AIPowered – INDIA NEWS http://www.indiavpn.org News Blog Wed, 10 Apr 2024 11:43:07 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 Hands-on Review: Cynomi AI-powered vCISO Platform http://www.indiavpn.org/2024/04/10/hands-on-review-cynomi-ai-powered-vciso-platform/ http://www.indiavpn.org/2024/04/10/hands-on-review-cynomi-ai-powered-vciso-platform/#respond Wed, 10 Apr 2024 11:43:07 +0000 https://www.indiavpn.org/2024/04/10/hands-on-review-cynomi-ai-powered-vciso-platform/ [ad_1]

Cynomi AI-powered vCISO Platform

The need for vCISO services is growing. SMBs and SMEs are dealing with more third-party risks, tightening regulatory demands and stringent cyber insurance requirements than ever before. However, they often lack the resources and expertise to hire an in-house security executive team. By outsourcing security and compliance leadership to a vCISO, these organizations can more easily obtain cybersecurity expertise specialized for their industry and strengthen their cybersecurity posture.

MSPs and MSSPs looking to meet this growing vCISO demand are often faced with the same challenge. The demand for cybersecurity talent far exceeds the supply. This has led to a competitive market where the costs of hiring and retaining skilled professionals can be prohibitive for MSSPs/MSPs as well. The need to maintain expertise of both security and compliance further exacerbates this challenge.

Cynomi, the first AI-driven vCISO platform, can help.

Cynomi enables you – MSPs, MSSPs and consulting firms – to provide vCISO services at scale – without straining your existing resources. Cynomi is modeled after the knowledge of the world’s best CISOs, allowing you and your clients to gain access to expert-level security and compliance insights and tools.

Cynomi provides the two main vCISO pillars, security and compliance, in an automated and actionable manner. This includes security assessments, gap analysis, compliance readiness, policy creation, task management and reporting. With Cynomi, you will benefit from increased revenue, a growing customer base, reduction in risk assessment time, a decrease in report generation time, well-structured processed and shorter employee onboarding times.

Let’s see how easy Cynomi is to work on:

Setting Up and Managing Multi-Tenant Accounts

Focusing on partners, Cynomi was designed to support multi-tenancy. You can independently create and manage a separate sub-account for each of your clients, allowing you to easily manage and track each one, as well as giving them access to Cynomi.

Cynomi AI-powered vCISO Platform
Figure 1: Cynomi account management screen

To support your scalability and growth, you can delegate roles and ownership among your team for each client account. You will still enjoy admin-level cross-account visibility and privileges.

For centralized management of all your clients, Cynomi provides a unified account management screen where you can edit user details, resend invitations, unlock blocked accounts and more.

Wherever you are on the platform, you’re always just a click away from the admin panel and all your user accounts.

Building a Cyber Profile with an Onboarding Questionnaire

Onboarding a new client starts with gathering high-level information about them, allowing to build a relevant remediation plan. This includes an onboarding questionnaire about their infrastructure. Once completed, Cynomi generates a tailored set of short follow-up questionnaires for security posture evaluation.

Cynomi AI-powered vCISO Platform
Figure 2: Cynomi onboarding questionnaire
Cynomi AI-powered vCISO Platform
Figure 3: Cynomi tailored-made follow-up questionnaires

Completing all the questionnaires delivers a comprehensive view of client security posture and gaps. Based on the responses, Cynomi offers custom tailored policies that cover all steps required for remediating security gaps.

Questionnaires can be revised at any time if a client’s environment changes. Policies will be automatically updated accordingly.

Internal and External Scans

To augment and complete your understanding of your client’s cyber profiles, Cynomi allows you to scan and assess their external and internal assets.

External Scanning:

For assessing the security of externally exposed assets, Cynomi scans IPs and URLs and discovers vulnerabilities as well as secured configurations. This includes scanning risky ports, checking protocols and encryption, verifying email configuration parameters, technology updates of web applications and more.

Cynomi AI-powered vCISO Platform
Figure 4: Cynomi scan results screen

Users can drill down into each scan finding to see an in-depth description and remediation options. Any detected vulnerabilities are automatically added to the account’s task list, according to their severity.

Cynomi AI-powered vCISO Platform
Figure 5: Drill-down to a specific finding

Scan results are available in just a few minutes.

Internal Scanning:

For discovering vulnerabilities in the client’s internal networks. Scans cover client assets like active directory and endpoints and assess its security hygiene and configuration.

You can also upload your NESSUS external scan, Qualys external scan or Microsoft Secure Score CSV files.

Scan findings are aggregated in an aggregated table and linked to the relevant tasks and policies they are related to.

Security Assessment

Cynomi continuously parses each client’s cyber profile against industry-specific security standards, regulatory frameworks and industry-specific threat intelligence. These are coupled with the information from the security questionnaires and the scans.

Based on the company-specific profile, the relevant cyber domains are dynamically picked with the optimized requirements. Each requirement is assigned a criticality level, representing the importance of this requirement for the organization’s security posture. Risks such as ransomware and data leak are calculated as well, based on the organization’s sensitivity to those attacks.

The result is a single pane of glass view of each client’s overall security posture and its progress over time.

The dashboard includes:

  • Overall security posture score
  • Vulnerability and exploit gap analysis
  • Risk score for a specific threat vector
  • Remediation plan with actionable prioritized tasks
  • Status against various compliance frameworks requirements
Cynomi AI-powered vCISO Platform
Figure 6: Cynomi main dashboard

Comprehensive, Continuous Compliance Assessment

For meeting compliance requirements, Cynomi presents the client status against various compliance and security frameworks (list continuously updated):

  • CIS v8
  • ISO 27001
  • NIST CSF 1.1
  • NIST CSF2.0
  • NIST-171
  • NIST-SSDF
  • SOC 2
  • CMMC L1, CMMC L2
  • GDPR
  • NIS2
  • PCI-DSS
  • HIPAA security
  • Cyber Essentials
  • FTC Safeguard Rule
  • SEC compliance
  • ICS Cyber Security
  • CCPA
  • FFIEC

The compliance module is actionable and allows seeing the details of each control in each framework and how each task maps into each framework.

The compliance status against frameworks is updated continuously so you are always aware of your client’s readiness level.

Cynomi AI-powered vCISO Platform
Figure 7: Cynomi compliance dashboard

You can also download a dedicated compliance status report per client. The report includes:

  • Overall compliance status
  • A list of controls
  • Maturity level
  • Control status
  • Control mapping to framework
  • Implementation status
  • A link to the relevant Cynomi tasks

With this information, you can easily understand where your clients stand and what gaps need to be closed in order to comply with different frameworks. You can then build a remediation plan for each framework you selected with just a few clicks.

Tailor-made Security Policies

It’s time to get down to business. Cynomi automatically generates a set of policies for each client. They are custom-created leveraging decades of built-in CISO expertise and crafted to be easy to follow and actionable.

On the policies view, you’ll find:

  • The company score for all generated policies
  • The option to drill down into the details of each policy, including purpose, scope and protection requirements
  • Information on the tasks and progress that need to be completed for securing the policy’s domain

For example, this policy screen shows the client’s score per policy and allows you to drill down to see a breakdown of the policies requirements.

Cynomi AI-powered vCISO Platform
Figure 8: Cynomi policies screen

Policies are editable and customizable.

Actionable, Prioritized Remediation Tasks

Modeled after the knowledge of the world’s best CISOs, each policy requirement is also translated into an actionable task for remediation. Tasks are easy and intuitive to understand and follow and are displayed in an AI-generated prioritized list that includes its severity and status.

Task types include:

  • Technical controls
  • Administrative procedures
  • Security components configurations
  • And more
Cynomi AI-powered vCISO Platform
Figure 9: Cynomi tasks screen

The list and tasks can be edited. This flexibility allows the operating vCISO to postpone or defer certain tasks without affecting policy status or severity.

To track and manage tasks, users can apply filters, jump back to tasks that are already in progress, or focus on high severity tasks only. All progress is tracked, and tasks completed are automatically reflected in the client’s overall security posture score.

To execute and understand tasks, each task can be drilled into for step-by-step guidance on putting a control in place or mitigating the risk. Tasks are also customizable, allowing you to add best practice guidance, as well as evidence that supports the task.

Cynomi AI-powered vCISO Platform
Figure 10: Drill-down to a specific task

Plan and Roadmap

Cynomi leverages AI and automations to create a suggested plan. Then, the Cynomi platform provides the user with a wealth of tools and capabilities for planning, ongoing task management optimization and progress tracking:

  • Assigning tasks to short-, medium- and long-term plans
  • Allocating tasks to plans
  • Adding due dates
  • Filtering according to framework, due date, status, and more
  • Editing tasks per changing needs
  • Adding information and evidence to each task, per account or across the board, with specification, details and recommendations
  • Adding product and service recommendations to tasks for upselling new services
Cynomi AI-powered vCISO Platform
Figure 11: Cynomi automated risk mitigation plan

Customer-facing Reports

Cynomi includes built-in customer-facing reporting for each client. You can generate reports at the click of a button with your own branding showing the client’s security level, improvement, trends, compliance gaps and comparisons with industry benchmarks. Reports include:

  • Full Report – Your client’s cybersecurity posture. Use the report to present your clients’ status to them and your suggested remediation plan. Over time, updating the report will show the security improvements you helped them make.
  • Risk Findings Report – Your clients’ risk exposure based on the platform scans.
  • Compliance Report – Your clients’ compliance readiness and status.
Cynomi AI-powered vCISO Platform
Figure 12: Cynomi reports

These reports can help you to easily show your clients their current cyber posture status, the progress you helped them make and the impact of your work. Use these reports to open up conversations with management, IT and other stakeholders. Show them the security risks, help them understand requirements and demonstrate progress as each task is completed.

Continuous Optimization

Unlike one-time assessment tools, Cynomi continuously updates your client’s risk score, compliance readiness policies and tasks and shows progress over time. These are based on changes in your client environment, regulatory requirements and industry-specific threat intelligence. With this information, you can rest assured that you will always stay on top of your clients’ compliance and cybersecurity posture and demonstrate the value of your strategic cybersecurity service to them.

The Bottom Line

Cynomi’s AI-powered vCISO platform is designed to help MSPs and MSSPs grow their business and revenue through vCISO services. Cynomi helps service providers deliver comprehensive vCISO services to SMBs and SMEs, from risk assessments to security policies to plans and reporting, across both vCISO pillars: security and compliance. By understanding the impact of each task and action on both security and compliance, MSPs/MSSPs can make the most professional decisions for their clients. This allows MSPs and MSSPs to expand their customer base and secure recurring revenue with existing customers.

Cynomi also reduces vCISO tasks’ time by over 40% and helps onboard new employees quickly, so responsibilities can be delegated to them, regardless of seniority. By simplifying and standardizing processes, MSPs/MSSPs can onboard employees and customers quickly and cut time-to-value by half.

Finally, Cynomi’s reports allow MSPs and MSSPs to leverage reports and demonstrate tangible impact. This opens up conversations with leadership and increases upsell of services and products.

Visit Cynomi website to test it yourself.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
http://www.indiavpn.org/2024/04/10/hands-on-review-cynomi-ai-powered-vciso-platform/feed/ 0
GitHub Launches AI-Powered Autofix Tool to Assist Devs in Patching Security Flaws http://www.indiavpn.org/2024/03/21/github-launches-ai-powered-autofix-tool-to-assist-devs-in-patching-security-flaws/ http://www.indiavpn.org/2024/03/21/github-launches-ai-powered-autofix-tool-to-assist-devs-in-patching-security-flaws/#respond Thu, 21 Mar 2024 12:40:07 +0000 https://www.indiavpn.org/2024/03/21/github-launches-ai-powered-autofix-tool-to-assist-devs-in-patching-security-flaws/ [ad_1]

Mar 21, 2024NewsroomMachine Learning / Software Security

AI-Powered Autofix Tool

GitHub on Wednesday announced that it’s making available a feature called code scanning autofix in public beta for all Advanced Security customers to provide targeted recommendations in an effort to avoid introducing new security issues.

“Powered by GitHub Copilot and CodeQL, code scanning autofix covers more than 90% of alert types in JavaScript, Typescript, Java, and Python, and delivers code suggestions shown to remediate more than two-thirds of found vulnerabilities with little or no editing,” GitHub’s Pierre Tempel and Eric Tooley said.

The capability, first previewed in November 2023, leverages a combination of CodeQL, Copilot APIs, and OpenAI GPT-4 to generate code suggestions. The Microsoft-owned subsidiary also said it plans to add support for more programming languages, including C# and Go, in the future.

Code scanning autofix is designed to help developers fix vulnerabilities as they code by generating potential fixes as well as providing a natural language explanation when an issue is discovered in a supported language.

Cybersecurity

These suggestions could go beyond the current file to include changes to several other files and the dependencies that should be added to rectify the problem.

“Code scanning autofix lowers the barrier of entry to developers by combining information on best practices with details of the codebase and alert to suggest a potential fix to the developer,” the company said.

“Instead of starting with a search for information about the vulnerability, the developer starts with a code suggestion that demonstrates a potential solution for their codebase.”

That said, it’s left to the developer to evaluate the recommendations and determine if it’s the right solution and ensure that it does not deviate from its intended behavior.

GitHub also emphasized the current limitations of the autofix code suggestions, making it imperative that developers carefully review the changes and the dependencies before accepting them –

  • Suggest fixes that are not syntactically correct code changes
  • Suggest fixes that are syntactically correct code but are suggested at the incorrect location
  • Suggest fixes that are syntactically valid but that change the semantics of the program
  • Suggest fixes that are fail to address the root cause, or introduce new vulnerabilities
  • Suggest fixes that only partially resolve the underlying flaw
  • Suggest unsupported or insecure dependencies
  • Suggest arbitrary dependencies, leading to possible supply chain attacks

“The system has incomplete knowledge of the dependencies published in the wider ecosystem,” the company noted. “This can lead to suggestions that add a new dependency on malicious software that attackers have published under a statistically probable dependency name.”

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
http://www.indiavpn.org/2024/03/21/github-launches-ai-powered-autofix-tool-to-assist-devs-in-patching-security-flaws/feed/ 0
Google Open Sources Magika: AI-Powered File Identification Tool http://www.indiavpn.org/2024/02/17/google-open-sources-magika-ai-powered-file-identification-tool/ http://www.indiavpn.org/2024/02/17/google-open-sources-magika-ai-powered-file-identification-tool/#respond Sat, 17 Feb 2024 08:32:16 +0000 https://www.indiavpn.org/2024/02/17/google-open-sources-magika-ai-powered-file-identification-tool/ [ad_1]

Feb 17, 2024NewsroomArtificial Intelligence / Data Protection

AI-Powered File Identification Tool

Google has announced that it’s open-sourcing Magika, an artificial intelligence (AI)-powered tool to identify file types, to help defenders accurately detect binary and textual file types.

“Magika outperforms conventional file identification methods providing an overall 30% accuracy boost and up to 95% higher precision on traditionally hard to identify, but potentially problematic content such as VBA, JavaScript, and Powershell,” the company said.

The software uses a “custom, highly optimized deep-learning model” that enables the precise identification of file types within milliseconds. Magika implements inference functions using the Open Neural Network Exchange (ONNX).

Google said it internally uses Magika at scale to help improve users’ safety by routing Gmail, Drive, and Safe Browsing files to the proper security and content policy scanners.

Cybersecurity

In November 2023, the tech giant unveiled RETVec (short for Resilient and Efficient Text Vectorizer), a multilingual text processing model to detect potentially harmful content such as spam and malicious emails in Gmail.

Amid an ongoing debate on the risks of the rapidly developing technology and its abuse by nation-state actors associated with Russia, China, Iran, and North Korea to boost their hacking efforts, Google said deploying AI at scale can strengthen digital security and “tilt the cybersecurity balance from attackers to defenders.”

Google Open Sources Magika

It also emphasized the need for a balanced regulatory approach to AI usage and adoption in order to avoid a future where attackers can innovate, but defenders are restrained due to AI governance choices.

“AI allows security professionals and defenders to scale their work in threat detection, malware analysis, vulnerability detection, vulnerability fixing and incident response,” the tech giant’s Phil Venables and Royal Hansen noted. “AI affords the best opportunity to upend the Defender’s Dilemma, and tilt the scales of cyberspace to give defenders a decisive advantage over attackers.”

Concerns have also been raised about generative AI models’ use of web-scraped data for training purposes, which may also include personal data.

Cybersecurity

“If you don’t know what your model is going to be used for, how can you ensure its downstream use will respect data protection and people’s rights and freedoms?,” the U.K. Information Commissioner’s Office (ICO) pointed out last month.

What’s more, new research has shown that large language models can function as “sleeper agents” that may be seemingly innocuous but can be programmed to engage in deceptive or malicious behavior when specific criteria are met or special instructions are provided.

“Such backdoor behavior can be made persistent so that it is not removed by standard safety training techniques, including supervised fine-tuning, reinforcement learning, and adversarial training (eliciting unsafe behavior and then training to remove it), researchers from AI startup Anthropic said in the study.


Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
http://www.indiavpn.org/2024/02/17/google-open-sources-magika-ai-powered-file-identification-tool/feed/ 0