In the News

Featured News Coverage

December 9, 2016
Market Watch logo

This Is The New Reality For Cyber Security: Accept That Hackers Will Get In

Market Watch, By Kasey Cross, Director of Product Management, LightCyber
Scary: It now takes companies an average of 5 months to find an active hacker.

The stakes of the data breach crisis have been enormous this year and make prospects bleak for 2017 and beyond.

Global cybercrime will double to a projected $6 trillion in $2021, from $3 trillion in 2015, according to Cybersecurity Ventures — costs that are either directly absorbed by consumers or represent vast expenditures that could have been spent more beneficially for their investors.
>> Read the full article

LightCyber In the News

February 23, 2017

The Inconvenient Truth About Data Breaches

New Statesman – UK, By Alex Moyes, Country Manager, LightCyber
Anomaly detection can be just as important as preventive technology according to Alex Moyes, UK country manager at LightCyber.

Why is it data breaches continue to rise in volume and magnitude without any sign of stopping or slowing down? During 2016, cyber crime overtook physical crime in the UK, and all indicators point to increasing loss and damage in this coming year.
>> Read the full UK article (Page 53)

February 21, 2017

Detecting Intrusions Early To Ensure Cybersecurity

Corporate Compliance Insights, By Peter Nguyen
Who’s Inside And Why Most Enterprises Are Still In The Dark.

It should be upsetting to realize that if an intruder is active in a network, most organizations simply would not know. It’s possible that an outsider gained access to the network and quietly began to explore it and expand their area of control.
>> Read the full article

February 14, 2017

AI and Robotics Trends: Experts Predict

Datamation, By Andy Patrizio
Many experts in the field firmly believe 2017 will be a breakout year for both Atificial Intelligence and robotics, since the two often go together. Spoiler alert: it’s all good.

“The average time to discover a network attacker is about five months, giving attackers plenty of time to achieve their goals”, said Peter Nguyen, director of technical services at LightCyber, which does behavior based security software.
>> Read the full article

February 10, 2017

Enterprises CAN Defend Against New Wave Of Anti-Forensic Cyber-Attacks

Open Source Intelligence – UK, By Staff Writer
Fileless malware could be lurking anywhere.

Kaspersky Lab’s Global Research & Analysis Team spotted something unusual recently: more than 140 global enterprises have been hit by ‘fileless attack’ where threat actors use anti-forensic techniques to evade detection.
>> Read the full UK article

February 9, 2017

Enterprises CAN Defend Against New Wave Of Anti-Forensic Cyber-Attacks

SC Magazine, By Davey Winder
Researchers agree that the trend of fileless malware attacks is increasing, so how easy is it to spot and identify this ‘under the radar’ assault?

Kaspersky Lab’s Global Research & Analysis Team spotted something unusual recently: more than 140 global enterprises have been hit by ‘fileless attack’ where threat actors use anti-forensic techniques to evade detection.
>> Read the full UK article

February 9, 2017

What Executives and Board Members Should Demand of Security

Info Security – UK, By Alex Moyes UK Country Manager, LightCyber
If there is an active intruder in your network, you would likely not know. Like most organizations, you would be in the dark.

It is entirely possible that months or even years ago, an outsider gained access to the network and quietly began to explore it and expand their area of control. Over the first weeks and months, the attacker gained access to all the servers and began looking for files that might have value.
>> Read the full UK article

February 3, 2017

LightCyber: New Security Assurance & Efficiency Metrics Tools (Video)

American Security Today, By Tammy Waitt
LightCyber, is introducing new tools that equip enterprises to meet increasing Board demands for security accountability and compliance with internal and industry regulations, such as the General Data Protection Regulation (GDPR).

LightCyber also introduced updated metrics from customer production systems and an online calculator so that prospective customers can quickly and easily assess current operational efficiency and the gains that they will receive from a LightCyber Magna deployment.
>> Read the full article

January 10, 2017

How To Detect A Hacker Before They Steal Your Company’s Data

betanews, By Alex Moyes
With massive data breaches uncovered daily or weekly, it’s hard not to be a bit numb to the urgency and magnitude of the issue. For most organizations, the problem is far from solved. Apathy in place of outrage at this juncture could diminish any help before it gets started. At the same time, misguided efforts will result in continued failure.
>> Read the full article
January 10, 2017

Sniffing Out Attackers From Within

Pro Security Zone – UK, By Jonathan Newell
Jonathan Newell met LightCyber to discuss how cyber attacks can still be thwarted even when intruder detection methods have failed.

With so many products on the market to prevent intrusion, detect malware and keep the doors into your IT domain tightly closed and barricaded, it isn’t as easy as it once was to gain access to sensitive data and user accounts. For a long time, constructing these barricades has been one of the main focuses of the IT security industry with less thought being given to intruders that may already be on the network and indeed may have been for a long time.
>> Read the full UK article

January 10, 2017

LightCyber Listed as a Representative Vendor in Two Recent Gartner Market Guide Reports

Global Security Magazine – UK, By Marc Jacob
LightCyber announced that it was listed as a Representative Vendor in two separate, recently published Market Guide reports from Gartner, Inc., which advocate the use of broad-based machine learning techniques to detect the anomalous behaviours of active network attackers. The first, published 8 December 2016, Market Guide for User and Entity Behavioural Analytics (G00292503), includes solutions that profile users and entities to detect anomalies. The second, published 30 November 2016, Market Guide for Endpoint Detection and Response Solutions (G00298289), includes solutions using endpoint visibility for early identification of attacks.
>> Read the full UK article
January 10, 2017

LightCyber Included In Gartner Market Guide Reports

Pro Security Zone – UK, By Staff Writer
Integration of network, user and endpoint visibility provides accuracy of active network attack detection.

LightCyber has been listed as a Representative Vendor in two separate, recently published Market Guide reports from Gartner, which advocate the use of broad-based machine learning techniques to detect the anomalous behaviours of active network attackers. The first, published on 8th December 2016, Market Guide for User and Entity Behavioural Analytics (G00292503), includes solutions that profile users and entities to detect anomalies. The second, published on 30th November 2016, Market Guide for Endpoint Detection and Response Solutions (G00298289), includes solutions using endpoint visibility for early identification of attacks.
>> Read the full UK article

December 21, 2016

Ready For Ransomware?

Advanced Manufacturing, By Sean Lyngaas, Contributing Editor
And other malware? And DDoS attacks? Manufacturers are waking up to issues about which they need to be on high alert.

The nexus of cyber and physical security threats is the stuff of nightmares, and while manufacturers are waking up to it as a reality, experts worry that the awakening is happening too slowly.
>> Read the full article

December 21, 2016

Go Ask Alice: New ATM Malware Detected

SC Magazine, By Greg Masters, Managing Editor
A new malware family, dubbed Alice, has been detected that is solely focused on making ATMs spit out cash.

Unlike other ATM malware families, the “stripped down” malware does not enable attackers to control operations via the numeric keypad of ATMs and it does not contain information-stealing characteristics. Rather, it is designed solely to cause ATMs to give up their cash, according to Trend Micro, which first detected the malware last month.
>> Read the full article

December 15, 2016

TMC Interview With LightCyber

TMCnet.com, By Rich Tehrani, CEO, TMC
Rich Tehrani, CEO of TMC speaks with Jason Matlof, EVP & Chief Marketing Officer, LightCyber.
>> View the Video
December 15, 2016

Yahoo’s Failures Led To Billion-Account Breach, Experts Say

San Jose Mercury News, By Ethan Baron
In the wake of a revelation from Yahoo that it had discovered another massive data breach, cybersecurity experts are condemning the company’s handling of users’ personal information.

Yahoo on Wednesday announced that private data from more than a billion user accounts was stolen in 2013 by an unspecified hacker. That news followed the struggling Sunnyvale tech giant’s September revelation that a cyber-attacker had plundered personal data from at least a half-billion user accounts in 2014.
>> Read the full article

December 15, 2016

Yahoo Breach Redux

ITBusinessEdgee, By Marquette Poremba
You’ve probably heard this already, but the Yahoo breach is back in the news, and not in a good way. The original breach involved 500 million users. Now comes news of a separate breach that involved more than a billion accounts. This breach happened in August 2013. Let that sink in a moment. If you have an account with Yahoo servers, your information has likely been floating out there for more than three years without you knowing.
>> Read the full article
December 13, 2016

Gazing Ahead: Security Predictions

SC Magazine, By Greg Masters, Managing Editor
Ransomware will grow to unprecedented levels in 2017. Ransomware attacks will continue and grow to unprecedented levels in 2017. Attackers have new tools that enable automation allow the automated manufacture of the ransomware software and the botnets that support them. Given the rapid ROI for this attack, and the easy access to non-traceable money (such as bitcoin) this automation makes it relatively easy for moderately sophisticated attackers to deploy these attacks in much higher volumes.
>> Read the full article
December 12, 2016

Gazing Ahead: Security Predictions

Business Solutions, By Jason Matlof, Executive Vice President, LightCyber
Today, it’s fashionable to be called detection and leave behind the vestiges of a security model built entirely around prevention. Prevention is still a necessity, however, everyone knows that complete prevention is a fallacy.
>> Read the full article
December 12, 2016

Tackling National Cybersecurity Will Be Challenging

TheStreet, By Ellen Chang
The pressure for companies to adapt to technology which is rapidly changing comes at a price because cybersecurity is often sacrificed, leaving businesses and employees vulnerable to hackers.

The pressure for companies to adapt to rapidly changing technology comes at a price, because cybersecurity is often sacrificed, leaving businesses and employees vulnerable to hackers.
>> Read the full article

December 7, 2016

Obama’s cybersecurity recommendations a small step forward, but need teeth and political willpower

CSO – Online, By Maria Korolov, Contributing Writer, CSO
Last week’s report recommended training 100,000 new cybersecurity professionals and increasing federal R&D funding for cybersecurity by $4 billion over the next decade.

Last week’s report by the nonpartisan Commission on Enhancing National Cybersecurity recommended training 100,000 new cybersecurity professionals and increasing federal R&D funding for cybersecurity by $4 billion over the next decade — but that’s not enough to address the current shortfall, experts say.
>> Read the full article

December 6, 2016

Industry Reactions to Presidential Commission’s Cybersecurity Report

Security Week, By Eduard Kovacs
The Presidential Commission on Enhancing National Cybersecurity last week published a set of recommendations aimed at strengthening cybersecurity across the public and private sectors.

The recommendations would need to be carried out by President-elect Donald Trump, including some that call for action within the first 100 days of the new administration.
>> Read the full article

December 6, 2016

Take Security Into Account When Migrating To The Cloud

TechTarget – Germany, By Jason Matlof,EVP & Chief Marketing Officer, LightCyber
IT security is often based on approaches that emerged before the cloud era. In the case of cloud migration, new attack vectors must be observed.

For many companies, the migration of their data into the cloud has been a topic for many years: the idea of moving away from hardware-intensive infrastructures with their own data centers to software-based methods is no longer a future trend.
>> Read the full German article

December 2, 2016

Artificial Intelligence In The Workplace: Timesaving, Chatbots & Security

IDG Connect, By Nicholas Fearn
Artificial Intelligence is a buzzword that is impossible to ignore in the world of technology. However, not all talk about the area has been positive.
Many believe that, in the foreseeable future, AI computer systems will match human intelligence and may even be better at certain tasks. This introduces the fear that the technology could even replace mankind.
>> Read the full article
December 1, 2016

Identity Theft Among Deceased Family Members Is Increasing

TheStreet, By Ellen Chang
Fraudsters are expanding their network of stealing identities and are increasingly targeting deceased individuals to commit fraud such as opening credit card applications.

Cyber criminals are focusing on this group of people to perpetrate fraud, because after a death, people’s identities often remain on mortgages or car loans for a while. Fraudsters are creating “zombie identities,” and the theft occurs often quickly afterwards by focusing on retailers, health care and insurance companies, government agencies and financial institutions.
>> Read the full article

December 1, 2016

To Solve The Data Breach Crisis, It’s Time To Look Within Ourselves

Data Economy – UK, By Alex Moyes, UK Country Manager, LightCyber
Opening Data Economy’s special end-of-year blogroll, Alex Moyes, UK Country Manager at LightCyber, blogs about data breaches which have become an epidemic.

After so many monumental data breaches in 2016, you are probably questioning why the security industry cannot seem to overcome this problem and start stemming the tide of headline after headline of loss, humiliation and damage.
>> Read the full UK article

December 1, 2016

Holiday Shoppers Should Avoid Store Credit Cards

The Street, By Ellen Chang
Gravitating toward retail credit card offers during the holiday season is a popular undertaking, but while these cards offer alluring discounts, the hidden costs can wind up regrettable.

On Black Friday alone, consumers open an average of 500,000 store credit cards, said Torsten Slok, chief international economist of Deutsche Bank Securities, in a research note. Since the recession, the average balance on retail credit cards has continued to increase and is currently at $332.
>> Read the full article

November 30, 2016

CATS Event 2016: HTW Students Simulate Hacker Attacks

datensicherheit – Germany, By Keine Kommentare
Community event of the HTW Berlin and LightCyber on 30 November 2016 in Berlin

[datensicherheit.de, 30/11/2016] In the first edition of “Cyber Attack Training System” (CATS) in Berlin learned committed young men and women of various courses of the HTW Berlin on November 30, 2016 as attackers thinking and their attack methods to simulate and the findings for prevention measures and the development of better security architectures.
>> Read the full German article

November 28, 2016

Organizations Are Beginning To “Realize That The Threats Are Serious And Not Children’s Games”

People & Computers – Israel, By Yossi Tony
“Only in the past three or four years managers in organizations have begun to realize and internalize that cyber threats create problems for human society and that it is not a childrens’ games,” said Gonen Fink, CEO of LightCyber.
For years, Fink said, “cyber threats were perceived as a war between the geeks, even though it is no longer so. In recent years, technological assault, which were used by states and intelligence agencies, flowed to the private sector and anyone can make use of these – and many actually do so. Thus, A report published in the UK, showed that for the first time more than half of the incidents of crime were digital. This is not surprising given that most of the world’s information assets have moved there.”
>> Read the full Israeli article
November 28, 2016

Breaking (Known) Bad

techspective, By David Thompson, Senior Director of Product Management, LightCyber
The last 20 years of security have been based on a single model that has changed very little over the years. The model still has its place and serves an important purpose. On the other hand, the security market has grown too reliant on this model—almost like a drug addiction—to the exclusion of new thinking and approaches that are better suited for the challenges all organizations face from internal and external attackers.
>> Read the full article
November 26, 2016

Trump Presidency: Where Does Cyber Security Go Now?

ITProPortal – UK, By Kasey Cross, Director of Product Management, LightCyber
Cyber security will undoubtedly be a big issue for the President Elect.

Given the unexpected results of the US election, it is hard to predict the future, particularly in sorting out campaign rhetoric from policy intent. In general, Trump’s pro-jobs, pro-business resolve will likely loosen constraints on companies in terms of industry regulations and taxation while supporting employee expansion and capital investments.
>> Read the full UK article

November 23, 2016
SC Magazine logo

The New Measure Of Security: Visibility

SC Magazine – UK, By Kasey Cross, Director of Product Management, LightCyber
Kasey Cross discusses the importance of having the ability to see active attackers on your network at work.

Given the magnitude of the data breach problem and the escalating costs and coming penalties, one value you must insist on from your security infrastructure is visibility. In particular, it’s critical to have an ability to see an active attacker at work on your network.
>> Read the full UK article

November 16, 2016
Gov Con Executive logo

LightCyber Names 3 Members of New Advisory Board; Gonen Fink Comments

Gov Con Executive, By Jay Clemens
Behavioral attack detection company LightCyber has formed an advisory board consisting of Timothy Murphy, president of Thomson Reuters’ special services unit; Dave Shackleford, an analyst at SANS Institute; and Amir Orad, CEO of Sisense.LightCyber intends for the advisory board to pursue new market opportunities and advise the company on the technical aspects of the business, LightCyber said Tuesday.
“Our new advisory board has broad experience and reach into the cyber security industry and is helping us usher this new era of security analytics into the market,” said Gonen Fink, CEO of LightCyber.
>> Read the full article
November 16, 2016
TheStreet logo

As Hacking Incidents Rise, Cybersecurity to Remain a Priority Under Trump

TheStreet, By Ellen Chang
Cybersecurity will remain a priority under the new Donald Trump administration although comments about mass surveillance and internet privacy during his campaign remain troubling among information security experts.The reason that dramatic changes will not occur under the new administration is because fundamental vulnerabilities remain in both the public and private sectors, said Joram Borenstein, a vice president of marketing of NICE Actimize, a New York-based financial crimes software solutions provider.
>> Read the full article
November 11, 2016
IT Zoom DE logo

Discover Behavior-Based Network Attacks

IT-Zoom – Germany, By David Thompson, Sr. Director of Product Management, LightCyber

Preventive security precautions can not prevent network attacks one hundred percent. Penetration testers even claim to be able to penetrate successfully within two days. Prevention is still necessary, but in the long run this will not be enough to stop an attacker.
>> Read the full German article
November 10, 2016
Digital Watchdog DE logo

Smart Defense

IT Security – Germany, By Uwe Sievers
In the fight against cybercriminals, the artificial intelligence (AI) comes with impressive successes. Many products are already on the market.Today, computer systems can detect traffic irregularities and alert them. In the future, they could block security holes.
>> Read the full German article
October 21, 2016
Forbes logo

The Election Can’t Be Rigged, But It Can Be Influenced

Forbes, By Tony Bradley, Contributor
One of the two major candidates running for President seems to have already accepted defeat and moved straight to whining and assigning blame with claims that the election is rigged. The reality—whether we’re talking about an enemy nation-state hacking election results, a coordinated effort to cast fraudulent votes in the election, or simply the perceived media bias stacking things in favor of one candidate over the other.
>> Read the full article
October 19, 2016
Global Security Magazine - UK logo

PDX Protects Health Data From Cyberattacks With LightCyber Behavioural Attack Detection

Global Security Magazine – UK, By Marc Jacob
LightCyber announced that PDX has selected the LightCyber Magna™ Behavioural Attack Detection platform to proactively protect customer privacy and patient information. The solution provides PDX with visibility to see the operational activities of a potential attacker and curtail a data breach or prevent damage. Adding these detection capabilities puts PDX at the forefront of the healthcare market for its advanced security to protect the information and trust of its customers and the fidelity of its business.
>> Read the full UK article
October 17, 2016

Can the Data Centre be Defended from a Data Breach?

Computer Business Review – UK, By Kasey Cross, Solutions Manager, LightCyber
Are data centres at risk of a data breach?

If headlines fully reflect reality, the odds are rather poor that a data centre can be fully protected from a data breach. A study from Lloyd’s shows that over 90% of European companies have suffered a data breach at some point over the past five years. Even at the broadly focused World Economic Forum held early this year, cybercrime was regarded as one of the greatest threats to business around the world.
>> Read the full UK article

October 14, 2016

LightCyber’s Jason Matlof Explains how Magna Detects Hackers Before They Attack

AI Business, By Staff Writer
AI Business recently did an interview with LightCyber’s Executive Vice President, Jason Matlof about how they use machine learning to detect hackers prior to an attack.

Founded by cyber warfare experts, LightCyber is established to help security analysts answer the question: Would you know if an active attack was underway in your network? According to LightCyber’s Website : “their new approach to cyber security is a result to growing volumes of data breaches that confirm that it is impossible to prevent 100% of intrusion attempts towards ones network.
>> Read the full article

October 14, 2016
Compare the Cloud logo

Battlefield Cloud

Compare the Cloud, By Staff Writer
The irresistible shift to cloud infrastructure has been accompanied by a certain amount of fear and uncertainty. Part of the reluctance has been a sense of “who is minding the shop” and a concern over the lack of visibility and control. In one sense, cloud data centre infrastructure is potentially more secure than private infrastructure, as it may be maintained by a large, specialised team with potentially greater expertise that can attend to security issues that arise.
>> Read the full article
October 14, 2016
Pro Security Zone logo

Behavioural Profiling Distribution Network Established In UK

Pro Security Zone – UK, By Staff Writer
LighCyber has established a distribution network of value added resellers within the UK for its behavioural profiling and machine learning system for attack mitigation LightCyber has signed four value-added resellers – Cygnia, Pentesec, Satisnet and SJG Digital – to deliver its award-winning Magna products to the UK market, with scope to add a few more before the end of the year. LightCyber’s technology combines full network visibility with machine learning, allowing organisations to detect an attacker that might otherwise be invisible to the security team.
>> Read the full UK article
October 14, 2016
Comms Business UK logo

LightCyber Signs New UK Partners

Comms Business – UK, By Staff Writer
LightCyber has signed four value-added resellers – Cygnia, Pentesec, Satisnet and SJG Digital – to deliver its Magna products to the UK market, with scope to add a few more before the end of the year. LightCyber’s technology combines full network visibility with machine learning, allowing organisations to detect an attacker that might otherwise be invisible to the security team.
>> Read the full UK article
October 14, 2016
Tech From The Net logo

Aditinet Consulting And LightCyber, Allies Against The Data Breach

Tech From The Net – Italy, By Editorial Staff Writer
Aditinet Consulting has signed an important partnership with LightCyber , company of reference in the field of security solutions based on the Behavioral Attack Detection.LightCyber, active in Italy since June 2016 with an offer of Behavioral Attack Detection solutions, it is able to provide thorough and efficient visibility of safety, in case of attacks that exceed the traditional protection controls. Quickly identify the attacks it allows companies to avoid dangerous “data breach” and therefore prevent its consequences. Security is an increasingly important aspect in the company and it is necessary to ensure the protection not only of users and workstations, but also the network perimeter to avoid unwanted and dangerous accesses.
>> Read the full Italian article
October 12, 2016
Z ChannelBiz - UK logo

Four UK VARs Take A LightCyber To Growing Security Threats

Z ChannelBiz – UK, By Antony Savvas
Cygnia, Pentesec, Satisnet and SJG Digital have all signed with LightCyber, and are expected to be joined by others LightCyber, a behavioural attack detection solutions vendor, has signed four UK VARs to push its Magna products.Cygnia, Pentesec, Satisnet and SJG Digital have all signed with LightCyber, and are expected to be joined by others before the end of the year, said LightCyber.
>> Read the full UK article
October 12, 2016
Response Source Logo

LightCyber Announces New UK Channel Partners, Delivering Behavioural Attack Detection to Stop Costly Data Breaches

Response Source – London, UK
LightCyber, a leading provider of Behavioural Attack Detection solutions, today announced that it has signed four value-added resellers – Cygnia, Pentesec, Satisnet and SJG Digital – to deliver its award-winning Magna products to the UK market, with scope to add a few more before the end of the year.
>> Read the full UK article
September 29, 2016
IT Pro Portal Logo

Q&A: Cloud Security Requires A Proactive Approach

ITProPortal, By Sam Pudwell
We recently spoke to David Thompson, Senior Director of Product Management at LightCyber, about what businesses need to be aware of in the world of cloud security.1. What’s the current state of play for cloud security?
As an infrastructure, cloud may be potentially more secure than what companies are able to achieve in their own self-run data centres. At the same time, a public cloud data centre offers a number of places for a network intruder to hide and orchestrate a data breach or some other malicious activity.
>> Read the full article
September 27, 2016
CSO From IDG Logo

Signs Of Cloud Security Hacks Are There If You Know What To Look For

CSO – Online, By David Braue
Monitoring of cloud activities should be incorporated into business-focused security KPIs.Cloud-based workloads may be configured and used for different scenarios than on-premises servers, but the process of picking out cybercriminal activity is not so far removed, according to a senior security executive who notes that telltale signs of penetration are there if you know where to look.
>> Read the full article

>> Click any of the following journal logo images to read related article:

MIS Asia Logo   Network World Logo   CSO IDG Logo   PC World IDG Logo   IDG Connect Logo   t Logo

September 19, 2016
Data Economy Logo

How To Combat The Data Breach Crisis In The Public Cloud Data Centre

Data Economy, By Lima João Marques Lima
David Thompson from LightCyber argues that operational activities are the key to bring down the vast majority of attacks in the data centre.Enterprises worldwide are making the move to cloud environments as their digital transformation strategy becomes under pressure to meet the requirements of the digital economy.

According to Cisco, public cloud data centres will account for nearly 155 million workloads by 2019, outnumbering the number of workloads sitting in private cloud hubs.
>> Read the full article

September 11, 2016
@CloudExpo Journal Logo

Prescribing Good to Find Bad Activity on Health Networks

@CloudExpo Journal, By David Thompson, Sr. Director of Product Management, LightCyber
In today’s challenging security world, it’s important to understand that attackers regularly target healthcare networks.The hype around data breaches in the health industry may seem commonplace and cause complacency. Last year, it was Anthem and Premera Blue Cross suffering attacks affecting nearly 90 million people combined.
>> Read the full article
September 1, 2016
IProPortal Logo

Are company secrets a thing of the past?

ITProPortal, By Jason Matlof
Most companies run on secrets. If plans, intellectual property, confidential emails, minutes from Board or executive meetings and financial details were fully available to competitors or the general public, how could a firm stay in business?
>> Read the full article
August 30, 2016
Info Week Dark Reading Logo

Meet Some Of The Emerging Israeli Cybersecurity Firms

DarkReading, By Sara Peters
Many are borne out of the entrepreneurial spirit of the Israel Defense Force’s Cyber Intelligence Unit 8200. Could any other nation keep up?
>> Read the full article
August 29, 2016
SC Magazine Logo

Ransomware stops here – preventing network-wide ransom attacks

SC Magazine, By Kasey Cross
Over half of all UK companies have been hit by ransomware in the past twelve months, and nine percent were left “entirely unable to operate,” according to an August 2016 report from Osterman Research. Clearly ransomware is not just a flesh wound, and its ramifications can be staggering.
>> Read the full article
August 26, 2016
CSO Online Logo

Industry Watch – September 2016

Health Management Technology, By HMT Mag
How does your hospital’s Wi-Fi use compare to other healthcare facilities? Results from a new survey conducted by Extreme Networks should give you a clue.
According to a poll of more than 100 hospital healthcare IT professionals from around the world, the top concern for Wi-Fi implementations is security/compliance (34 percent), followed by performance (28 percent), critical availability (19 percent), and coverage (14 percent).
>> Read the full article
August 25, 2016
HelpNetSecurity Logo

Stolen Devices To Blame For Many Breaches In The Financial Services Sector

HelpNetSecurity – EMEA, By Mirko Zorz, Editor in Chief
Bitglass performed an analysis of all breaches in the financial services sector since 2006, with data aggregated from public databases and government mandated disclosures. They found that leaks nearly doubled between 2014 and 2015, a growth trend on track to continue in 2016.
>> Read the full EMEA article
August 25, 2016
Dark Reading Logo

The Secret Behind the NSA Breach: Network Infrastructure Is the Next Target

Dark Reading, By Yoni Allon
How the networking industry has fallen way behind in incorporating security measures to prevent exploits to ubiquitous routers, proxies, firewalls, and switches.Advanced attackers are targeting organizations’ first line of defense–their firewalls—and turning them into a gateway into the network for mounting a data breach. On Aug. 13, the shady “ShadowBrokers” group published several firewall exploits as proof that they had a full trove of cyber weapons.
>> Read the full article
August 24, 2016
EMA Blogs Logo

Effective Security Requires a Change in Mindset and the Protection Paradigm

EMA Blogs, By David Monahan
Nearly every day another successful breach is reported. In 2016 alone, organizations from major governmental agencies such as the IRS and Department of Defense, to major retailers including Wendy’s, have succumbed to attack. These organizations are not alone; every major business and governmental sector has been compromised.
>> Read the full article
August 24, 2016
SC Magazine Logo

French Submarine Builder DCNS Suffers Data Breach

SC Magazine – UK, By Roi Perez, Community Manager
22,000 documents have leaked from French shipbuilder DCNS which is building submarines for the Indian navy.French ship builder DCNS has suffered a data breach, and as a result has lost 22,000 documents which show the combat capabilities of the Scorpene-class submarines which it builds.
>> Read the full UK article
August 19, 2016
CSO Online Logo

The state of security? No one cares about a breach

CSO Online, By CSO staff
For their 2016 Cyber Weapons Report security startup LightCyber used network analysis to understand what tools hackers use “to expand their footprint,” that is, the tools they use to communicate with command and control servers, gain access privileges, and access new hosts.
>> Read the full article
August 19, 2016
HelpNet Security Logo

The state of security? No one cares about a breach

HelpNetSecurity
In an election year, everyone asks the question about whether or not you are better off than you were four years ago. There are many ways to answer such a question, and various people make arguments from various angles and data points.
>> Read the full article
August 16, 2016
CIODive.com logo

Can Secrets Stay Secret Anymore?

CIODive.com, By Gonen Fink, Chief Executive Officer of LightCyber
Every company has secrets, things not meant to be broadcast to the entire world. In the age of WikiLeaks and Snowden, secrets have gained a negative reputation, but many are necessary and important.Companies need to guard their intellectual property or face swift extinction in a competitive market.
>> Read the full article
August 9, 2016
Information Week Dark Readings Logo

The tools used in detecting intrusions can lead to an overwhelming number of alerts, but they’re a vital part of security.

Dark Reading, By Giora Engel
Traditional security used to be focused exclusively on prevention and policy enforcement.
>> Read the full article
August 8, 2016
pro-health

Healthcare organizations can improve their stance against being affected by ransomware under new software integration to detect and eliminate threats

Pro Health Service Zone, By Staff Writer
LightCyber and Ayehu Software Technologies have announced an integration between the LightCyber Magna platform and the agentless Ayehu eyeShare product to both detect the attempted network spread of ransomware and automatically quarantine the affected computers, shutting down the attack.
>> Read the full article
August 3, 2016

AI In Cyber-Security – Are We Trying To Run Before We Can Crawl?
PC & Tech Authority – UK, By Roi Perez
Intelligent and automated systems are currently being touted as the next step in cyber-security to help combat the ‘always-on’ cyber-criminal, but are they right for us? And are we prepared for them?While walking around the larger industry shows, those hosting say more than 140 vendors, it doesn’t take long to realise that artificial intelligence and machine-learning are the current ‘it’ girls of the cyber-security industry.
>> Read the full UK article
August 3, 2016

Old Tech Can Create New Security Woes
Tech News World, By John P. Mello Jr.
“Patch your systems in a timely manner” is a mantra of security experts, but what happens when the patch well runs dry because a product’s maker no longer supports it? That is a situation many large enterprises find themselves in, and it’s one that poses security risks.Between 30 percent and 50 percent of the hardware and software assets in the average large enterprise have reached their end-of-life date, according to aBDNA report released last month.
>> Read the full article
August 2, 2016

CRN Magazine Named Gonen Fink To Its List Of CRN Top 100 Executives 2016
CRN, By Staff Writer
Gonen has also been named to the “Top 25 Disruptors 2016 list” within the Top 100 Exec list.Gonen Fink launched security startup LightCyber three years ago and since then has brought in $32 million in funding, including a $20 million Series B funding round in June. The 100 percent channel-sales company offers a ground-breaking breach detection platform that works to smoke out hackers already inside of the environment.
>> Read the full article
August 2, 2016

New LightCyber And Ayehu Integration Stops Network Spread Of Ransomware
Global Banking Finance Review, By David Thompson Sr. Director of Product Management, LightCyber
LightCyber, a leading provider of Behavioural Attack Detection solutions and Ayehu Software Technologies, a leading provider of enterprise-grade automation and orchestration solutions for IT and cyber security incident response automation, has announced an integration between the LightCyber Magna platform and the agent less Ayehu eyeShare solution to both detect the attempted network spread of ransomware and automatically quarantine the affected computers, shutting down the attack.
>> Read the full article
July 21, 2016

Malware Is Not The Answer
Digitalisation World – UK, By Kasey Cross, Sr. Product Manager, LightCyber
If your organisation hasn’t suffered a breach in the past twelve months, consider yourself lucky. A UK Government survey released earlier this year claims that two-thirds of big businesses have been breached this year. The survey, in a forward provided by Ed Vaizey, the Digital Economy minister, notes, “Too many firms are losing money, data and consumer confidence with the vast number of cyberattacks. It’s absolutely crucial businesses are secure and can protect data.”
>> Read the full UK article
July 20, 2016

C-Level Briefing: LightCyber EVP Jason Matlof And Other Cyber Security Experts Talk Known Threats And Firewall Shortcomings
Important Industry Information Index – China, By Staff Writer
For decades, cyber security has been built around the idea that once the attackers have breached your network or organisation, it’s game over. But what if it isn’t?
Mostly the products offered by the cyber security industry have been designed with this idea in mind: keep the attackers out. As Jason Matlof, Executive Vice President at LightCyber, says, the attacker being inside the network isn’t game over.
>> Read the full China article
July 19, 2016

Behavioural Attack Detection: Why A Cyber Breach Isn’t Game Over For Your Business
Computer Business Review – UK, By Staff Writer
C-level briefing: LightCyber EVP Jason Matlof and other cyber security experts talk known threats and firewall shortcomings.For decades, cyber security has been built around the idea that once the attackers have breached your network or organisation, it’s game over. But what if it isn’t? Mostly the products offered by the cyber security industry have been designed with this idea in mind: keep the attackers out.
>> Read the full UK article
July 18, 2016

Study: When It Comes To Cybersecurity, IT Is Too Obsessed With Malware
The VAR Guy, By Kris Blackmon
The Cyber Weapons Report 2016 details other threats we should be worried about.LightCyber’s new report reveals IT administrators need to stop obsessing over malware and mount a more well-rounded defense against hackers. Network security provider LightCyber recently released Cyber Weapons Report 2016, an industry study that reveals the top tools attackers use to tunnel into a system after network penetration and execute a data breach.
>> Read the full article
July 13, 2016

Shlomo Kramer: A Security Investor Looking For Smart Entrepreneurs To Disrupt Markets
Network World, By Tim Greene
Recently, behavioral-analytics startup LightCyber announced a second round of funding – $20 million – including an investment from an individual investor with an impressive track record backing successful security startups: Shlomo Kramer.Kramer, who is Israeli, has a long-term relationship with the company’s CEO Gonen Fink, who worked with him for years at Check Point Software where Kramer was one of the founders.
>> Read the full article
July 11, 2016

She Blinded Me with Data Science: Why Machine Learning Varies Broadly for Network Security
Bobs Guide, By David Thompson, Sr. Director, Product Management, LightCyber
One great promise machine learning holds for the network security industry is the ability to detect advanced and unknown attacks, particularly those leading to data breaches. Unfortunately, machine learning is quickly becoming a popular marketing term and vendors use it in very different ways, thus obscuring whether real benefits are being introduced. Instead of arguing the basic jargon, it’s time to better define what machine learning can accomplish and why one would care.
>> Read the full article
July 6, 2016

Most Post-Intrusion Cyber Attacks Involve Everyday Admin Tools
threat post, By Tom Spring
Think hackers use advanced malware and mysterious tools once they have infiltrated a network? According to security startup LightCyber, most attackers use the same mainstream security tools the good guys use, only for lateral movement, network mapping and remote control of endpoints.Of course, tactics for penetrating the network include tried-and-true techniques such as malware, spear phishing and exploit kits, but once inside, the best way to go unnoticed is to blend in. According to a LightCyber 2016 Cyber Weapons Report, 99 percent of post-intrusion cyberattack activities did not employ malware, but rather admin, networking and remote access tools.
>> Read the full article
July 5, 2016

Cyber Systems Overlooking How Attackers Actually Work, Says Study
Acumin – UK, By Staff Writer
Most cyber defence systems and strategies fail to factor in how attackers reallyoperate, reveals a recent report.Most businesses place an emphasis on malware detection. However, attackers are not being detected due to the tools falling under the category of legitimate, standard software, finds LightCyber Cyber Weapons 2016. Although they do use malware in their attacks, the report found that hacking plays a more significant role in making threats.
>> Read the full UK article
July 5, 2016

Attackers Use Networking Tools For Data Breach
MIS Asia, By Anuradha Shukla
Almost all (99 percent) post-intrusion cyberattack activities don’t employ malware, but leveraged standard networking, IT administration and other tools, according to Cyber Weapons Report 2016. These tools are used by attackers on a directed or improvisational basis. They use it to penetrate a network and work towards successfully conducting a data breach or other malicious goals. All these common networking tools enable attackers to conduct “low and slow” attack activities while avoiding detection. Sophisticated attackers using these tools are said to work undetected for an average of five months.
>> Read the full Asia article
July 5, 2016 Cyber Weapons: Know your Enemy
Telecom Trends, by Mark Goldberg
Last week, LightCyber released its “2016 Cyber Weapons” report, a study that discusses the top tools attackers use once they penetrate a network. According to the LightCyber study, “it turns out that once attackers gain access to a network, the vast majority of activity makes use of benign processes and tools, not malware.”
>> Read the full article
July 5, 2016

Studie Angriffstechniken im Cyberraum:Das Handwerkszeug der Hacker
(Study Attack Techniques In Cyber Space: The Tools Of Hackers)

Funkschau – German, By Axel Pomper
Light Cyber presents the Cyber Weapons Report 2016, the most widely used tools by cybercriminals. The studies show that not resort in 99 percent of cases, the attackers after penetration of networks for malware to undermine and scanning of networks.Usually hackers use standard programs for security breaches and information theft. Administration tools and network programs are used after the attacker has gained access to the network unnoticed.
>> Read the full German article
July 5, 2016

Attackers Use Networking Tools For Data Breach
ComputerWorld – Philippines, By Anuradha Shukla
Almost all (99 percent) post-intrusion cyberattack activities don’t employ malware, but leveraged standard networking, IT administration and other tools, according to Cyber Weapons Report 2016.
These tools are used by attackers on a directed or improvisational basis. They use it to penetrate a network and work towards successfully conducting a data breach or other malicious goals.
All these common networking tools enable attackers to conduct “low and slow” attack activities while avoiding detection.
>> Read the full Philippines article
July 5, 2016

Attackers Use Networking Tools For Data Breach
CIO Asia, By Anuradha Shukla
Almost all (99 percent) post-intrusion cyberattack activities don’t employ malware, but leveraged standard networking, IT administration and other tools, according to Cyber Weapons Report 2016. These tools are used by attackers on a directed or improvisational basis. They use it to penetrate a network and work towards successfully conducting a data breach or other malicious goals. All these common networking tools enable attackers to conduct “low and slow” attack activities while avoiding detection.
>> Read the full Asia article
July 5, 2016

Die beliebtesten Hacker-Tools
(The Most Popular Hacker Tools)

Com! Professional – DE, By Jens Stark
What tools are most commonly used by cybercriminals? The “Cyber Weapons Report” of Light Cyber shows that this is known tools, their abuse is more difficult to discover.In his Cyber Weapons Reports 2016 Light Cyber shows, a provider of Behavioral Attack Detection, the most frequently used tools of cybercriminals on. It is noticeable that hackersmainly use well-known networking and administration tools and malware that obviously plays a subordinate role. Pests are loud Light Cyber as an aid in breaking into the network, but do not come more used to the intrusion.
>> Read the full German article
July 4, 2016

Malware Isn’t The Problem – It’s The Legitimate Tools You Should Be Worried About
Security Brief Asia, By Sara Barker
Forget malware – once attackers are inside your system, 99% of post-intrusion internal attacks originate from leveraging riskware such as network scanners and legitimate applications, according to a new industry study by LightCyber.More than 70% of targeted malware is used on one site in the initial compromise, but once in, attackers used IP and port scanners such as Angry IP scanner which accounted for 27.1% of attacks, and network discovery tools such as Nmap, the report states.
>> Read the full Asia article
July 4, 2016

Les logiciels malveillants? Essentiellement pour s’infiltrer
(Malware? Only for Intrusion)

LeMagIT – French, By Valery Marchive, Associate Editor
What emphasize the value of the in-depth detection to flush out criminals after their intrusion.The attackers eventually would have relatively little use of malware: essentially, they would rely on perfectly legitimate logicels. At least that is the assertion LightCyber, one of the behavioral analysis specialists applied to the security, in a new study.
>> Read the full French article
July 1, 2016

Cybercrimineel werkt net als een netwerkadmin
(Cyber Criminal Acts As A Network Admin)

AutomatiseringGids – Dutch, By Staff Writer
Cyber criminals seem surprising to proceed after they have access to a network.
After a successful digital break-in shows 99 percent of the cyber criminals to close their toolbox with malware. To achieve their perfidious goals, they get hold of the management tools that use the majority of IT managers. This somewhat surprising conclusion comes from research by LightCyber, an Israeli-American start-up in IT security.
>> Read the full Dutch article
July 1, 2016

InfoWorld Logo

Once Inside A Network, Hackers Ditch Malware
InfoWorld, By Fahmida Y. Rashid, Senior Writer
Cybercriminals don’t need fancy tools or tricks to carry out their attacks. Legitimate IT tools are just as effective.Security company LightCyber found in a recent analysis of attack activity data gathered from customers that while attackers may use malware to gain a foothold on the network, they rely on stolen credentials and standard networking and IT administration tools, remote desktop applications, and penetration testing software to move laterally across the network.
>> Read the full article
July 1, 2016

IProPortal Logo

Once Inside A Network, Hackers Ditch Malware
ITProPortal, By Sead Fadilpasic, Contributor
Cyber-criminals don’t usually use malware once they’re already inside a network, a new study suggests.Instead, they use standard networking, IT administration and similar tools, as they look to first map the network they’ve penetrated and look for resources and vulnerabilities.
>> Read the full article
July 1, 2016

Tech Central Irish Logo

Attackers Rely On Legit IT Tools To Carry Out Plans
TechCentral.ie Irish, By Staff Writer
Cybercriminals do not need fancy tools or tricks to carry out their attacks. Legitimate IT tools are just as effective.Security company LightCyber found in a recent analysis of attack activity data gathered from customers that while attackers may use malware to gain a foothold on the network, they rely on stolen credentials and standard networking and IT administration tools, remote desktop applications, and penetration testing software to move laterally across the network.
>> Read the full Irish article
June 30, 2016

SecurityWeek Logo

Hackers Turn Our Tools Against Us
Government Computers News, By Stephanie Kanowitz
The tools hackers commonly use after penetrating a network often do not involve malware, according to a new report.Although malware is often used to gain access to a network, 99 percent of post-intrusion cyberattack activities used standard networking and IT administrative tools – not malware, according to LightCyber’s 2016 Cyber Weapons Report, released June 29. More than 70 percent of active malware detected was found only on a single site, indicating that “attackers create target-specific variants to completely bypass signature-based prevention,” according to the report.
>> Read the full article
June 29, 2016
ComputerWeekly.com UK Logo


Most Cyber Security Strategies Ignore The Way Attackers Really Work

ComputerWeekly.com – UK, by Warick Ashford, Security Editor
Cyber attackers use more legitimate software than malware, which means most organisations are incapable of detecting much of the malicious activity in their networks, a report reveals. Most organisations focus on detecting malware, but attackers are going undetected because most of the tools they use are standard, legitimate software, according to LightCyber’s Cyber Weapons 2016 report.

>> Read the entire UK article

June 29, 2016

CRN-DE - German Press Logo

Expansion Of Sales Activities In The DACH Region: LightCyber Launches Partner Program
CRN DE – German Press, By Daniel Dubsky
For several months Light Cyber active in the DACH region and has won, among others, and cirosec Econix first partner for the distribution of its solutions to behavioral detection of cyber attacks.Now brings his security provider “Light Cyber Channel Alliance Program” in Germany, Austria and Switzerland at the start, to expand the partner base. It offers sales and technical training and certification also discounts for registered deals as well as NFR devices that evaluations can be carried out at customers.
>> Read the full German article
June 29, 2016

SC Magazine Logo

Top 10 Cyber-Weapons; Weaponised IT The Preferred Attack Vehicle Once Inside
SC Magazine – UK, By Tony Morbin, Editor-in-chief
The Cyber Weapons Report 2016 from LightCyber Inc issued today catalogues the top ten weapons used in various categories of cyber-attack, however its main thrust is that once an attacker is on your system, they rarely use malware and what you need to monitor is anomalous behaviour using legitimate tools.
In fact the report says that 99 percent of internal, east-west reconnaissance and lateral movement in the sample covered did not originate from malware, but from legitimate applications or from riskware such as scanners.
>> Read the full UK article
June 29, 2016

SecurityWeek Logo

Hackers Use Basic Tools After Breaching Your Network
SecurityWeek, By SecurityWeek News – Staff Writer
Standard Tools Leveraged in 99% of Post-Intrusion Activities: ReportAs it turns out, attackers use standard networking, administration and other tools in most post-intrusion activities, and not malware, a recent report from behavioral attack detection provider LightCyber reveals.
>> Read the full article
June 29, 2016

Information Week Dark Readings Logo

Legit Tools Helping Attackers Hide Malicious Activity, Study Finds
InformationWeek DarkReading, By Jai Vijayan
Malware often just used only for initial break-in, LightCyber report says.
Contrary to popular perception, cyber attackers rarely rely on malware after an initial intrusion to carry out their data exfiltration, surveillance, and other malicious campaigns on target networks.
>> Read the full article
June 29, 2016

Infosecurity Magazine Logo

Malware’s Role: Wildly Overstated as an Info-Stealing Tool
Infosecurity Magazine, By Tara Seals, US/North America News Reporter
Malware’s use in prolonged and persistent cyber-attacks has been wildly overstated, according to a recent report.LightCyber’s Cyber Weapons Report 2016 found that while malware is the go-to tool for the initial compromise of a network, almost all (99%) of post-intrusion cyberattack activities use standard networking, IT administration and other tools to get the job of exfiltration, snooping and sabotage done.
>> Read the full article
June 28, 2016

Z ChannelBiz Logo

Security Vendor LightCyber Wants To Build A Channel Alliance Program In DACH Dealer Network
Z CHannelBiz – Germany DACH, By Dr. Jakob Jung
The LightCyber Channel Alliance Program™ offers you an exceptional revenue opportunity, with all the support you need to provide an unmatched attack detection and response solution to your customers. A simple setup with technical, sales, and marketing support can help you meet your business goals and expand your service offerings quickly, helping your customers stop attacks before any serious damage is done.
>> Read the full German article
June 28, 2016

IT Reseller Magazine Logo

LightCyber Launches New Channel Alliance Program
IT Reseller – Swiss Magazine, By Staff Writer
The new program of Light Cyber for the DACH region includes training, tools and certification opportunities for channel partners.Light Cyber has introduced its new security channel partner program. The program is designed to provide channel partners in the DACH region training about for sales department and technical sales engineers with skills testing and certification, an online laboratory for simulating targeted attacks and interpretation of indicators, comprehensive tools and certification opportunities.
>> Read the full Swiss article
June 24, 2016

Inc Brand View Logo

5 Strategies That Helped 2 Israeli Startups Raise $166 Million
Inc. – Peter S. Cohan & Associates, By Peter Cohan
With no natural resources and a challenging security situation, it’s no surprise that Israeli startups are good at information security and managing. Here’s how tow of them have grown and attracted capital.
>> Read the full article
June 22, 2016

Wall Street Journal Logo

LightCyber Raises $20M to Detect Intruders
The Wall Street Journal, By Cat Zakrzewski
LightCyber Ltd. raised $20 million in Series B funding to help companies detect active cyberattackers. Claltech, the Israeli arm of Access Industries, and cybersecurity veteran Shlomo Kramer led the round. Existing investors Battery Ventures, Glilot Capital Partners and Amplify Partners also participated.
>> Read the full article
June 22, 2016

CRN Logo

LightCyber Lands $20M Series B Funding, Looks to Pump up Marketing, Channel Partners
CRN, By Sarah Kuranda
LightCyber, a security startup focused on the behavioral attack detection market, has landed $20 million in Series B funding. The funding round was led by Access Industries and investor Shlomo Kramer. Battery Ventures, Glilot Capital Partners and Amplify Partners also participated, the company said Wednesday.
>> Read the full article
June 22, 2016
New Geektime logo
Israeli LightCyber slashes through security alerts with a $20M Series B
Geektime, By Gabriel Avner
Geektime LightCyber’s Magna product uses machine learning to build a fuller picture of how a network should look, and pinpoint real anomalies that can indicate a breach.
>> Read the full article
June 22, 2016

Silicon Angle Logo

Security Startup LightCyber Nabs $20M To Boost Network Protection Teams
Silicon Angle, By Maria Deutscher
Barely a week seems to pass nowadays without a security startup raising capital. The newest example is LightCyber Ltd., an emerging network protection provider born in Israel that today announced the completion of a $20 million funding round. The investment was led by industrial conglomerate Access Industries Inc. and Shlomo Kramer, a serial entrepreneur best known for co-founding Check Point Software Technologies Ltd.
>> Read the full article
June 22, 2016

Silicon Valley Business Journal Logo

Cybersecurity Startup LightCyber Raises $20M For Expansion
Silicon Valley Business Journal, By Gina Hall, Contributor
Cybersecurity startup LightCyber raised $20 million in funding Wednesday to use behavioral analytics to secure networks.Access Industries led the Series B round through its Israeli technology investments entity, Claltech. Existing investors Battery Ventures, Glilot Capital Partners, Amplify Partners and Cato Networks CEO Shlomo Kramer also participated in the fundraising. Claltech CEO Daniel Shinar will join LightCyber’s board of directors with the investment. The company has raised more than $36 million to date.
>> Read the full article
June 22, 2016

TechCrunch Logo

LightCyber lands $20 million Series B to secure networks using behavioral analytics
TechCrunch, By Ron Miller
TechCrunch Every network is under siege these days as attackers search for a way in. The industry lingo calls them attack vectors, but that just means a hacker finds a weak link in the network and exploits it. Once they’re in they begin to do damage, but in doing so, they behave in ways that might be out of the ordinary coming from that particular machine.
>> Read the full article
June 22, 2016

Xconomy Logo

LightCyber Reaps $20M To Advance Its Cyberattack Detection Services
Xconomy, By Bernadette Tansey
LightCyber, a cybersecurity company that specializes in detecting hackers once they’ve breached the outer defenses of a data network, announced today it raised $20 million in a Series B financing round.The venture round was led by Claltech, an Israeli division of New York-based global investment group Access Industries, and veteran security entrepreneur and investor Shlomo Kramer, who was a co-founder of Check Point Software.
>> Read the full article
June 17, 2016

Network World Logo

Mobile, IoT, Cloud, Security – It’s All One Family To US
Information Age Newsletter – Featured Article – UK, By Alex Alexander, Net-a-Porter’s CIO
The combined entity has major ambitions for the next wave of e-commerce and retail innovation. Yoox Net-a-Porter’s CIO, Alex Alexander, speaks to Information Age about the company’s vision for the future of luxury retail.’We are building omnichannel capabilities to provide instant visibility and stock fulfilment – but it starts with inspiration’
>> Read the full article and Newsletter
June 16, 2016

Network World Logo

Five signs an attacker is already in your network
Network World, By Kasey Cross, Senior Product Manager, LightCyber
According to some estimates, attackers have infiltrated 96% of all networks, so you need to detect and stop them before they have time to escalate privileges, find valuable assets and steal data.The good news is an attack doesn’t end with an infection or a take-over of an endpoint; that is where it begins. From there an attack is highly active, and the attacker can be identified and stopped if you know how to find them. These five strategies will help.
>> Read the full article
June 13, 2016

Pro Security Zone Logo

Finding attackers from the inside
Pro Security Zone, By Jonathan Newell, Editor
Jonathan Newell talks to Jason Matlof of LightCyber about behavioural attack detection and why this is better then adding additional layers of prevention oriented infrastructure.Preventing cyber attackers from getting into your network is certainly a strategy that can’t be ignored, every organisation should have some prevention infrastructure in place so that the network isn’t wide open to attacks but the problem remains that such preventive measures can always be breached and no matter how much money you spend on attack prevention, something will eventually get through.
>> Read the full article
June 8, 2016

CRN.DE German Logo

Behavior-Based Intrusion Detection: LightCyber Builds On European Sales
CRN DE – German Press, By Daniel Dubsky
Most security systems are focused on blocking attackers at the boundaries of the corporate network or on endpoints, but attackers always find a way in. How LightCyber solves the data breach problem by bringing a new standard for accuracy and efficiency of security that is focused on active attackers rather than malware.
>> Read the full German article
June 6, 2016

Network World Logo

Hunting In-Network Attackers Requires A Different Approach To Security
Government Computers News, By Gonen Fink, CEO LightCyber
The reality is that your network will become a target of cybercriminals, if it hasn’t already. When hackers want to get in, there is only a fraction of a chance that they won’t.No network is 100 percent protected. Perimeter security might be able to hold off 95 percent or more of attempted intrusion attacks, but complete protection is impossible. One compromised user account or successful spear phishing attack is all it takes for a network to be breached. The FBI and Gartner both fully agree on this point.
>> Read the full article
June 3, 2016

Channel Insider Logo

LightCyber Ramps Revenue Opportunities for Partners
Channel Insider, By Gina Roos
LightCyber introduces its LightCyber Technology Alliance Program… A key element of the program and new software API is facilitating the interoperability and integration of the LightCyber Magna platform with other security products and technologies, which increases the value of channel customers’ investments in their existing security solutions, said Jason Matlof, executive vice president.
>> Read the full article
June 2, 2016

Info Point Security Logo

Behavioral Attack Detection: LightCyber ermöglicht deutschen Unternehmen, Angreifer frühzeitig zu entdecken
German Press – Info Point Security, By Staff Writer
LightCyber unternimmt erste Schritte: Mit eigener Firmenzentrale für die Region, einem neuen EMEA Vice President und der neuen EU-Daten-Cloud kommt das Unternehmenauf den DACH-MarktLOS ALTOS, Kalif., and RAMAT GAN, Israel – 02. Juni 2016 – LightCyber, ein führender Anbieter von Lösungen für verhaltensbasierte Angriffserkennung, bringt seine einzigartige Lösung zur Ermittlung aktiver Netzwerkangriffe jetzt auch auf den deutschsprachigen Raum.
>> Read the full article
June 1, 2016

eSecurity Planet Logo

LightCyber Shines a Light on Real Threats
eSecurity Planet, By Sean Michael Kerner
Gonen Fink, CEO of LightCyber explains how his firm’s technology helps to solve a key missing piece of the security alert mystery.There are a lot of security vendors in the protection space with a focus on prevention of attacks, but that’s not the focus for Gonen Fink. Fink is the CEO of LightCyber and his company’s focus is on detection of real threats as opposed to just re-purposing existing security prevention technology.
>> Read the full article
May 27, 2016

LightCyber Brings Behavioural Attack Detection So That Organisations Thwart Data Breaches
VanillaPlus – UK, By Sheetal Kumbhar
LightCyber, a provider of Behavioural Attack Detection solutions, announced that it is making its unique solution for detecting active network attacks available to the UK market for the first time.Early detection of network attackers gives organisations the ability to curtail data breaches and prevent other consequences. LightCyber, with its dual headquarters in Israel and Silicon Valley, recently established its European headquarters in the Netherlands and inaugurated an EU-based cloud for its Magna Cloud Expert System to comply with the EU Data Protection Directive (Directive 95/46/EC).
>> Read the full article
May 27, 2016

TechTarget Logo

LightCyber Pursues Interoperability, Publishes APIs
TechTarget, By Spencer Smith, John Moore
LightCyber said its push toward interoperability with a broad ecosystem of security technologies will benefit partners; more IT channel news from the week.LightCyber has introduced new APIs and a program to improve interoperability between Magna, its behavioral attack detection technology, and other security products.The Technology Alliance Program launched with Hewlett-Packard Enterprise and Gigamon as partners, adding integrations with ArcSight ESM and the GigaSecure Security Deliver Platform. Additionally, LightCyber updated its previous integrations with Check Point Technologies and Palo Alto Networks.
>> Read the full article
May 27, 2016

IoT Now Logo

LightCyber Brings Behavioural Attack Detection So That Organisations Thwart Data Breaches
IoT NOW – UK, By Sheetal Kumbhar
Paul Couturier, EMEA vice president, LightCyber
LightCyber, a provider of Behavioural Attack Detection solutions, announced that it is making its unique solution for detecting active network attacks available to the UK market for the first time.Early detection of network attackers gives organisations the ability to curtail data breaches and prevent other consequences. LightCyber, with its dual headquarters in Israel and Silicon Valley, recently established its European headquarters in the Netherlands and inaugurated an EU-based cloud for its Magna Cloud Expert System to comply with the EU Data Protection Directive (Directive 95/46/EC).
>> Read the full article
May 27, 2016

LANline Logo

Behavior Analysis Detects Intruders On
German Press – LANline, By Dr. Wilhelm Greiner
In the IT security market, the focus shifts increasingly from prevention to the fastest possible detection and targeted response to a Komprimittierung of enterprise IT (Attack Detection, Incident Response). Because conventional solutions for securing the network, although like stop the majority of the attacks, they can not stop a persistent attacker permanently, one emphasizes (not only) by Light Cyber. Conventional approaches, including SIEM solutions (security information and event management) would have also proved useful in the early detection of attacks as little.
>> Read the full German article
>> Read the full English article
May 26, 2016

The Var Guy Logo

LightCyber Technology Alliance Program Allows for Security Platform Integration
The Var Guy, By Michael Cusanelli
“Behavioral attack detection solutions provider Lightcyber launched the LightCyber Technology Alliance Program (LTAP) this week, which allows partners to integrate the LightCyber Magna platform with other security products in their portfolio. LightCyber said the LTAP program and the Magna platform integration will help partners make their solution sets more valuable for customers by combining information sharing and detection solutions with traditional security measures.”
>> Read the full article
May 25, 2016

Channel Vision Magazine Logo

LightCyber Unveils Technology Alliance Program for Cybersecurity
Channel Vision Magazine, By Tara Seals
This dovetails with the release of a new software interface designed to promote swift and efficient detection and response processes by working with other security, networking, application and IT solutions.HPE and Gigamon are the first partnerships announced as part of the formalized program and new API, while Check Point Technologies and Palo Alto Networks integrations were built previously.
>> Read the full article
May 25, 2016

Global Security Magazine Logo

LightCyber Brings Behavioural Attack Detection so UK Organisations can Thwart Data Breaches by Finding Attackers Early
Global Security Magazine, By Marc Jacob
LightCyber announced that it is making its unique solution for detecting active network attacks available to the UK market for the first time. Early detection of network attackers gives organisations the ability to curtail data breaches and prevent other consequences. LightCyber, with its dual headquarters in Israel and Silicon Valley, recently established its European headquarters in the Netherlands and inaugurated an EU-based cloud for its Magna Cloud Expert System to comply with the EU Data Protection Directive (Directive 95/46/EC). Security veteran Paul Couturier has joined LightCyber as EMEA Vice President. As its first UK employees, LightCyber has appointed long-time security expert, Ruby Khaira as country manager and Jan Coulson as technical lead.
>> Read the full article
May 25, 2016

InfoSecurity Logo

Interview: Jason Matlof, LightCyber
InfoSecurity Magazine, By Dan Raywood, Acting Editor
The area of behavioral analytics technology and the concept of detection versus prevention have kept me busy over the past six months, and a new name in the vendor space offered me a concept that it described as “BAD”.BAD in this case stood for “behavioral attack detection” that provides “accurate and efficient security visibility into attacks that have slipped through the cracks of traditional security controls”, and the company offering this concept is LightCyber, who launched in January 2015 and this week expanded its offering to the European space. The company offers a product Magna which integrates user, network and endpoint context to provide security visibility into a range of attack activity.
>> Read the full article
May 25, 2016

CRN UK Logo

LightCyber plots European takeover
CRN UK, By Samantha Wright
Security start-up LightCyber has launched in the UK and Germany to combat “flaws” in legacy security software.The vendor, which has bases in California and Ramat Gan, Israel, was founded four years ago but came out of stealth mode and started trading in January 2015.It launched its sales teams in Germany and the UK a couple of weeks ago with offices in Munich and Kent. Its chief marketing officer Jason Matlof said its product, Magna, is long overdue in the industry.
>> Read the full article
May 23, 2016

Channel Partners Online Logo

LightCyber Launches Technology Alliance Program, Stresses Revenue Upside
Channel Partners Online, By Lorna Garey
“We don’t fulfill any deals outside the channel,” said Matloff. “We know that the growth trajectory that we want to have is only going to be enabled by leveraging the channel.”Through LTAP, LightCyber’s Magna platform will eventually interoperate with nine technology categories, including firewalls and Web gateways, security information and event managers, VPNs, network access control and authentication systems, and IT workflow and service management suites.
>> Read the full article
May 23, 2016

CRN Logo

CRN Exclusive: LightCyber Launches New Partner Program For Technology Integrations
CRN, By Sarah Kuranda
LightCyber is expanding its channel ecosystem Tuesday, launching a Technology Alliance Program for vendor integrations intended to help partners drive more value across their security line cards.The LightCyber Technology Alliance Program creates a platform that integrates in complementary security vendor solutions with its own behavioral attack detection solution.
>> Read the full article
May 20, 2016

HelpNetSecutiry Logo

LightCyber’s Attack Detection Platform Distills Alerts and Generates Actionable Information
Network World, by Linda Musthaler
A recent survey says organizations receive 17,000 malware alerts a week—too many to actually deal with. LightCyber boils that down to a dozen meaningful alerts. LightCyber Magna finds active network attackers before they have a chance to steal or damage assets. This Network World article describes the unique approach from LightCyber and how one can finally solve the data breach crisis.
>> Read the entire review
April 26, 2016

HelpNetSecutiry Logo

Who’s next? Shift focus and detect network attackers
HelpNetSecurity, By David Thompson, Senior Director of Product Management at LightCyber
Who will be the victim of the next major breach? Nearly all enterprises and organizations are sitting ducks for a targeted network attack. Maybe it’s time to take some significant steps and be able to proclaim: “We won’t get breached again.”Preventative security cannot prevent a network intruder from penetrating a network 100% of the time. The best pen testers even guarantee that they can get into a network within two days. Prevention is still necessary, but it is not sufficient to always stop an attacker. Companies need to have a plan B.
>> Read the full article
April 18, 2016

Cloud Security Resource Logo

What Does Detection Detect and Can it be Done with a Minimum of Alerts
LightCyber, By Jason Matlof, EVP & Chief Marketing Officer
If orange is the new black, then detection is the new prevention. Today, it’s fashionable to be called detection and leave behind the vestiges of a security model built entirely around prevention. Prevention is still a necessity, but everyone knows that complete prevention is a fallacy.Despite important advances in firewall technology, sandboxing solutions and security intelligence, it is no longer possible to prevent every attack. A motivated attacker can and will get into your network. Preventative measures may protect against 95 percent or more of attempted attacks, but eventually one will be successful, perhaps through extremely clever spear phishing or social engineering that compromises a valid user account. Once an attacker is inside, the real challenge is detecting them quickly before theft or damage ensue.
>> Read the full article
April 13, 2016

Cyber Security Trend Logo

LightCyber Introduces Security Industry’s First Attack Detection Metrics
Cyber Security Trend, By Peter Bernstein, Senior Editor
The new Attack Detection Metrics address the issue of finding the bad guy behaviors, whether from the inside or from the outside of an enterprise by turning the current process of detection, which can easily miss the latest type of mischief, on its head.There is an old saying that “you can’t tell the players without a scorecard.” When it comes to cyber security, this could be extended as saying you can’t keep score unless you can separate the good actors from the bad ones so can concentrate your efforts on the bad ones.
>> Read the full article
March 8, 2016

CRN Logo

2016 Security 100: 20 Coolest SIEM And Threat Detection Vendors
CRN, By Sandra Kuranda
CRN names LightCyber to the 2016 Security 100 list. Previously, CRN selected LightCyber as one the 10 Coolest Security Start-ups of 2015 and, separately, awarded the LightCyber Magna platform for Behavioral Attack Detection as one of the 10 Coolest Security Products of 2015. Now, in the 2016 Security 100, LightCyber is placed in the SIEM and Threat Detection category. While the category is not the most accurate fit for what Magna really does–the product is unique–it does convey that Magna uncovers threats. In particular, Magna detects active attackers on networks that have circumvented preventative security and are at work exploring the network and gaining access to valuable assets.
>> Read the full article
March 2, 2016

Security Asia Logo

RSA keynote calls on businesses to enable the hunter
Security Asia, By Ken Wong
Amit Yoran, President of RSA, The Security Division of EMC, kicked off RSA Conference 2016 with an opening keynote that urged the crowd to step back and assess the industry’s challenge from a different perspective.Yoran said that the problem with security wasn’t a technology one, but one where the adversaries were more creative, patient and persistant. “They are single-minded. They have a target – no prescribed path to get there, no overarching rules, just a target – and a virtually limitless number of pathways to explore.”To deal with them, Yoran argued that we needed, “To leverage our own smart creatives – our own curious, problem-solving analysts and set them loose to track down and hunt for our opponents.”
>> Read the full article
February 15, 2016

Why Healthcare Organizations are Sick with a Data Breach, and How to End the Epidemic
LightCyber, By David Thompson, senior director, product management
“A targeted data breach is one of the most vexing problems facing healthcare organizations today… The simple truth is that most healthcare organizations lack the means to detect an active data breach.”
>> Read the full article
February 12, 2016

HIT Logo

Infographic: The Sick State of Healthcare Data Breaches
HIT Consultant, By Fred Pennic
1 in 3 Americans were victims of healthcare data breaches, attributed to a series of large-scale attacks that each affected more than 10 million individuals, according to Bitglass’ 2016 Healthcare Breach Report. Among the most significant findings of the report was that in 2015, 98 percent of record leaks were due to large-scale breaches targeting the healthcare industry. These high-profile attacks were the largest source of healthcare data loss and indicate that cyber attackers are increasingly targeting medical data.
>> Read the full article
February 11, 2016

Information Week Dark Reading Logo

3 Flavors of Machine Learning: Who, What & Where
LightCyber, By Giora Engel, Co-Founder & Chief Product Officer
Now that Machine Learning has become a trendy term co-opted by marketing departments of most security companies, it’s time to sort out the three different types and how they are vastly different. Cut through the hype to understand exactly what a vendor is doing with machine learning and how it may or may not solve a particular security problem.
>> Read the full article
February 1, 2016

SC Magazine Logo

Group Review: LightCyber Magna
SC Magazine, By Peter Stephenson, Technology Editor“LightCyber provides us with a behavioral attack detection tool… During that attack phase, the intruder is communicating with C&C servers, performing various kinds of reconnaissance, moving laterally through the network, and attempting to exfiltrate data. All of those functions have unique behavior associated with them. Magna analyzes that behavior, draws conclusions and acts accordingly.”
“LightCyber provides us with a behavioral attack detection tool… During that attack phase, the intruder is communicating with C&C servers, performing various kinds of reconnaissance, moving laterally through the network, and attempting to exfiltrate data. All of those functions have unique behavior associated with them. Magna analyzes that behavior, draws conclusions and acts accordingly.”
>> Read the full article
January 29, 2016

MIS Asia Logo

LightCyber unveils APAC headquarters
MIS ASIA, By Zafirah Salim
LightCyber has recently opened its Asia Pacific headquarters in Singapore; and is expanding its LightCyber Channel Alliance Programme (LCAP) across the region to equip and empower security channel partners.Following this, the firm also established a team for sales, marketing and technical resources, which will focus on Singapore, Hong Kong and Korea.
>> Read the full article
January 12, 2016

eWeek Logo

LightCyber Updates Platform to Enhance User Behavioral Analytics
eWeek, By Sean Michael Kerner
The new release of the Magna platform advances Behavioral Attack Detection with richer user-oriented attack detection. “Any given attacker can choose from multiple attack vectors to breach an organization, and that is why threat detection technology needs to look at multiple layers.” Explains Gonen Fink, “We cover the entire attack lifecycle from network, endpoint and user perspective in contrast with the classic user behavior analytics approach that typically just looks at what credentials are involved.”
>> Read the full article
January 5, 2016

IT Business Edge Logo

2016 Security Trends: What’s Next for Data Breaches?
ITBusinessEdge
“Over the past year, there have been a number of disturbing developments with regards to data breaches. Not only have data breaches become more frequent, but their impact has become greater — not just in the sheer volume of information or assets stolen, but in the very nature of what hackers are targeting.”
>> Read the full article
December 29, 2015

Legaltech News Logo

Your Next Big Break: 2016 Data Breach Predictions
Legaltech News, By David Thompson
LightCyber’s David Thompson breaks down past breaches to find trends for the year ahead. What he unveils is unnerving. If most enterprises and organizations continue to fully lack a capability to find active attackers inside their networks, the industry will see things getting worse in 2016. Some of these trends include data breaches to gain financial gain through stock market investing, email shaming and defamation as primary objectives, account leap frogging and more physical damage. Read about it in LegalTech News, an ALM publication (requires free registration for new readers).
>> Read the full article
December 20, 2015

Forbes Logo

Five Massive Trends Firing Up Technology Stocks in 2016
Forbes, By Ky Trang Ho
“Companies are worried about targeted attacks from cybercriminals, state-sponsored attacks and malicious activity from employees or contractors… By 2020 as much as 60% of enterprise information security budgets will be allocated to rapid detection and response of network security breaches, up from 10% in 2014….”
>> Read the full article
December 14, 2015

SC Magazine Logo

Perimeter Defense: Innovators 2015
SC Magazine, By Peter Stephenson, Technology EditorLightCyber Magna Platform
This is one of those companies that makes us glad we are working in the security space. In our discussion with this Innovator we were taken by its vision of the virtual perimeter – which, by the way, is our characterization (feel free to plagiarize it any time you wish) – and its approach to addressing the challenge of securing it.
>> Read the full article
December 14, 2015

CRN Logo

The 10 Coolest Cybersecurity Products Of 2015
CRN, By Sarah Kuranda
Magna Active Breach Detection
2015 was a year full of data breaches, and it looks like 2016 is unlikely to be any different. That trend makes a solution like LightCyber’s Magna Active Breach Detection very timely, as it offers an easy-to-deploy breach detection solution that provides actionable steps to remediate any problems found.
>> Read the full article
December 7, 2015

CRN Logo

The 10 Coolest Security Startups of 2015
CRN, By Sarah Kuranda
As breaches continue to plague businesses in all industries, LightCyber — whose U.S. headquarters is in Los Altos, Calif., and whose Israel headquarters is in Ramat Gan — looks to help companies detect breaches and remediate them with its Magna Active Breach Detection platform. With more and more of the security industry moving to an acceptance that protection technologies aren’t enough, LightCyber’s platform works to detect hackers already inside of the environment by identifying anomalous behavior at the network and endpoint level, and then helping to stop the breach.
>> Read the full article
December 4, 2015

InformationWeek DarkReading Logo

Improve Cybersecurity
InformationWeek, By Lisa Morgan
Israeli communication services provider Orange (aka Partner) has been using machine learning for the past two years to help protect its business and customer data. The company was previously using an Information Detection System (IDS) and a Security and Event Management (SIEM) system, but the IDS system was producing approximately 800 alerts per day. With the LightCyber Magna active breach detection system, its security team can more effectively manage breaches and suspicious activity.
>> Read the full article
November 3, 2015

Beckers Health IT Review Logo

Health IT Tip of The Day: Know When Hackers Enter Your Network
Becker’s Health IT & CIO Review, By Max Green
“Not becoming the next data breach victim is a chief concern for healthcare organizations. Healthcare organizations will not be able to fully prevent an attacker from getting into their networks, but they can detect them early before theft and damage occur.”
>> Read the full article
November 2, 2015

Computerworld Logo

LightCyber game lets IT pros become the attacker
Computer World, By Tim Greene
It’s only a game, but LightCyber hopes its Cyber Attack Training System (CATS) helps IT folks think like attackers in order to better defend their networks. The online game sets players up with stolen login credentials for a networked machine and turns them loose with Metasploit tools. The idea is for security pros to discover and compromise other devices on the network with the goal of capturing a specific file.
>> Read the full article
October 30, 2015

Computerworld Logo

Emerging Technology in the Enterprise
Computer World, by Erika Morphy
You’ll start to see a lot of hack games hosted on the public cloud. Here’s why, or rather, how, LightCyber, whose specialty is active breach detection, is holding a 12-hour long hack game (or hacker simulation challenge) on Nov. 10, 2015. The challenge is to hack through a mythical small health care company’s simulated corporate network environment to access the 10,000 or so patient medical records.
>> Read the full article
October 28, 2015

InfoSecurity Logo

LightCyber Launches Live Training Environment
InfoSecurity Magazine, By Tara Seals, US/North America News Reporter
“Cyber-attacks leading up to breaches have been wildly successful, largely because most organizations lack the understanding and means to detect them until it is far too late. Given the focus on blocking malware by legacy tools, network intruders that are sophisticated enough to circumvent those systems can gain unfettered access to operate on the network for months without detection.”
>> Read the full article
October 28, 2015

Channel Partners Online Logo

LightCyber Unleashes CATS to Help Businesses Fight Off Cyberattacks
Channel Partners Online Magazine, By Edward Gately
“While many security vendors continue to promote a ‘flawed security strategy exclusively focused on blocking the installation of malware,’ this educational program will train security professionals on how to find the bad guys that are already operating within their network.”
>> Read the full article
October 26, 2015

Venture Beat Logo

Breach Analytics: The Next Billion Dollar Investment Opportunity
Venture Beat, By Venky Ganesan, Menlo Ventures
LightCyber is “unique in that its solution incorporates both network and endpoint analysis with the specific goal of reducing false positives. Alert overload and noisy systems are the bane of today’s security analysts.”
>> Read the full article
October 9, 2015

Maritime Connector Logo

Cyber Security for Shipping Needs Unique Approach
Maritime Connector, By Girija Shettar
“In the shipping sector, network security has become nearly as important as physical security, and we are seeing significant demand in the form of customers from that industry…There is a huge gap today in the ability to detect a breach once the attacker bypasses the perimeter. Companies really need systems that will assist their team to get the necessary visibility into the important events and investigate them on time.”
>> Read the full article
October 1, 2015

Information Week Dark Reading Logo

Automating Breach Detection For The Way Security Professionals Think
Dark Reading, by Giora Engel, Chief Product Officer
Solving the data breach crisis requires a deliberate shift in strategy and thinking. Obviously, older approaches to early detection of targeted breaches are not effective today, given that dwell time hovers around six months.Start with your mindset about security automation. It’s difficult to conceive that one could be successful in detecting an active breach without automation. Already IT and security organizations and short-staffed, and many are struggling under the weight of hundreds or thousands of ineffectual security alerts. Get them focused on the actual signs of an intruder and not some wild malware goose chase.
>> Read the full article
September 16, 2015

InSecure Logo

Rethinking Security to Detect Active Breaches
(In)Secure, by Gonen Fink
This detailed feature article explains how to detect an active breach before damage can occur.
>> Read the full article
August 21, 2015

TechTarget Logo

MSPs partner with LightCyber for managed breach detection services
Tech Target, by Spencer Smith
LightCyber has formally launched the Channel Alliance Program, opening up opportunities for MSPs to offer managed breach detection services; plus, other channel news. LightCyber Inc., a provider of active breach detection products, has formalized the LightCyber Channel Alliance Program for resellers and managed services providers (MSPs).
>> Read the full article
August 20, 2015

Channel Insider Logo

LightCyber Introduces Global Channel Alliance Program
Channel Insider, by Michael Vizard
LightCyber’s Active Breach Detection, only sold through the channel, looks at user behavior and known attack vectors to curtail potential security breaches. Looking for partners that can help drive a new approach to managing security breaches, LightCyber unveiled a channel program aimed at solution providers that either already have or are looking to acquire additional security expertise.
>> Read the full article
August 19, 2015

Channel Buzz Logo

LightCyber focuses on education with first-ever partner program
Channel Buzz, by Robert Dutt
Israel-based LightCyber has launched its first channel program, an effort the active breach detection vendor says will help it grow its channel base both in terms of depth and breadth.
>> Read the full article
August 18, 2015

The VAR Guy Logo

LightCyber Introduces Global Channel Alliance Program
The VAR Guy, by Michael Cusanelli
Cybersecurity vendor LightCyber is the latest company to introduce a formal reseller partner program with the launch of its global Channel Alliance Program, which includes training, tools and certification for those selling its Active Breach Detection platform.While many other cybersecurity vendors focus on detecting and mitigating threats before they compromise users’ infrastructures, LightCyber’s solution focuses on detecting targeted data breaches that may have slipped past traditional cybersecurity prevention solutions. The company’s flagship Magna security platform, which profiles both network traffic and endpoint status, is being offered exclusively through the channel. >> Read the full article
August 18, 2015

Channel Partners Logo

LightCyber Unveils New Security Partner Program
Channel Partners, by Edward Gately
Security platform provider LightCyber is rolling out its first partner program to standardize its work with partners and support growth. The Channel Alliance Program offers training, tools and certification. LightCyber said it is “committed to” a 100 percent channel distribution model. The company currently has more than 20 partners.
>> Read the full article
August 18, 2015

CRN Logo

Breach Detection Startup LightCyber Launches First Partner Program
CRN, by Sarah Kuranda
Security startup LightCyber is placing its bets on the channel early, introducing its first full-fledged partner program Monday, just two years after its initial launch. >> Read the full article
August 7, 2015

LightCyber Logo

Why Healthcare is Sick from Data Breaches. How to End the Epidemic.
Electronic Health Reporter, By David Thompson, Sr. Dir Product Management
A targeted data breach is one of the most vexing problems facing healthcare organizations today. 90% of healthcare organizations may have already been breached. Many are victims of ongoing breaches and don’t even yet know it. The simple truth is that most healthcare organizations lack the means to detect an active data breach. This article looks at the current impediments to being able to detect an active breach and how to change those things to find an attacker early.
>> Read the full article
August 7, 2015

Information Security Buzz

Cyber Outrage
Information Security Buzz, by Gonen Fink, CEO LightCyber
As usual, the cyber blame game goes into full swing after a major breach. Although the targeted data breach at OPM is one of the most disastrous breaches, it brings yet another wake up call showing that most companies and organizations are simply not able to detect an active data breach after the initial intrusion. The dwell time for these targeted data breaches is pathetically long and measured in months. >> Read the full article
July 23, 2015

CRN Logo

25 Emerging Vendors You Need To Know About
CRN, by Staff Writer
Among the crop of young companies making this year’s CRN Emerging Vendors list, these stand out for their potential impact on the industry. >> Read the full article
July 7, 2015

CRN Logo

The 10 Coolest Network Security Products Of 2015
CRN, by Sarah Kuranda
Being hit by a data breach is inevitable, experts agree, but a company can prevent a breach from becoming a catastrophe by ramping up its detection capabilities. That’s exactly what LightCyber offers, with its easy-to-deploy breach detection solutions for both the network and the endpoint under its Magna Active Breach Detection platform. >> Read the full article
July 7, 2015

Electronic Health Reporter Logo

Health IT’s Most Pressing Issues
Electronic Health Reporter, by Steve Schick, senior director, education, LightCyber
One of the most pressing issues facing healthcare organizations today is the threat of a targeted data breach. While data breaches are a top concern for most companies and organizations, it is even more acute for healthcare. Healthcare data is some of the most valuable in the dark web, commanding a substantial premium over credit card details. Over the past year, there have been at least 95.5 million healthcare records in the U.S. stolen through big data breaches, representing nearly 30 percent of the U.S. population. >> Read the full article
June 16, 2015

Dark Reading Logo

Is Your Security Operation Hooked On Malware?
DarkReading, by Giora Engel, vice president, product & strategy at LightCyber
Whether the goal of a malware attack is ad-clicks, creating a botnet, or doing something more damaging, no one can dispute that preventing and combating these infestations are an important focus for security groups. But too often, this battle can overshadow an even bigger threat to an organization: a targeted data breach, which takes a very different orientation and set of tools.
>> Read the full article
June 9, 2015

The Deal Logo

Influential Cyber-Security Investor Shlomo Krammer Backs LightCyber
The Deal, by Chris Notler
With his latest deployment of capital, cyber-security investor Shlomo Kramer joins the board of LightCyber. Joining backers such as Battery Ventures, Glilot Capital Partners and Amplify Partners, Kramer said in early June that he will invest $4.5 million in the Los Altos, Calif., and Ramat Gan, Israel, security startup. >> Read the full article
June 6, 2015

Baseline Logo

Orange Gives a Green Light to Advanced Security
Baseline, by Samuel Greengard
The Israeli telecom giant turned to an active breach detection system, which applies machine learning and behavioral profiling to identify attack behaviors. >> Read the full article
June 5, 2015

CRN Logo

Check Point Founder Invests In Breach Detection Startup LightCyber
CRN, by Sarah Kuranda
After a series of successful investments in the security space, Check Point Software founder Shlomo Kramer has placed his next big bet. Kramer revealed he as made a personal equity investment and joined the board of directors at breach detection company LightCyber.
>> Read the full article
June 5, 2015

Packet Pushers Logo

Why It’s So Hard To Find Intruders After A Network Penetration
Packet Pushers, by Jason Matlof, Executive Vice President, LightCyber
Traditional security technologies are no longer able to prevent access to a target network. Premera, Anthem, Target, and Home Depot are high-profile examples of successful, determined attackers. Post-incident surveys from Verizon and PwC confirm that 77% of organizations were breached last year, that the average attack persists for about seven months, and that external parties discover most breaches – not the victim/target. >> Read the full article
June 4, 2015

Forbes Logo

Could LightCyber Boost Check Point Software And Palo Alto Networks?
Forbes, by Peter Cohen, Contributor
Two publicly-traded security technology companies could get a boost from a privately-held company that’s increasing demand for their products.  >> Read the full article
May 21, 2015

SiliconANGLE Logo

LightCyber adds new features to shut down intrusions faster
siliconANGLE, by Mike Wheatley
Instead of trying to keep the bad guys out of corporate networks, a new wave of startups is turning cybersecurity on its head with a different approach: let the bad guys in, identify them, and isolate them before they can do any damage. >> Read the full article
May 20, 2015

IT Business Edge Logo

Tipping the Data Breach Odds in Your Favor
ITBusinessEdge
Click through for a closer look at how data breaches happen and what you can do to tip the odds back in your favor, as identified by LightCyber.  >> View the slideshow
May 13, 2015

Security Week Logo

LightCyber Enhances Breach Detection Platform
Security Week
Breach detection solutions startup LightCyber has updated its flagship security platform with new features that enable higher levels of accuracy in finding attackers who have penetrated the defenses of enterprise networks.  >> Read the full article
May 9, 2015

eWeek Logo

LightCyber Connects Network to Endpoint Processes for Breach Detection
eWeek, by Sean Michael Kerner
Modern security isn’t just about blocking packets, but about correlating network traffic with processes that can be stopped. Security firm LightCyber announced the 3.0 release of its Magna active-breach-detection platform on May 7, providing a detailed overview of new features that will become generally available this summer.  >> Read the full article
May 7, 2015

Network World Logo

Lightcyber upgrades to speed the shutdown of malicious activity
Network World, By Tim Greene
LightCyber is upgrading its endpoint detection and remediation platform so when it discovers bad behavior on the network it can also identify the machine and exact process that’s causing it, then shut the malware down.   >> Read the full article
April 22, 2015

Dark Reading Logo

The Bad News for Infosec in the Target Settlement
Dark Reading, by Giora Engel
The legal argument behind the $10 million Class Action lawsuit and subsequent settlement is a gross misrepresentation of how attackers operate.  >> Read the full article
March 25, 2015

SC Magazine Logo

Speed up Breach Detection
SC Magazine, by Adam Greenberg
This video interview features Giora Engel, co-founder and chief product officer with LightCyber, discussing what organizations must do to more quickly detect breaches and remediate them.
>> View the 4 minute video
March 10, 2015

Network World Logo

10 Young Security Companies to Watch in 2015
Network World, by Tim Greene
LightCyber was named as one of “10 Young Security Companies to Watch in 2015” by Network World magazine in an article by Tim Greene. The article highlights start-ups that are “…trying to capitalize on businesses moving toward security platforms that help them respond more quickly when they suffer successful cyber attacks in hopes of limiting the damage they do.”
>> Read the full article
February 26, 2015

CRN Logo

Take Notice: 6 Security Startups Shaking Up The Industry
CRN, by Robert Westervelt
LightCyber monitors the network and creates a baseline of user, device and application behavior to identify system compromises and advanced threats. The company’s Magna platform uses span ports or network taps to inspect network traffic, combining it with behavioral analysis to detect threats and provides alerts for incident responders.  >> Read the full article
February 23, 2015

Network World Logo

Network World: New weapons offer hope against advanced cyber-attacks
Network World, by John Breeden II
LightCyber Magna is a great tool for organizations concerned with advanced persistent threats or attacks that are instigated from within a network. No matter if it’s a program that comes from the outside, gets installed from a key drive, or even if it’s a human trying to do something malicious, none of them can hide their actual communications. Magna can monitor, record and stop them.
>> Read the full article
February 14, 2015

Ethan Banks on Networkng Logo

Ethan Banks on Networking: News Analysis: CloudGenix, LightCyber, VMware, Meru
by Ethan Banks
Picking the signal from the noise is the bane of my security experience, usually only possible during a forensic investigation when I knew what I was looking for. I just had to find it. LightCyber finds the stuff you don’t know you’re looking for and brings it to your attention.
>> Read the full article
February 2, 2015

Network World Logo

Network World: New products of the week 02.02.2015
Network World, by Brandon Bulter
Our roundup of intriguing new products from companies such as Dell and Rackspace. (Check slide 17 for LightCyber Magna 2.8)  >> Read the full article
January 29, 2015

Network World Logo

Network World: LightCyber rolls out new features for endpoint malware detection platform
Network World, by Tim Greene
LightCyber, another security startup with the roots in the Israeli military, has opened its doors in the U.S. and is announcing new products and features to make its mark in the crowded field of endpoint detection and remediation. The company’s Magna Breach Detection Platform monitors and analyzes network traffic as well as activity on Windows endpoints in search of anomalous behavior that they can identify as malware.  >> Read the full article
January 29, 2015

eWeek Logo

eWeek: IT Security Game Becomes a Race Against Time
eWeek, by Sean Michael Kerner
Customers are often astonished by the degree to which malware has penetrated their firms, and that is resulting in a rush to add better security. IT security has become a race against the clock. In all probability, most organizations have already been compromised by some type of malware. The challenge is to discover that malware before it becomes active or, at the very least, contain it as quickly as possible once it does.  >> Read the full article
January 29, 2015

Security Week Logo

SecurityWeek: LightCyber Enhances Magna Breach Detection Platform
SecurityWeek, by Eduard Kovacs
LightCyber, an Israel-based security breach detection and response solutions provider, today announced an improved version of its LightCyber Magna platform. LightCyber Magna relies on deep packet inspection (DPI) to profile the behavior of users and devices in an effort to identify anomalous behavior that could indicate a security breach. This behavior-based breach detection technology ensures that security teams are provided with actionable and prioritized alerts that can help them take measures before damage is caused.  >> Read the full article
January 29, 2015

IT World Logo

IT World: LightCyber rolls out new features for endpoint malware detection platform
IT WORLD, by Tim Greene
LightCyber, another security startup with the roots in the Israeli military, has opened its doors in the U.S. and is announcing new products and features to make its mark in the crowded field of endpoint detection and remediation. The company’s Magna Breach Detection Platform monitors and analyzes network traffic as well as activity on Windows endpoints in search of anomalous behavior that they can identify as malware.  >> Read the full article
January 14, 2015

Dark Reading Logo

Dark Reading: 4 Mega-Vulnerabilities Hiding in Plain Sight
DarkReading, by Giora Engel
How four recently discovered, high-impact vulnerabilities provided “god mode” access to 90% of the Internet for 15 years, and what that means for the future. The Kerberos Checksum Vulnerability disclosed last month was just the latest in a string of massive vulnerabilities that were discovered over the course of only eight months last year. Did I say massive? More like earth-shattering…
>> Read the full article
January 6, 2015

Security Week Logo

SecurityWeek: What CISOs, InfoSec Pros Have on Their 2015 Wish Lists
SecurityWeek, by Fahmida Y. Rashid
The new year ahead is a good time to reflect on what infosec professionals need to keep users and data safe—before the inevitable race to stay ahead of the crises and firefighting begins in earnest. In previous years, SecurityWeek asked experts to talk about their security resolutions. This year, security experts weigh in on their 2015 wish list—things they would like to see happen in their organization and the security industry as a whole.  >> Read full article
December 25, 2014

Geek Time Logo

GeekTime: Why the public should support Sony today and see ‘The Interview’
GeekTime, by Dave Thompson
Instead of talking about what Sony Pictures should have done, we need to look in the mirror: Where was our support for Sony? What are we willing to do as a society that cares about free speech?
>> Read the full article
December 17, 2014

Geek Time Logo

GeekTime: What do Targeted Attacks and Texas Hold‘em Have in Common
GeekTime, by Eyal Firstenberg
In previous posts, we compared targeted attacks to hand-to-hand combat (as opposed to a remote drone strike). The idea was that we, as security professionals, need to relate to attackers as individuals that respond to our actions. They punch, we respond, and they react to this response. As we drill further down into the psychology of targeted attacks, and consider more in-depth the strategy of dealing with them, another analogy suggests itself. Without going too far into the subtleties of the game, the widely-popular poker variation called Texas Hold‘em is an excellent analogy for the complex relationship that should (but does not always) exist between attacker and defender.  >> Read the full article
December 5, 2014

SC Magazine Logo

SC Magazine: Missing the big picture in the Sony hack
SC Magazine, by Gonen Fink, CEO, LightCyber
Are we missing the big picture, again, in the fervor around the Sony hack? It makes a great scene, you can picture it in a movie: Employees showing up on Monday unable to login or begin their day due to the flashing skull on their monitors. Frenzied white-collar workers rushing to secure pen and paper and lining up to use the fax machine. An escalation of damage as a puzzlingly worded extortion threat manifest as leaked sensitive internal information, then deleted and lost data, and finally followed by the loss of the crown jewels themselves – DVD quality rips of yet-to-be-released movies.
>> Read the full article
December 4, 2014

The Christian Science Monitor Logo

CS Monitor: Sony hack fits pattern of recent destructive attacks
The Christian Science Monitor, by Paul F. Roberts
The ferocity of the Sony Pictures attack took the technology world by surprise. But it has similarities to other destructive hacks. Among other things, the Sony malware relied on the same commercial software to access and erase Sony hard drives as was used in a destructive attack on oil giant Saudi Aramco in 2012.  >> Read the full article

View Archived News Items »