Tag Archive for: Fast

Synacor Fast Tracks Complex Streaming Integrations With Cloud ID™ Media Connect


Synacor, Inc.

Synacor, Inc.

Consumer identity access management pre-integrations with 500+ networks, services, MVPDs and platforms slashes rollout times for new content deals and launches

Synacor Fast Tracks Complex Streaming Integrations With Cloud ID™ Media Connect

Consumer identity access management pre-integrations with 500+ networks, services, MVPDs and platforms slashes rollout times for new content deals and launchesConsumer identity access management pre-integrations with 500+ networks, services, MVPDs and platforms slashes rollout times for new content deals and launches

Consumer identity access management pre-integrations with 500+ networks, services, MVPDs and platforms slashes rollout times for new content deals and launches

BUFFALO, N.Y., Dec. 20, 2023 (GLOBE NEWSWIRE) — Synacor today announced the Cloud ID™ Media Connect managed consumer identity access management (“CIAM”) service to fast track streaming ecosystem deployments amid a heavily fragmented viewing market. Cloud ID Media Connect can save streaming media companies months or even years of authentication integration work required to connect streaming services to various platforms. The new offering, which is pre-integrated with more than 500 networks, services, MVPDs and platforms, comes as changing business models, more complex deals and a continued wave of new content providers upend streaming market dynamics.

As the streaming market matures, more content is being distributed to more platforms. Deals are often made on the fly with urgent rollout requirements. More content providers are entering the market with no prior experience navigating an increasingly splintered ecosystem. At the same time, security requirements are more pressing than ever, demanding SAML or OAuth integrations that can each take weeks or months to complete and require ongoing support and maintenance. This is further complicated by many providers not offering standard authentication endpoints, requiring custom API integrations. It is not uncommon for content providers to support a dozen or more platform integrations at a time, and some MVPDs or streaming TV providers must accommodate literally thousands of combinations of content provider apps and streaming platforms.

Based on more than a decade of experience managing comprehensive authentication integrations for premium entertainment services, Cloud ID Media Connect delivers a reliable, managed CIAM solution that is now pre-integrated with more than 500 content distributors, platforms and MVPDs, including…

Source…

ThreatX Listed on the 2023 Deloitte Technology Fast 500™


Attributes Over 300% Revenue Growth to Increasing Demand for Protection of Vulnerable APIs and Applications

BOSTON, November 08, 2023–(BUSINESS WIRE)–ThreatX, the leading API and application protection platform, today announced it is listed on the Deloitte Technology Fast 500™, a ranking of the 500 fastest-growing technology, media, telecommunications, life sciences, fintech, and energy tech companies in North America, now in its 29th year. ThreatX grew more than 300 percent between 2019 and 2022.

ThreatX’s chief executive officer, Gene Fay, credits both ThreatX’s rapid innovation and market demand for API and application protection with the company’s revenue growth. He said, “ThreatX’s inclusion on this esteemed list is a testament to the team’s incredible hard work and commitment to solving organizations’ struggles with API and application attacks. ThreatX is the only solution that protects both APIs and applications at the edge and at runtime with powerful risk-based, real-time blocking, and our recent growth is only the beginning.”

Over the last year, ThreatX released Runtime API and Application Protection (RAAP), added sensitive data detection to its API protection, and enhanced its solution with a new Botnet Console and API Catalog. The company also recently added a Chief Revenue Officer to its team.

“Each year we look forward to reviewing the progress and innovations of our Technology Fast 500 winners. This year is especially celebratory as we expand the number of winners to better represent just how many companies are developing new ideas to progress our society and the world, especially during a slow economy,” said Paul Silverglate, vice chair, Deloitte LLP and U.S. technology sector leader. “While software and services and life sciences continue to dominate the top 10, we are encouraged to see other categories making their mark. Congratulations to all the winners who show us how creativity, hard work and perseverance can lead to success.”

“As for growing companies, it’s always rewarding to be recognized for the ongoing commitment it takes to navigate obstacles, transform when necessary and ultimately create a thriving business,” said Christie…

Source…

Hackers’ dwell time decline, but they are able to reach active directory very fast


Even as the cyber threat landscape is becoming more complex and dangerous, there seems to be an increase in the awareness levels on the importance of guarding one’s digital properties and networks. This sounds very good and encouraging. But bad news is that the hackers are able to reach the Active Directory (AD), one of the critical assets for a company, in less than a day. 

AD typically manages identity and access to resources across an organisation, meaning attackers can use AD to easily escalate their privileges on a system to simply log in and carry out a wide range of malicious activity.

According to the latest report by cybersecurity company Sophos, the average dwell time (the time an intruder lurks around in a computer network or a device undetected) has come down to eight days from 10 days in the first half of 2023.

With regard to ransomware attacks, the dwell time comes down to five days. In 2022, the median dwell time decreased from 15 to 10 days.

Also read: India’s AI talent pool on LinkedIn has grown 14-fold since 2016

The Active Adversary Report for Tech Leaders 2023, which provides an in-depth look at attacker behaviours and tools during the first half of 2023, analysed Sophos’ Incident Response (IR) cases from January to July 2023.

“It took on average less than a day—approximately 16 hours—for attackers to reach Active Directory (AD),” he said.

“Attacking an organisation’s Active Directory infrastructure makes sense from an offensive view. AD is usually the most powerful and privileged system in the network, providing broad access to the systems, applications, resources, and data that attackers can exploit in their attacks,” John Shier, field CTO, Sophos, said.

“When an attacker controls AD, they can control the organisation. The impact, escalation, and recovery overhead of an Active Directory attack is why it’s targeted,” he said.

“Getting to and gaining control of the Active Directory server in the attack chain provides adversaries several advantages. They can linger undetected to determine their next move, and, once they’re ready to go, they can blast through a victim’s network unimpeded,” he said.

Full recovery from a domain compromise…

Source…

Cyber Attacks Against Mobile Devices Growing Fast


A rise in mobile-powered businesses is creating vulnerability gaps that are being exploited by cyber criminals and nation-states, according to a new report by Zimperium, a mobile first security platform provider.

Indeed, some 43% of all compromised devices were fully exploited — not just jailbroken or rooted — an increase of 187% year-over-year, Zimperium found in its 2023 Global Mobile Threat Report.

Explosive Growth in Mobile Device Use Fuels Wider Attack Surface

Shridhar Mittal, Zimperium chief executive, said the “explosive growth” in mobile device and app use has created a wider attack surface:

“Mobile devices are integral to the way we work, communicate, navigate, bank and stay informed — creating new opportunities for malware. Last year’s Global Mobile Threat Report revealed that 60% of the endpoints accessing enterprise assets were mobile devices, and this does not seem to be slowing down. Mobile-powered businesses must increase mobile security measures to protect the personal data security of employees and the sensitive information belonging to the organization.”

Here are some of the key findings from the study:

  • 80% of phishing sites target mobile devices specifically or are designed to function both on desktop and mobile. Meanwhile, the average user is six to ten times more likely to fall for SMS phishing attacks than email-based attacks.
  • During 2022, Zimperium detected an average of four malicious/phishing links clicked for every device covered with its anti-phishing technology.
  • EMEA and North America have the highest percentage of devices being impacted by spyware, with EMEA at 35% and North America at 25%.
  • There was a 138% increase in critical Android vulnerabilities discovered in 2022, while Apple iOS accounted for 80% of the zero-day vulnerabilities actively being exploited in the wild.
  • Between 2021 and 2022, the total number of unique mobile malware samples rose 51%, with more than 920,000 samples detected, including Dirty RatMilad, MoneyMonger and Dark Herring.
  • In 2021, Zimperium detected malware on 1 out of 50 Android devices. It increased significantly in 2022 to 1 out of every 20 devices.
  • ±2% of all…

Source…