Intelligent CISO Issue 54 | Page 12

BlueVoyant research reveals vendors critical to the media industry face significant cybersecurity challenges
B cyberdefence company , has released the findings of a new report ; Media Industry Cybersecurity Challenges : A Vendor Ecosystem Analysis . The research found that 30 % of media vendors are susceptible to compromise via vulnerabilities discovered in their publicly accessible online presence . These critical vulnerabilities are known to be exploitable by malicious actors .
Illumio and Armis announce joint solution to protect IT and OT networks from breaches
I
news

BlueVoyant research reveals vendors critical to the media industry face significant cybersecurity challenges

lueVoyant , an industry-leading

B cyberdefence company , has released the findings of a new report ; Media Industry Cybersecurity Challenges : A Vendor Ecosystem Analysis . The research found that 30 % of media vendors are susceptible to compromise via vulnerabilities discovered in their publicly accessible online presence . These critical vulnerabilities are known to be exploitable by malicious actors .

The media ecosystem is one of the most complex , which makes it challenging for companies to securely produce , distribute and manage content . From concept to camera and from camera to consumer , media companies are dependent on vendors , service providers , partners and technologies . Exploitation of the found vulnerabilities can lead to potential loss of content and operational disruption .
BlueVoyant undertook this research to raise awareness of cyberdefence challenges media companies are facing and to help the industry better defend against attacks . The research was completed using BlueVoyant ’ s Terrain : 3PR ( Third-Party Cyber Risk Management ) platform . The platform identifies enterprises ’ Internetfacing software vulnerabilities and other exploitable opportunities with techniques similar to those used by
external cyberattackers while profiling prospective targets .
The study was led by Joel Molinoff , BlueVoyant Vice Chairman and former Executive Vice President and Chief Information Risk Officer for CBS Corporation , and Dan Vasile , BlueVoyant Vice President of Strategic Development and former Vice President of Information Security at Paramount .
“ The media industry is facing many cybersecurity challenges – from content leaks that directly impact revenue , to cyberattacks on distribution channels and ransomware ,” said Molinoff . “ The report shows that media industry vendors are more susceptible to compromise than those in other industries . The silver lining is that the media industry can take proactive steps to improve its cyberdefence posture .”

Illumio and Armis announce joint solution to protect IT and OT networks from breaches

llumio , the Zero Trust Segmentation company , and

I

Armis , a leading asset visibility and security company , have announced a joint solution designed to stop breaches across IT and OT environments .
The solution builds cyber-resilience throughout the hybrid attack surface by delivering comprehensive visibility and asset intelligence across Information Technology ( IT ), Internet of Things ( IoT ) and Operational Technology ( OT ) assets , with the ability to stop attacks from spreading across these environments .
The adoption of Industry 4.0 within industrial and critical infrastructure sectors , such as government , manufacturing , energy , banking , transportation and healthcare , also creates new attack vectors for cybercriminals . As these industries see an increase in cyberattacks like ransomware that quickly move across IT and OT environments , organisations need an integrated and proactive approach to security to build resilience to these threats .
Fundamental to this are two key requirements – understanding the flow of data throughout the extended asset attack surface and separating key functions within the network to prevent breaches from spreading to reach critical assets .
The joint solution pulls asset discovery and intelligence data from Armis into a single visualisation in Illumio , giving users a holistic understanding of the type of assets that exist in these environments and the communications happening between them , enabling users to quickly see and identify high-risk communication paths .
Security teams can then easily implement segmentation policies to restrict unauthorised or unnecessary communications between IT , IoT and OT environments and devices . With policy automation , breaches are contained and restricted from lateral movement , minimising their impact .
12 www . intelligentciso . com