AWS re:Invent 2023: Cybersecurity Visibility

Rafi Sabel, I'm the CEO and founder of CySight, and I've been working with customers of all shapes and sizes for many years in network monitoring and cybersecurity and visibility of networks really, some very large companies, some of the largest on the planet.
We've helped government customers and universities and campuses and financials to help them gain visibility.
In particular, we saw how the lack of visibility coupled, especially now with the sudden and exponential use of encryption within networks, presents an entirely new challenge to customers.
This is a time that we've hit a period where data in motion, 98% of data in motion is encrypted.
They're collecting minuscule amounts of data out of those networks.
We see companies unprepared to deal with these risks, thinking that they have the visibility that they need to manage risk, but they're in danger because a lot of issues and malware is really sneaking undercover at the moment.
Rafi Sabel: Well, CySight is unique in that it collects data out of the network and it scrutinizes all the interactions between the servers, between the clouds, the data centers, the users, the applications and evaluates all the risk of each of these different aspects, whether it's country risk or site risk, dark web risk.
We're using machine learning and baselining, and we have a level of retention within our solution that provides over 20 times more visibility than most tools combined.
We can provide a level of visibility of identifying what's going on below the surface of the traffic.
We're using AI to pull out the needles from the haystack to show what changes are occurring within the environment and the servers and the data at risk, whether it's reconnaissance that we're identifying or infiltration or exfiltration and data going across VPNs and Tor networks and BitTorrent and we're triaging that information together.
Rafi Sabel: Well, firstly, it all starts with data because if you don't have access to big data and a large learning environment for machine learning to take place, then you're going to miss a lot of the patterns that we can elicit out of the data.
Other tools in our space are collecting around 1 to 5% of the top of the data, whereas CySight at its base layer is collecting and absorbing and retaining and using a large amount of the metadata that is running through the network.
Rafi Sabel: Well, look, any customer that has data centers has data centers that assets that they want to protect, has difficulty with visibility in seeing what's going across their network, these are the kinds of customers.
You look at government organizations, there's leakages, there's healthcare, there's data leakages of social security services, smart cities.
The more we go into data and the more we go into giving our data to organizations, the chances of that data being made public becomes that much higher.
We're trying to really protect our customers, provide them a level of visibility that is unprecedented, help them to see both the real-time issues as well as the backtrackability of those issues because sometimes you only discovered things well after the fact.
Rafi Sabel: We've really pushed the boundaries and we're providing our customers a level of visibility.
As part of a defense-in-depth strategy, we're helping to bring out layers of visibility that aren't available in the marketplace besides CySight today.
A new tool is needed to provide the visibility of what's going on under the surface of encryption and the veil of encryption, because that's really, as we are dealing with advanced threats, malware that is now sneaking under the veil of encryption into networks and, literally, moving around.
They're dealing with only 1 to 2% visibility and it's a wonder or they wonder why they're being hacked because you can't control what you can't see.


This Cyber News was published on securityboulevard.com. Publication date: Thu, 21 Dec 2023 13:13:05 +0000


Cyber News related to AWS re:Invent 2023: Cybersecurity Visibility

CrowdStrike Demonstrates Cloud Security Leadership at AWS re:Invent - CrowdStrike is honored to be named Partner of the Year for several 2023 Geo and Global AWS Partner Awards at Amazon Web Services re:Invent 2023, where we are participating this year as a Diamond Sponsor. These accomplishments demonstrate our ...
7 months ago Crowdstrike.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
7 months ago Esecurityplanet.com
GCP to AWS migration: A Comprehensive Guide - Embarking on a GCP to AWS migration journey can be both exciting and challenging. Before we dive into the technical details, let's explore why businesses might consider migrating from GCP to AWS. While GCP offers a range of services, AWS boasts an ...
5 months ago Feeds.dzone.com
Shaping the Future of Finance: The Cisco and AWS Collaboration in EMEA - The collaboration between Cisco and Amazon Web Services in the Europe, Middle East, and Africa region-combining each company's market leading strengths-continues to deliver impressive outcomes for our customers, notably within the Financial Services ...
6 months ago Feedpress.me
Rundown of Security News from AWS re:Invent 2023 - Amazon Web Services has been unveiling a steady stream of announcements during its AWS re:Invent 2023 event in Las Vegas this week. The focus over the four days, as expected, is on AI as AWS strives to show that its offerings can match - or surpass - ...
7 months ago Darkreading.com
AWS CloudQuarry: Digging for Secrets in Public AMIs - Money, secrets and mass exploitation: This research unveils a quarry of sensitive data stored in public AMIs. As a best practice, AMI creators should not include credentials, including AWS account credentials, in published AMIs. We wanted to scan all ...
1 month ago Packetstormsecurity.com
AWS re:Invent 2023: Cybersecurity Visibility - Rafi Sabel, I'm the CEO and founder of CySight, and I've been working with customers of all shapes and sizes for many years in network monitoring and cybersecurity and visibility of networks really, some very large companies, some of the largest on ...
6 months ago Securityboulevard.com
The US Needs To Follow Germany's Attack-Detection Mandate - To effectively combat these threats, the US needs to adopt a comprehensive and proactive approach to cybersecurity, similar to the one taken by Germany with its IT-SiG 2.0 mandate. The IT-SiG Approach Compared With the US's Current Capabilities One ...
7 months ago Darkreading.com
CVE-2024-37293 - The AWS Deployment Framework (ADF) is a framework to manage and deploy resources across multiple AWS accounts and regions within an AWS Organization. ADF allows for staged, parallel, multi-account, cross-region deployments of applications or ...
3 weeks ago Tenable.com
Fortinet Contributes to World Economic Forum's Strategic Cybersecurity Talent Framework - Shining a light on the cybersecurity workforce challenge, the World Economic Forum recently published its Strategic Cybersecurity Talent Framework, which is intended to serve as a reference for public and private decision-makers concerned by the ...
1 month ago Feeds.fortinet.com
Student Cybersecurity Clubs: Fostering Online Safety - Student cybersecurity clubs are playing a crucial role in promoting online safety among students. Student cybersecurity clubs play a vital role in this regard, as they provide a platform for students to learn about the latest threats, share best ...
6 months ago Securityzap.com
How to become a cybersecurity architect - Cybersecurity architects implement and maintain a comprehensive cybersecurity framework to protect their company's digital assets. The cybersecurity architect position is a fundamental role that all organizations need, said Lester Nichols, director ...
1 week ago Techtarget.com
Growing threats outpace cybersecurity workforce - The cybersecurity skills shortage threatens the well-being and even survival of numerous businesses as cybersecurity threats grow more numerous, sophisticated, and dangerous to the point that cybersecurity groups have vowed not to pay ransom demands. ...
5 months ago Legal.thomsonreuters.com
7 Rules to Improve AWS Security and Reduce Unwanted Incidents - Security of your AWS infrastructure is ultimately up to you. As the largest cloud services provider, AWS invests heavily to ensure its cloud environment is secure. Much of AWS security is still left to the customer, especially with regard to managing ...
1 year ago Beyondtrust.com
SentinelLabs Details Discovery of FBot Tool for Compromising Cloud Services - SentinelLabs today published a report identifying a Python-based tool that cybercriminals are using to compromise cloud computing and software-as-a-service platforms. Alex Delamotte, senior threat researcher at SentinelLabs, said FBot is used to take ...
5 months ago Securityboulevard.com
Cybersecurity Curriculum Development Tips for Schools - With the constant threat of cyber attacks, schools must prioritize the development of a robust cybersecurity curriculum to equip students with the necessary skills and knowledge. This article provides valuable insights and tips for schools aiming to ...
6 months ago Securityzap.com
The Importance of Cybersecurity Education in Schools - Cybersecurity education equips students with the knowledge and skills needed to protect themselves and others from cyber threats. Cybersecurity education can teach students about the impact of cyberbullying, how to prevent it, and how to respond ...
6 months ago Securityzap.com
What the cybersecurity workforce can expect in 2024 - For cybersecurity professionals, 2023 was a mixed bag of opportunities and concerns. The good news is that the number of people in cybersecurity jobs has reached its highest number ever: 5.5 million, according to the 2023 ISC2 Global Workforce Study. ...
6 months ago Securityintelligence.com
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents - The U.S. Securities and Exchange Commission recently announced its new rules for public companies regarding cybersecurity risk management, strategy, governance, and incident exposure. "Currently, many public companies provide cybersecurity disclosure ...
7 months ago Feeds.dzone.com
Digital Learning Tools for Cybersecurity Education - In the field of cybersecurity education, digital learning tools have become indispensable. This article explores various digital learning tools tailored specifically to cybersecurity education. These digital learning tools play a crucial role in ...
6 months ago Securityzap.com
Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
5 months ago Securityzap.com
A Handbook for Managing Containers on Amazon Web Services - Container management is a way to help you create, govern, and maintain your containers. There are tools and services available that can automate the creation, deployment, maintenance, scaling, and monitoring of application or system containers. In ...
1 year ago Trendmicro.com
What happens when you accidentally leak your AWS API keys? - My situation had no ill consequences, but it could have if I had used my actual email for the script or if my project was bigger and I had used AWS or another cloud provider and hardcoded those credentials. In a later class I did learn how to safely ...
3 months ago Isc.sans.edu
Gamification in Cybersecurity Education - Gamification has become increasingly prevalent in numerous domains, including cybersecurity education. Gamification presents a promising approach to meet this challenge, making cybersecurity education both effective and enjoyable. One way to ...
6 months ago Securityzap.com
Key cybersecurity skills gap statistics you should be aware of - As the sophistication and frequency of cyber threats continue to escalate, the demand for skilled cybersecurity professionals has never been bigger. The skills gap is not merely a statistical discrepancy; it represents a substantial vulnerability in ...
6 months ago Helpnetsecurity.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)