With cyberattacks intensifying, U.S. lawmakers are preparing legislation that would require companies to alert the government within 24 hours of a breach, as noted by CNN. “We need the ability to get visibility into national cybersecurity risks,” Eric Goldstein, executive assistant director at the Cybersecurity and Infrastructure Security Agency, said, as quoted by7 CNN. “We need to understand where adversaries are intruding into networks across this country. We need to understand the techniques that they’re using to break in. We need to understand what they are doing or trying to do. The more of that kind of information that we get, we can then protect others.” With threats being taken far more seriously, some of the top companies that may be able to assist include Plurilock Security (TSXV:PLUR) (OTC:PLCKF), FireEye Inc. (NASDAQ:FEYE), Palo Alto Networks (NYSE:PANW), Fortinet Inc. (NASDAQ:FTNT), and Check Point Software Technologies (NASDAQ:CHKP).
Plurilock Security (TSXV:PLUR)(OTC:PLCKF) Wins Competitive US$210,000 Purchase Order with California State Taxation Agency
Plurilock Security, an identity-centric cybersecurity solutions provider for workforces, has secured a purchase order with a California state taxation agency worth US$210,000.
After a competitive process, Plurilock secured the order by responding to the request for proposal (RFP), utilizing the team’s proven track record of providing quality products and customer service. Per the purchase order, Plurilock will provide the agency with annual subscriptions of Commonlook Office & PDF software. This order, the latest in a series of government contracts secured by Plurilock in recent weeks, demonstrates the Company’s continued efforts to rapidly expand and serve state agencies in North America.
Other related developments from around the markets include:
FireEye Inc.announced the launch of Mandiant® On-Demand Cyber Intelligence Training. As cyberattacks continue to dominate headlines, organizations of all sizes are continuously challenged to find and retain talent. Modern security and risk leaders need to rethink how to cultivate security talent by applying new training methods to build cyber threat intelligence expertise across their organizations. Mandiant On-Demand Cyber Intelligence Training is focused on educating security teams on the practical application of threat intelligence concepts, across multiple use cases designed to build skill sets at all levels.
Palo Alto Networks announced the release of Yor, an open-source tool that automatically tags cloud resources within infrastructure as code (IaC) frameworks Terraform, AWS CloudFormation, and Serverless Framework YAML. Yor automates the tedious work of manually tagging cloud resources, helps security teams trace security misconfigurations from code to cloud, and enables highly effective GitOps across all major cloud providers.
Fortinet Inc. announced four new service providers from around the world have selected Fortinet Secure SD-WAN to differentiate their business and deliver new value-added services to customers. These four organizations, including Commandlink, DNA, Syringa Networks and TIM(Telecom Italia), are expanding their customer offerings powered by Fortinet Secure SD-WAN, continuing Fortinet’s momentum with an existing and expanding list of service providers (SPs) and managed security service providers (MSSPs).
Check Point Software Technologies, expanded the capabilities of its unified Cloud Native Security Platform, to deliver application-first workload protection with Check Point CloudGuard Workload Protection. This fully automated cloud workload security solution empowers security teams with tools to automate security across applications, Application Programing Interfaces (APIs) and microservices from development to runtime via a single interface. As the COVID-19 pandemic forced enterprises to transition to the new ‘work from anywhere’ environment, cloud became a natural progression for organizations looking to enable their remote workers quickly. As more organizations are still migrating to the cloud in parallel to undergoing the “shift-left” organizational change, security teams find themselves with multiple platforms to manage. These platforms provide neither the visibility nor the ability to protect the rapidly growing cloud workload deployments. In fact, according to a recent survey, 68% of enterprises regard the misconfiguration of cloud assets as one of the biggest contributors to cloud security threats.
Legal Disclaimer / Except for the historical information presented herein, matters discussed in this article contains forward-looking statements that are subject to certain risks and uncertainties that could cause actual results to differ materially from any future results, performance or achievements expressed or implied by such statements. Winning Media is not registered with any financial or securities regulatory authority and does not provide nor claims to provide investment advice or recommendations to readers of this release. For making specific investment decisions, readers should seek their own advice. Plurilock Security Inc. has paid three thousand five hundred dollars for advertising and marketing services to be distributed by Winning Media. Winning Media is only compensated for its services in the form of cash-based compensation. Winning Media owns ZERO shares of Plurilock Security Inc. Please click here for full disclaimer.