Polyverse raises $2 million to stop cyberattackers in their tracks

Alexander Gounares
Alexander Gounares

A Seattle area startup by the name of Polyverse believes it has developed new technology to stop cyberattackers in their tracks, and it has raised $2 million in fresh funding to protect organizations’ server and cloud applications from end-to-end.

The funding follows a $1 million round last summer. Polyverse is led by Alex Gounares, who previously served as CTO of AOL and corporate vice president at Microsoft. Prior to starting Polyverse, Gounares was CEO of Concurix Corporation, which he sold earlier this year to San Mateo, Calif.-based Strongloop in a deal of undisclosed size.

Kirkland-based Polyverse uses what it calls “moving target defense” to prevent cyberattacks, storing data in an array of containers instead of storing millions of records in a few databases. The company claims this system “completely undermines the economics of cybercrime,” making it so “cyberthieves must endlessly rethink their attack strategies.”

Polyverse also says the the technology — which integrates with existing hardware and software systems — self heals, creating new containers in a method that’s similar to wiping a hard disk.

Containers are continuously created from last known good state and put into use servicing requests,” the company writes in a white paper. “After a brief time (typically five seconds), containers are then garbage collected. Any malware that may have been inserted is thus automatically removed. Among other advantages, this makes it far more difficult for cyberattackers to execute advanced-persistent-threat (APT) attacks.

SpringRock Ventures led the round, with SpringRock’s Kirsten Morbeck noting in a release that “Polyverse has an exceptional team building on a paradigm shift in cybersecurity.” Polyverse employs just under 20 people.

Source: www.geekwire.com/2016/polyverse-raises-2-million-stop-cyberattackers-tracks/

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

A password for the Hawaii emergency agency was hiding in a public photo, written on a Post-it note

A password for the Hawaii emergency agency was hiding in a public photo, written on a Post-it note

A password for the Hawaii emergency agency was hiding in a public photo, written on a Post-it note

While the Hawaii Emergency Management Agency says a false missile alert was not a hack, a password in a photo has drawn criticism of its security practices.

Source: www.businessinsider.com/hawaii-emergency-agency-password-discovered-in-photo-sparks-security-criticism-2018-1

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

From (ISC)² Endorsement Demystified

(ISC)² Endorsement Demystified

Following the jubilant moment of finding out you have achieved a passing score on your (ISC)² exam, you’re now ready for the endorsement process – but what does that actually mean? First, believe us when we say that the hard part is over! You’ve already passed the exam, and there’s no reason to be anxious or delay your endorsement. Especially if you’ve heard any of the endorsement myths below we are about to bust. Endorsement isn’t important It sure is! Becoming a certified member of (ISC)² is more than simply passing an exam, no matter how rigorous and challenging that…

Source: blog.isc2.org/isc2_blog/2017/11/isc²-endorsement-demystified.html

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

IT Security from Forbes: “Cybersecurity skills shortage creating hiring chaos”

Cybersecurity skills shortage creating hiring chaos

Here’s a quick review of some of the cybersecurity skills shortage data I’ve cited about in recent blogs:

  1. According to ESG research from early 2017, 45 percent of organizations claim to have a problematic shortage of cybersecurity skills.
  2. In a recent research project conducted by ESG and the information systems security association (ISSA), 70 percent of cybersecurity professionals say the cybersecurity skills shortage has had an impact on their organization. The skills shortage has led to an increasing workload on existing staff, the need to hire and train junior employees due to the lack of experienced talent, and a situation where the cybersecurity staff spends most of its time on emergency issues and very little time on proactive strategic planning or training.
  3. When asked to identify factors that contributed to past security incidents, 22 percent said their cybersecurity team was not large enough for the size of their organization, while 18 percent stated that the cybersecurity team cannot keep up with the workload.
  4. More than two-thirds (67 percent) of cybersecurity professionals claim they are too busy with their jobs to keep up with skills development and training.

So, in aggregate, many organizations are understaffed, many lack some (or many) types of advanced cybersecurity skills, and the staff is too busy to invest time in continuing education to keep up with the latest threats. Yikes!

Huge demand for cybersecurity talent

CISOs recognize these issues and many organizations are actively hanging a “help wanted” sign to find cybersecurity talent. Unfortunately, it is exceedingly difficult to bring new people onboard. Why? Experienced cybersecurity professionals are in high demand, so organizations are engaged in a battle royale to coax them away from their present employers and outbid others for their services.

Source: www.csoonline.com/article/3238745/security/cybersecurity-skills-shortage-creating-recruitment-chaos.html

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

Why I think the CISSP CAT (Computerized Adaptive Testing) is a good thing!

I just published a new video on why (ISC)² switching the CISSP exam to CAT (Computerized Adaptive Testing) is a good thing.
This will test students on their knowledge (just like the current version), but not on their ability to handle the 6 hour brain melting previous exam.

You can watch the video on my free CISSP course here (lecture 8):
https://www.udemy.com/cissp-essentials/

Or you can watch it on my youtube channel here:

 

 

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

IT Security from Forbes “BlackBerry CEO: We’ll Try To Break Our Own Encryption If Feds Demand It”

BlackBerry CEO: We’ll Try To Break Our Own Encryption If Feds Demand It

Unlike Apple, Google and Microsoft, who’ve had their separate battles with U.S. law enforcement over recent years, BlackBerry hasn’t been as strong in its condemnation of potential government overreach in accessing user data. And CEO John Chen today told Forbesthe company would comply with court orders asking it to break its encryption and carry out wiretaps on targets specified.

Source: www.forbes.com/sites/thomasbrewster/2017/10/25/blackberry-ceo-well-try-to-break-our-own-encryption-if-feds-demand-it/

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

IT Security IOT from Forbes: “Time To Update Your Vacuum Cleaner — Hack Turns LG Robot Hoover Into A Spy”

Time To Update Your Vacuum Cleaner — Hack Turns LG Robot Hoover Into A Spy

Got a robot hoover buzzing around your home? It’s time to take a look at its security, especially if its an LG device. Researchers from Israeli firm Check Point reported a hack of the LG SmartThinQ app that allowed them to remotely take control of the manufacturer’s Hom-Bot hoover and use the video feed to spy on anything in the device’s vicinity. And, the researchers said, the attack could also compromise refrigerators, ovens, dishwashers, washing machines, dryers and air conditioners — any connected thing controlled by the LG app.

Source: www.forbes.com/sites/thomasbrewster/2017/10/26/lg-hom-bot-robot-hoover-hacked-into-surveillance-device/

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading