber Skills Gap Climbs To 4 Million…. Yikes!

Posted in Commentary with tags on November 1, 2023 by itnerd

According to the ISC2 2023 Cybersecurity Workforce Study released this week, the global cybersecurity workforce gap has increased by 12.6% since 2022 reaching four million people.

Despite an 8.7% increase in the global cybersecurity workforce compared with 2022, reaching 5.5 million professionals, of professionals surveyed, 92% said they had skills gaps in their organization and 67% reported a shortage staff needed to prevent and troubleshoot security issues.

47% of respondents said they had experienced cyber-related cutbacks in the past year, including layoffs, budget cuts and hiring or promotion freezes, and, of that group, 22% were impacted by layoffs, both first- and second-hand.

Furthermore, 47% of respondents admitted they have no or minimal knowledge of AI and risks associated while AI and emerging technologies was cited as the biggest challenge facing cybersecurity professionals over the next two years (45%), followed by worker/skill shortages (43%).

Encouragingly, 52% of cyber professionals said their organizations are encouraging the use of AI internally and that advancements in AI is the third most positive impact on their ability to secure their organization, behind zero trust (34%) and automation (40%).

Dave Ratner, CEO, HYAS:

   “The combination of the cybersecurity skills gap, overall personnel shortage, and rising and increasingly sophisticated attacks is a perfect storm for bad actors and nefarious activity.  Without solutions like Protective DNS to automatically pinpoint and identify anomalous activities, organizations are increasingly at risk for exploitation, and are one of the only ways to confidently address the growing storm.”

This skills gap is a threat to us all as it gives more opportunities for threat actors do all sorts of evil things. Everyone needs to address this or we’ll be in all sorts of trouble that there will be difficult to exit from.

White House Hosts 48 Countries To Discuss Strategies To Sever Ransomware Funding 

Posted in Commentary with tags on November 1, 2023 by itnerd

This week, the White house is hosting the third International Counter Ransomware Initiative (CRI) summit bringing together 48 countries, the EU and Interpol to discuss several new initiatives including a pledge from member states not to pay ransoms.

The CRI will begin using a new information sharing platform enabling member countries to easily exchange details of threat indicators so “if one country is attacked, others can quickly be defended against that.” Officials hope to establish “collective threat information to enable countries to better and more effectively defend themselves.”

Also, debuted is a new project leveraging AI to analyze blockchain as a way of identifying illicit funds used to pay ransomware demands. CRI will also share a “blacklist of wallets” through the U.S. Department of Treasury to track where illicit funds are flowing so officials can “alert their virtual assets service providers to block or freeze those transactions.”
Also, the CRI will offer “innovative mentorship and tactical training” programs for newer members, citing how Israel has coached Jordan on countering ransomware as one example.

Stephen Gates, Principal Security SME, had this comment:

   “Not paying criminals the ransoms they demand and following the money trail is an honorable initiative to undertake. However, non-government organizations like financial services, higher education, healthcare, manufacturing, retail, gaming, and many others have been forced to pay ransoms so they could get their operations back up and running. Their livelihoods have been at stake. The impact on commercial organizations not paying their ransoms may end up being worse than the alternative.

   “Therefore, a paradigm shift in the mindset of all organizations needs to happen. That shift includes augmenting their completely defensive security approach with an offensive approach designed to actually find where they are most vulnerable to human-operated ransom-based attacks and fixing those issues before they fall victim. This preemptive security approach, using specifically designed autonomous systems, can majorly reduce the likelihood of falling victim to a targeted attack.

   “The first step to using these autonomous systems is assuming your defenses have already been breached. Once that happens, these systems will help you find, fix, and verify that your exploitable vulnerabilities are drastically reduced. This is not a one-and-done thing performed on an annual basis. Instead, it becomes part of your everyday, good cyber-hygiene due diligence.”

Any effort to disrupt the flow of money to ransomware gangs is a good thing. So is co-ordinating with allies on that. Hopefully this effort bears some fruit and put these gangs out of business.

Radiant Logic Upgrades Partner Program Driven by Newly Appointed VP of Global Partners & Alliances   

Posted in Commentary with tags on November 1, 2023 by itnerd

Radiant Logic, the Identity Data Fabric company, today announced the global expansion and revitalization of the Radiant Logic Partner Program which is designed to provide end-to-end solutions for partners to help solve today’s most complex identity and IT infrastructure challenges. Radiant Logic seeks to work with best-in-class partners, resellers, integrators and ISVs to build a community that focuses on radically simplifying identity management, securing the organization, and helping enterprises to leverage the business value of their identity data.   

Radiant Logic’s Partner Program will be led by career-long Alliance leader Jeff Tishgart, who has taken the role of Vice President, Global Partners and Alliances. Tishgart joins Radiant Logic following his most recent position as Vice President of Global Alliances for PlainID, and a three-year tenure with SailPoint in Global Technology Alliances. Tishgart is an experienced Channel leader with a demonstrated history of working in the SaaS/Cloud industry, bringing a strong track record of delivering results, driving channel strategies, and working closely alongside partners to accelerate success.  

The Radiant Logic Partner Program launch boasts an impressive roster of partnerships including both global security leaders and specialists in the Identity and Access Management (IAM) field, including; Wipro, CyberIAM, SDG, iC Consult, Hub City Media, UberEther and Novacoast. 

Additionally, Radiant Logic is pleased to announce that the SaaS version of the RadiantOne Identity Data Platform is now available in AWS Marketplace, a digital catalog with thousands of software listings from independent software vendors (ISV) that make it easy to find, test, buy, and deploy software that runs on Amazon Web Services (AWS).   

On the technology alliances side of the partner spectrum, Radiant Logic’s partnership with the AWS Public Sector team and Immuta has resulted in the launch of the Data Fabric Security on AWS solution. The DFS on AWS solution delivers to customers a secure identity aggregation, data access, and data governance-at-scale solution which is optimal for large-to-enterprise use cases.    

For more information on Radiant Logic’s Partner Program, please visit:   

EnGenius Releases SecuPoint to Simplify VPN Client Challenges for IT Professionals 

Posted in Commentary with tags on November 1, 2023 by itnerd

EnGenius Technologies Inc. has introduced the EnGenius Cloud SecuPoint VPN Client, a groundbreaking solution designed to address the modern challenges faced by remote workers and IT administrators. This innovative product ensures a seamless and secure VPN experience, offering unparalleled licensing flexibility that guarantees budget predictability, all backed by the robust capabilities of the EnGenius Cloud. 

Securing corporate resources has never been more critical in the era of remote work. However, traditional VPN solutions often introduce complexities in setup, limitations across devices, and unpredictable licensing costs. As organizations expand and onboard more employees, these challenges magnify and impact productivity. 

The EnGenius Cloud SecuPoint VPN Client has been meticulously crafted with the modern remote worker and adaptable business in mind. Backed by the power of the EnGenius Cloud, it offers a secure VPN connection across various client devices, effortlessly pushing configurations and certificates through the ESG Gateway, eliminating the need for intricate manual setups. It also offers multi-platform support, ensuring uninterrupted connectivity whether employees use a Mac, PC, Android, or iPhone. 

Key Features and Benefits: 

  • Powered by the EnGenius Cloud: At the heart of this groundbreaking release is the EnGenius Cloud, which powers the ESG Gateway, automating configurations and certificates, making intricate manual setups a thing of the past.  
  • Unified Device Connectivity with Multi-Platform Support: SecuPoint VPN supports Windows, Mac, iOS, and Android, ensuring uninterrupted connectivity and security, catering to the diverse device preferences of today’s workforce. 
  • Effortless Configuration with Automatic VPN Connection:Connecting to the EnGenius Cloud VPN server triggers the ESG Gateway to instantly push necessary configurations and certificates to SecuPoint, ensuring a hassle-free user experience, reducing errors, and enabling scalability. 
  • Per-User Licensing for Unprecedented Flexibility: SecuPoint offers per-user licensing, allowing seamless device switching and multiple simultaneous connections. This enhances flexibility and ensures predictable budgeting based on employee counts with bulk license flexibility for business growth. 

EnGenius Cloud SecuPoint is available now. For a more in-depth explanation of the capabilities of EnGenius Cloud SecuPoint and to download the VPN client, please visit

New Risk-Based Patch Management Platform to Automate Vulnerability Remediation for Enterprises

Posted in Commentary on November 1, 2023 by itnerd

Action1 Corporation, a provider of the #1 risk-based patch management platform designed for distributed enterprise networks, today announced its latest release. Global enterprises navigating complex environments can now ensure rapid adoption of Action1’s platform within their organization for reduced Mean-Time-To-Remediate (MTTR) while eliminating gaps in their remediation processes.

Key features:

  • Automation and Cost Savings. Enterprises can reduce the time required for solution adoption by instantly mapping automated vulnerability remediation workflows to their existing IT infrastructure organization-wide in a few minutes.
  • Single Sign-On (SSO). Customers can implement more secure and simplified access management for their Action1 organization without additional charges.
  • Unified Vulnerability Discovery. Action1’s expanded coverage for vulnerability detection now includes both third-party and OS CVEs in one single view, eliminating siloes and gaps in remediation workflows.
  • Complete Third-Party Vulnerability Remediation. Action1’s secure and reliable software repository now contains hundreds of applications and patches for automated third-party application patching.
  • Compliance with Data Privacy Laws. In pursuit of helping customers maintain data privacy worldwide, Action1 has expanded by adding a data center in Europe, ensuring compliance with local laws like GDPR.
  • Custom Branding. Replace the Action1 logo to align with the customer’s brand and tailor user prompts by region or business unit for local languages.

The new Action1 platform is available at:

Mujjo Announces Black Friday/Cyber Monday Sales

Posted in Commentary with tags on November 1, 2023 by itnerd

Looking for some premium iPhone and laptop accessories? From Wednesday, Nov. 22nd – Monday, Nov. 27th the entire Mujjo site will be 20% off. 

Here are some highlights of the sale:

Have a look and see if you can take a few things off of your holiday shopping list.

MOVEit Vulnerability Hit The OPM Resulting In A “Major Incident”

Posted in Commentary with tags on November 1, 2023 by itnerd

Yesterday, citing a report compiled by the Office of Personnel Management (OPM), Bloomberg reported that 632,000 Justice and Defense department employee email addresses were accessed in a hack earlier this year. 

Hackers obtained access through the MOVEit file transfer tool used by data firm Westat who OPM uses to administer employee surveys.  

OPM described the hack as a “major incident,” although the agency believed that compromised data was “generally of low sensitivity”, not classified and aside from emails, may have included links to government employee surveys and internal agency tracking codes, according to the OPM report. 

Emily Phelps, Director, Cyware had this comment:

   “MOVEit transfer attacks have impacted organizations across industries and sectors. While a layered security approach – multifactor authentication, regular patches and updates, intrusion detection and prevention systems, etc. – play a major role in defense, we must enable organizations to adopt more proactive cybersecurity methods. Organizations need a combination of human expertise and advanced technology that can play well together in order to outpace well-coordinated adversaries. They must also be enabled to connect the dots between disparate tools and tech and team silos so the right intelligence gets into the right hands to take the right actions.”

Corey Brunkow, Dir of Eng Operations, follows with this:

   “The classification of the following data and the breach as “of low sensitivity” to be lackadaisical in consideration of the power of data analytics in the hands of very un-sophisticated threats.  Forbes reports “The information included social security numbers, dates of birth, physical addresses and other information listed on a driver’s license.” 

   “All of this information in aggregate along with email addresses are perfect start points that basic hackers can use to generate a password spraying campaign at scale. Username = email address, Password = the 10,000 most used passwords tuned to be modified with data from these lists of “low sensitivity data”. Mandatory password changes for ALL tools configured with usernames consisting of these email addresses is likely a full day’s work for everyone involved, and if not managed properly with follow-up password audits could lead to future compromise of other capabilities.”

The carnage that MOVEit has caused is clearly not going away anytime soon. Thus you can expect more incidents like this one to come to light.