Comprehensive software reviews to make better IT decisions
KnowBe4 Releases Machine Learning Module for PhishER Platform
Security awareness and training vendor KnowBe4 has added a machine learning module called PhishML to its existing security orchestration, automation, and response (SOAR) platform, PhishER. PhishER automatically triages emails as they come in and therefore reduces the amount of effort required from IT personnel.
To improve the capability and effectiveness of PhishER, PhishML will learn from data collected across the PhishER user community. This module, which is free to existing PhishER customers, will tag more than half of incoming emails with confidence levels included. Currently, KnowBe4 markets that PhishML has a prediction accuracy of more than 95%.
Source: KnowBe4 at Software Reviews, Report Published April 2019
PhishML is an excellent addition to the PhishER product. When triaging and tagging emails, IT professionals are likely to display hidden patterns: patterns that would be hard for a human to identify but easy for a machine learning algorithm to spot. What’s more, IT professionals have little to no visibility into how other organizations triage and tag their emails. Again, PhishML overcomes this.
Bad actors are constantly learning new ways to craft even more dubious malicious emails by paying attention to which attacks work and which fail. IT professionals rarely have the time to reciprocate this effort by finding patterns within malicious emails. Machine learning algorithms like PhishML are a clear solution to this problem: they can learn as the attacks happen across multiple organizations and they will improve over time at detecting threats at the door.
Bad actors are constantly developing more effective ways of attacking through email by analyzing which attempts succeed and which fail. KnowBe4’s PhishML module serves as a countermeasure by analyzing malicious emails as they arrive. Over time, these modules will become more adept at identifying malicious emails before they ever have the chance to be read.
Want to Know More?
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.
Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?
The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.