Archive for Living Security

Living Security Unveils Technology Alliance Program 

Posted in Commentary with tags on February 14, 2024 by itnerd

Living Security, the global leader in Human Risk Management (HRM), announces the formation of its Technology Alliance Program (TAP), enabling dozens of the most utilized cybersecurity tools to deliver additional visibility and value through seamless integration and interoperability with the Living Security Unify Human Risk Management platform.

As cyber threats continue to target vulnerable members of the workforce and evolve in sophistication, collaboration among security tools becomes paramount in fortifying defenses. Living Security’s Technology Alliance Program bridges this gap by fostering integrations with a diverse array of industry-leading platforms, including but not limited to Microsoft Azure, Proofpoint, Sailpoint, Okta, Mimecast, Netskope, ZScaler, Crowdstrike, Microsoft Defender, Rapid7, VMWare Carbon Black, Sophos, Abnormal, Cofense, KnowBe4, Proofpoint, and Workday.

The key to effective Human Risk Management lies in understanding human behavior. Through simple API integrations facilitated by the Technology Alliance Program, Living Security can harness valuable behavioral insights from various sources such as email, web, IAM, SIEM, Endpoint, Device, DLP, and HR platforms. This enables organizations to identify human risk, protect employees, and foster positive behavior change.

The integrations facilitated by the Technology Alliance Program encompass various aspects of cybersecurity including:

  • Authentication, Access, and Activity: Analyzing authentication patterns, access attempts, and user activity to enable proactive risk mitigation strategies.
  • Data Security and Privacy: Facilitating proactive risk mitigation strategies by analyzing user behavior and context to safeguard sensitive information and ensure compliance.
  • Endpoint Security: Providing real-time insights into device activity, configurations, and vulnerabilities through seamless integration with endpoint security platforms.
  • Phishing and Email Security: Building a comprehensive Human Risk Index by incorporating phishing and email security data to track key behaviors and mitigate risks effectively.
  • Training: Leveraging training events to determine the effectiveness of security awareness and compliance training programs.

Living Security’s Technology Alliance Program exemplifies the company’s commitment to innovation and collaboration in the cybersecurity landscape. By fostering integrations with a diverse array of industry-leading technologies, Living Security empowers organizations to bolster their cybersecurity posture and mitigate human-related risks effectively.

For more information about Living Security’s Technology Alliance Program and its integrations, visit https://www.livingsecurity.com/technology-alliance-program.

Living Security Announces Unify Power Insights

Posted in Commentary with tags on January 17, 2024 by itnerd

Living Security, Inc. has announced Unify Power Insights, which combines intelligence across multiple identity management and security tools to pinpoint visibility into which members of the workforce are most vulnerable to phishing, account compromise, malware, data loss, and more. 

Living Security Power Insights supercharge the Unify Human Risk Operations Center. It empowers security teams to go beyond tracking individual events across data and devices by correlating events from dozens of security tools to individual members of a workforce. With Power Insights, security teams can track crucial groupings of user behaviors, detect spikes in risky activities in critical business areas, and provide straightforward ways to mitigate associated risks. Examples of power insights include:

  • Phishing Behavior Analysis: Identify individuals repeatedly failing phishing simulations and focus on those being actively targeted by real phishing.
  • Account Compromise: Pinpoint individuals with multiple successive Service or IDP login failures at a rate above an expected or normal threshold
  • Malware and Unsafe Browsing Correlation: Uncover the link between malware incidents and unsafe browsing habits among users with elevated credentials.
  • Data Loss (Sensitive Information Sharing Metrics): Gain insights into the frequency of sensitive information being shared across the organization.

Unify Power Insights empowers every team in the security organization:

  • Security Operations Center and Incident Response: investigate employees with privileged access to sensitive information that power insights flag for high risk across phishing, account compromise, malware, or data loss
  • Governance, Risk, and Compliance: automate policies that increase account security (such as multi-factor authentication) or restrict access to sensitive information amongst employees exhibiting high-risk
  • Security Awareness & Training: target topically relevant training and nudges to employees at high risk and save time by enabling vigilant employees to bypass training
  • Chief Information Security Officer: improve the overall performance of the security organization by increasing the effectiveness of security prevention, detection, and response

Learn more about Living Security Unify Power Insights by signing up for our February 28th webcast, Shrink Internal Attack Surface with Human Risk Management at https://www.livingsecurity.com/2024-02-webinar-power-insights

Living Security Expands Access to Human Risk Management Platform with Unify Go

Posted in Commentary with tags on December 6, 2023 by itnerd

Living Security announced today Unify Go, a free tool for Living Security training customers that surfaces security vulnerabilities across the workforce by aggregating and correlating employee behavior across security training, phishing, and email security tools. Unify Go is accessible to any company utilizing Living Security training. 

Unify Go builds upon and extends beyond security awareness, training, and phishing. Rather than focusing on compliance-based outcomes such as click and completion rates, Unify Go enables security teams to identify areas of the workforce that are most susceptible to social engineering, such as phishing, based on actual email behavior rather than phishing simulations alone. 

While security teams continue to improve visibility into security events across infrastructure and data, correlating disparate events to individual people or programs remains a significant challenge. Living Security Unify aggregates data and events across the cybersecurity technology stack, showing granular employee-level risk.

Unify Go works with the most popular identity, training, phishing, and email security tools with API integrations to dozens of tools, including Proofpoint, KnowBe4, Cofense, Microsoft, Mimecast, Abnormal Security, and more.

Unify Go shifts security training from a one-size-fits-all to a targeted and outcome-based approach. It delivers action plans to members of the workforce that need it most. This includes highly targeted individuals, new hires, contractors with poor phishing hygiene, repeat phishing offenders with elevated permissions, and more.

Living Security’s Unify platform makes it easy for security teams to implement risk-based management in their organizations by combining the following features:

  • Intelligence Engine: This engine ingests, aggregates, and correlates event, device, and identity data across existing IT and security tools that build a dynamic risk profile of every member of the workforce
  • Human Risk Operations Center (HROC): The HROC unites the Security Operations Center (SOC), Security Awareness and Training (SAT), and Governance, Risk, and Compliance (GRC) teams by providing them with granular dashboards and lenses into human risk and insider threats. 
  • Human Risk Index (HRI): This proprietary, patent-pending algorithm sorts individuals and groups into five distinct levels of risk. The model considers hundreds of criteria and behavior data points across existing IT and security tools.  
  • Action Plans: Security teams can generate tailored, risk-based action plans focused on specific behaviors across location, department, or segment

Unify Go is the entry point to Living Security’s Unify Platform, the leading Human Risk Management Platform. The complete Unify Platform extends human risk management from email and phishing, including correlated insights from a company’s existing account compromise (password), data loss, and malware solutions. 

Test drive Living Security Unify Go here. Or learn more about Unify Go by signing up for our January 10th webcast, How to Shift from Security Awareness to Human Risk Management.

Living Security Announces Partnership with Zscaler to Manage Human Risk 

Posted in Commentary with tags on November 15, 2023 by itnerd

Living Security, Inc.has announced a new partnership and technology integration with Zscaler, the leader in cloud security. Joint customers will realize the benefits of secure internet and SaaS access, secure private access, and human risk quantification, enabling them to reduce risk.

The majority of cybersecurity incidents are the result of human error. No matter how often employees are trained or phished or new technology is deployed, it all comes back to the people. According to the Verizon DBIR 2023, 74% of breaches involve the human element – making it still the single most significant risk to organizations, a continually relevant industry trend to call out that is a consistent concern for enterprise security. 

Key Integration Features

  • Seamless Data Aggregation: Automatically aggregate data from Zscaler through secure APIs and correlate events and activities to get a holistic view of employee behaviors. These risks are quantified and actionable with data-driven insights.
  • Distinguish Real Threats: Living Security’s Human Risk Index scores make apparent the riskiest individuals and attributes susceptible to risk. The algorithms and contextual features specific to various roles reduce false positives and pinpoint genuine threats.
  • Real-Time Visibility: Get instant access to real-time human risk scores and insights across organizations with an intuitive interface that ensures security operations teams can monitor and prioritize events effectively, allowing for proactive risk mitigation.

The partnership significantly empowers joint customers to reduce risk through greater control and deeper visibility. Living Security leverages Zscaler Zero Trust Exchange™ platform telemetry to get visibility into user activity. This data is integrated into the Unify HRM platform to quantify human risk across multiple cybersecurity tools to drive proactive, efficient action. 

Zscaler and Living Security’s tight integration will empower security, risk, and compliance leaders to make risk-based decisions by improving detection of malicious behavior, increasing efficiency by only targeting risk areas, improving security posture through reduced risk, and providing actionable data. Additionally, joint customers can launch user training based on risk from Living Security, communicate via email, Slack, or MS Teams, and adjust policies within Zscaler.

Enterprises can immediately get technical documentation on Living Security’s strategic technology partnership with Zscaler and the company’s ecosystem integration offerings. To learn more about managing human risk with Zscaler and Living Security, please visit https://www.livingsecurity.com/zscaler-brief

Living Security Announces Industry’s First Human Risk Operations Center (HROC)

Posted in Commentary with tags on November 15, 2023 by itnerd

Living Security, Inc. announced today the industry’s first Human Risk Operations Center (HROC) fueled by Living Security’s Unify Platform. 

The HROC unites Security Operations Center (SOC) Security Awareness and Training (SAT), and Governance, Risk, and Compliance (GRC) teams by providing granular visibility into human risk and insider threats. Living Security’s Unify platform powers the HROC by aggregating and correlating employee behaviors using data from your organization’s existing security tools. It offers ​​one pane of glass that provides real-time visibility into a company’s riskiest people, departments, and programs. This helps SOC and GRC teams efficiently plan next actions and measures the impact of improving policies and behaviors. 

While Security Operations Centers (SOC’s) continue to improve their visibility into security events across different layers of infrastructure and data, correlating disparate events to individual people or programs remains a significant challenge. Living Security Unify aggregates data and events across the cybersecurity technology stack showing risk at the granular employee level.

The Living Security HROC supports API integrations for dozens of the most popular security tools empowering SOC and GRC teams to rapidly derive real-time insights, recommendations, and action plans that speed time to mitigation.

The HROC provides visibility around segments risk by department, role, location, and even a lens into risk specific to those who have elevated access to sensitive data. Looking at risks this way provides important context for cybersecurity organizations.

Key Benefits:

  • Improve security visibility by Identifying and correlating risk at the human level rather than the device, data, or event layer
  • Speed time to mitigation through the implementation of targeted behavior and policy actions
  • Shrink organization’s attack surface by reducing insider threats

Learn more about Living Security’s Unify HROC (Human Risk Operations Center) by signing up for their December 5th webcast, Introducing the Human Risk Operations Center. 

Learn more at www.livingsecurity.com.