5 Different Technologies - PPT (Not Daily)
5 Different Technologies - PPT (Not Daily)
5 Different Technologies - PPT (Not Daily)
cybersecurity
threat intelligence
By: Maneesha Yasmith
Cybersixgill Introduction
AI-Powered Data
Local Data Scanning:
Classification: Minimal Training
Ensures data security by
Leverages advanced AI Required: The AI
allowing scanning and
and machine learning classifiers are designed to
classification to occur
algorithms to discover, be effective with minimal
within the customer’s
understand, and classify setup, making them user-
environment, eliminating
customer data with friendly and adaptable to
the need to transfer data
minimal manual various environments.
externally.
intervention.
Real-Life
Healthcare Providers: In the healthcare
sector, Varonis is utilized to safeguard
patient information, ensuring compliance
Use Cases
with HIPAA and other regulations. The
system's ability to classify and secure data
helps prevent unauthorized access and data
leakage.
INTRODUCTION
Beyond Identity has launched RealityCheck, an identity assurance plugin for
Zoom. RealityCheck is designed to protect against AI deception, including
impersonation attacks and deepfakes, by certifying call participants with
Authenticator Assurance Level 3 (AAL3) and device security verification. The
feature adds authentication badges, displays risk data, and verifies users and
devices. Initially launched for Zoom.
Beyond Identity plans to extend RealityCheck to other communication
platforms like email and chat.
Beyond Identity presented RealityCheck at Booth #2068 at Black Hat USA 2024.
FEATURES
• A dynamic authentication badge displayed in the user’s camera feed, indicating their verified
status.
• Continuous monitoring of both user and device security, ensuring that participants meet the
necessary security standards throughout the call.
• A side panel in Zoom that provides additional details about the user's device and risk status,
helping participants quickly assess the legitimacy of other users.
Advantages:
1. Enhanced Security Against AI Attacks:
By focusing on phish-resistant MFA and continuous
device monitoring, RealityCheck offers robust
protection against deepfake attacks and AI-based
impersonation, which are becoming more prevalent.
2. Real-Time Verification:
The dynamic badge and Zoom side panel provide
immediate, real-time assurance of participants'
authenticity, reducing the risk of falling victim to
deception during critical meetings.
3. Ease of Deployment:
RealityCheck is designed to be easily deployed via
the Zoom Marketplace, with straightforward
enrollment for end-users. This simplicity ensures that
organizations can quickly implement the solution
without significant disruption.
4. Compliance and Trust Building:
By ensuring that all participants are verified and
devices are secure, RealityCheck helps organizations
meet compliance requirements and build trust in
digital communications.
Disadvantages:
Potential User • The requirement for phish-resistant MFA and continuous device
monitoring might be seen as intrusive or burdensome by some users,
Resistance: potentially leading to resistance or reluctance to adopt the tool.
• Key Features
• Support for SaaS Supply Chain Threats: Protection against risks like
account takeovers and data breaches.
• Swift Action: Enables quick response to potential threats.
• Benefits
• Enhanced Security: Tailored to the specific needs of each organization’s
SaaS environment.
• Automated Remediation: Reduces manual intervention, ensuring rapid
threat resolution.
• Comprehensive Protection: Covers various SaaS-related security threats,
improving overall security posture.
HPE: AI-Powered Network
Detection and Response
By: Istiak
HPE AI-Powered Network Detection
and Response (NDR)