Forescout Technologies, a specialist in automated cybersecurity, has launched Forescout Frontline, a threat hunting service for organizations that lack internal resources and visibility to defend against cybersecurity attacks.
“Cybersecurity attacks are on the rise. Simultaneously, cybersecurity teams are constantly understaffed and under-resourced. This has created a perfect storm,” said Precursor Vice President of Threat Defense Shawn Taylor.
“Organizations are under immense pressure to cope with the scale and speed of attacks and the devastation wrought by adversaries. Forescout is launching this new service to help organizations defend against attacks by providing a comprehensive and holistic view of their assets.
Part of the problem is that organizations can use multiple security tools across multiple teams, resulting in siled views of the state of IT, IoT, IoMT (Internet of Medical Things) or OT assets – even though these assets may be interconnected.
The threat hunting and risk identification service is provided by Forescout Frontline analysts to help discover, validate and prioritize cyber threats and vulnerabilities across all assets; analyze the context and risks associated with all findings; then develop effective risk mitigation and remediation strategies.
An agency in the US state of Florida hired Forescout Frontline to understand every instance of Log4j across its 220 sites after a zero-day vulnerability was disclosed in the popular Java logging framework.
Forescout Frontline took a day and a half to provide information on thousands of assets, revealing exposure to Log4j and PrintNightmare, as well as hundreds of critical vulnerabilities in switches and routers.
It also provided actionable insights regarding critical risks in embedded IoT devices.
“When Log4J went down, we knew it was a critical issue, but we didn’t have a full picture of the risk within our extended enterprise. [Forescout threat hunting] report was much more comprehensive than expected, with detailed insights and actionable intelligence. Not just on Log4j but also on other critical vulnerabilities, and not just in general terms but exactly where they exist in our environment,” the agency’s information security officer said.
SONICWALL CYBER THREAT REPORT 2022
The last year has seen a meteoric rise in ransomware incidents around the world.
Over the past 12 months, threat researchers at SonicWall Capture Labs have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:
Zero-day attacks and more
These exclusive findings are now available through the SonicWall Cyber Threat Report 2022, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the growing wave of cybercrime.
Click the button below to get the report.
PROMOTE YOUR WEBINAR ON ITWIRE
It’s all about webinars.
Marketing budgets are now focused on webinars combined with lead generation.
If you want to promote a webinar, we recommend at least a 3-4 week campaign before your event.
The iTWire campaign will include numerous advertisements on our news site itwire.com and a major newsletter promotion https://itwire.com/itwire-update.html and promotional and editorial news. Plus a video interview of the keynote speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in promotional messages on the iTWire homepage.
Now that we are coming out of Lockdown, iTWire will focus on supporting your webinars and campaigns and support through partial payments and extended terms, Webinar Business Booster pack and other support programs. We can also create your advertisements and written content and coordinate your video interview.
We look forward to discussing your campaign goals with you. Please click the button below.
MORE INFO HERE!