Cybersecurity Solution Highlights From Black Hat 2022

This post gives an overview of the 12 solutions offered at Black Hat 2022. These are representative of the themes presented and discussed during the conference.

I had the opportunity to meet with 12 cybersecurity solutions providers during the 25th Black Hat Cybersecurity Conference.

I observed three trends at this conference that are represented by the solutions the following companies offer:  

 API security

DarkWeb research and tracking

Reducing security tool sprawl with integrated solutions

Here's what I learned and who I learned it from.

Cybersecurity Solutions Providers

1. Bolster

Bolster.ai enables digital-first companies to transact business over marketplaces and social channels as these touchpoints are becoming the new attack vectors. Bolster employs deep learning, computer vision, and natural language processing to identify suspicious web pages. The technology has been used to identify, and take down, thousands of sites mimicking Booking.com, Uber, and Zoom, as well as a number of banks and credit unions. The platform is being used to supplant three to five other solutions in the cybersecurity tech stack and for brand protection as well as cybersecurity.

2. Cobalt

Cobalt provides Pen Testing as a Service (PTaaS) through a subscription model whereby dev teams can spin up pen tests in 48 hours versus six-to-eight weeks at 50% of the cost. This removes the pain of waiting for developers who are driven to fail fast and iterate. Each client is on a Slack channel with the testers so they're able to see the security issues in real-time and address them in the Sprint. The platform integrates with JIRA and GitHub and enables DevSecOps to learn how hackers are exploiting applications. Cobalt offers free retesting during the contract period and many active development organizations keep Cobalt on retainer.

3. CyberSixGill

CyberSixGill collects data where threat actors are talking and communicating on the deep and dark web. Companies do not have the time, bandwidth, or access to search for all these threats. CyberSixGill automates the collection of data from Telegram, Twitter, dark web forums, markets, and file shares. Ten million items are collected each day. These are integrated into users' existing security stacks to identify exposure and risk and pre-empt threats before they become attacks. Threat scores are provided based on discussions taking place on the dark web to help security analysts, threat hunters, and fraud team members to know the level of risk to expect.

4. Exabeam

Exabeam enables security teams to get away from Splunk (which requires 30 days of training) and several other security solutions to perform threat detection, investigation, and response (TDIR). The cloud-native SecOps platform enables security team members to focus on threat detection using behavioral analytics. The platform also uses ML modeling to learn what the normal behavior of employees looks like since 90% of security risk is from people within the company. It provides end-to-end data and visibility to parse and analyze abnormal activity from anyone in the company.

5. Intel 471

Intel 471 provides cyber threat intelligence for intelligence, security, and fraud teams. They released The 471 Cyber Threat Report; 2022-2023 Trends & Predictions which analyzes recent and commonly used tactics, techniques, and procedures that prominent threat actors have adopted, how these threats have affected enterprises, along with predictive intelligence assessments on threats that organizations should be prepared to thwart over the next year. A key takeaway from the report is that hacktivism has returned driven by Russia's attack on Ukraine with the splintering of the cybercrime ecosystem and key players pledging allegiance to Ukraine or Russia.

6. Keeper Security

Keeper Security expanded its password management solution for enterprises with a cybersecurity platform with a secrets manager that secures the environment and eliminates "secret sprawl" by removing hard-coded credentials from source code, config files, and CI/CD pipelines; and a connection manager that provides DevOps and IT with easy, highly-secure access to RDP, SSH, database, and Kubernetes endpoints through any web browser. The platform is one of several solutions I observed consolidating the number of security solutions needed by the enterprise and small and medium-sized enterprises.

7. OPSWAT

OPSWAT provides critical infrastructure cybersecurity solutions and Deep Content Disarm and Reconstruction (CDR) to protect mission-critical organizations from malware and zero-day attacks. To minimize the risk of compromise, OPSWAT Critical Infrastructure Protection solutions safeguard public and private sector organizations with technology, processes, and hardware scanning to secure the transfer of data, files, and device access. Recent enhancements include the OPSWAT Sandbox for OT with detection of malicious communications on OT network protocols and support for open-source third-party tools in its MetaDefender Malware Analyzer.

8. Salt Security

Salt Security provides an API security platform that enables IT to harden application infrastructure and defend against cybersecurity threats targetting APIs. This is critical as the number of APIs continues to grow at more than 400% per year and they must be continually enhanced and tuned to provide a great user experience. However, bad actors have figured out that APIs are a lucrative target. The security platform uses data and AI/ML to identify problems and vulnerabilities and updates documentation so developers make better and more secure APIs with less hassle and more confidence.

9. Sonar

Sonar enables developers and dev teams to write clean code and remediate existing code organically. Clean code minimizes maintenance time and costs, reduces developer attrition, increases software longevity, and reduces operational, reputational, and security risks. More than 40% of developers' time is spent remediating bad code and technical debt. Code security is part of clean code as most security vulnerabilities are in the source code. Code security that's not clean code is worthless. Only developers can own code and therefore code securely via short feedback loops, integrated with DevOps, and education.

10. Traceable

Traceable is an API security platform that discovers, manages, and secures APIs for the enterprise. According to Akamai, 87% of web traffic today is via APIs. Traceable protects APIs by understanding each API's business logic, user attribution, and context, from development through production. Distributed tracing technology and context-based behavioral analytics, provide API security to cloud-native and API-based applications. Analytics enable SOC and security analysts to hunt for hidden IOCs and breaches, track and trace suspicious users, analyze security incidents, and speed up incident response, thereby lowering MTTR.

11. Xcitium

Xcitium (formerly Comodo Security) helps customers avoid breaches by neutralizing ransomware, zero-day malware, and cyberattacks with their active protection solution. The company also provides containment technologies to deliver an endpoint detection system for critical components such as advanced endpoint management toolsets to provide a single cloud-accessible SOCaaS platform that offers high-security implementations for enterprises and government agencies.

12. ZeroFox

ZeroFox provides a unified platform for external cybersecurity. ZeroFox believes cybercriminals are a much bigger threat to private enterprise than nation-states. Business email compromise results in 7-times more financial damage than ransomware. Enterprises need a culture that allows employees to challenge executives who are asking employees to transfer funds or PII. Use cases include social media monitoring and brand protection, physical security, SOC signatures, telemetry, data, dark web, DarkOps research, and attack surface management. They work with clients to proactively address security threats and risks rather than after a breach has occurred.

We Provide consulting, implementation, and management services on DevOps, DevSecOps, Cloud, Automated Ops, Microservices, Infrastructure, and Security

Services offered by us: https://www.zippyops.com/services

Our Products: https://www.zippyops.com/products

Our Solutions: https://www.zippyops.com/solutions

For Demo, videos check out YouTube Playlist: https://www.youtube.com/watch?v=4FYvPooN_Tg&list=PLCJ3JpanNyCfXlHahZhYgJH9-rV6ouPro

If this seems interesting, please email us at [email protected] for a call.


Relevant blogs:

How to Prevent Security Risks in the Private Cloud 

Building a QR Code Generator with Azure Functions 

Securing Containers With Seccomp Filters 

Cloud Computing and Cybersecurity: Risk Factor and Prevailing Trends

Recent Comments

No comments

Leave a Comment