To support independence and flexibility, Marmon Holdings, Inc. manages its portfolio of 120+ manufacturing companies using a decentralized model, allowing each organization to maintain its own network. While this approach yields substantial benefits, it also makes it challenging to future-proof 120+ unique security stacks. Recognizing that the SEGs currently in place couldn’t keep up with AI-powered, socially engineered attacks, Jeff Deakins, Marmon’s Director of Information Security and Infrastructure, sought out an AI-native solution to combat these AI-driven threats. Hear what Jeff had to say about Abnormal ⬇ Learn more about Marmon’s partnership with Abnormal here: https://lnkd.in/gB894CGe #emailsecurity #cybersecurity #customersuccess
Abnormal Security’s Post
More Relevant Posts
-
Join us in congratulating our client Bleach Cyber | Techstars ‘23! Discover Bleach Cyber | Techstars ‘23, the advanced cybersecurity platform specifically designed for SMEs and startups to secure their business without buying expensive enterprise grade tools. By integrating with their existing tech stack and proactively recommending ‘security opportunities’ the platform not only enhances operational cybersecurity but also fosters trust with customers and helps CISOs fortify their enterprise’s supply chains mitigating risks and aligning with compliance standards. No more need for expensive, drawn out and inaccurate SOC2 audits! With a comprehensive array of security applications, Bleach Cyber | Techstars ‘23 empowers businesses to address and rectify identified opportunities, making it it easy to establish a foundation of trust with their customers by sharing this with CISOs, Procurement and Compliance departments. Discover faster deal closures for innovative small businesses, enabling CISOs and enterprise organisations to work securely with the latest in cutting edge software and technology. Having secured its $2m pre-seed round Bleach Cyber | Techstars ‘23 is poised for hyper-growth. Bleach Cyber | Techstars ‘23 - Cybersecurity, simply. Entrepreneur(s) - Craig Goodwin, Steve Daniels Venture Partner - 🔹Fabio Bottacci #KoboFunds #BleachCyber #cybersecurity
We've secured $2 MILLION pre-seed investment! 👏 This is such an exciting milestone for Steve, Craig, and the entire Bleach team 😄 Our CEO, Craig, said, "Our unapologetically simple and automated approach to cybersecurity is game-changing and it's always tough to know how an established market will receive new approaches but the straight streamlined approach and ease of use has seen an amazing reception." 💬 We're excited to see what the future holds for Bleach! 💪 Read the full press release: https://buff.ly/3QE7uci #technology #cybertech #informationtechnology #newtechnology #itsecurity #technologynews #cybersecurity #technologyrocks
To view or add a comment, sign in
-
We've secured $2 MILLION pre-seed investment! 👏 This is such an exciting milestone for Steve, Craig, and the entire Bleach team 😄 Our CEO, Craig, said, "Our unapologetically simple and automated approach to cybersecurity is game-changing and it's always tough to know how an established market will receive new approaches but the straight streamlined approach and ease of use has seen an amazing reception." 💬 We're excited to see what the future holds for Bleach! 💪 Read the full press release: https://buff.ly/3QE7uci #technology #cybertech #informationtechnology #newtechnology #itsecurity #technologynews #cybersecurity #technologyrocks
To view or add a comment, sign in
-
CounterCraft : 🚨 Take Action Now 🚨 Elevate your organization's security with a robust zero trust strategy enhanced by cutting-edge deception technology. Discover how to prevent breaches and gain actionable adversary threat intelligence. Download our comprehensive whitepaper to uncover how cyber deception can fortify your zero trust security measures. Gain insights on: · Overcoming tactical challenges of zero trust · Integrating deception technology to support zero trust · Meeting zero trust architecture standards · Creating a detailed zero trust roadmap · Implementing zero trust with active defense strategies Access the whitepaper here: https://lnkd.in/d6-z2_qx #zerotrust #deceptiontech #cyberbreach #cybersecurity #actionablethreatintel #poweredbydeception
To view or add a comment, sign in
-
IAM Attack Vectors every CISO should be aware of: orphan users, dormant users, excessive permissions, lack of Segregation of Duties (SoD) and Principle of Least Privilege (PoLP). The threat is real. So many conversations I had lately with industry professionals are on that topic of employee termination and leave VS active cloud, SaaS and on-premise users. Read about these threats, their potential repercussions and how AUTOMATION, specifically automated detection and monitoring, serve as a powerful tool for reducing, mitigating and remediating risks - proactively. #uar #iam #cyber #grc #automation #cga
[New Blog] In the dynamic world of cybersecurity, Chief Information Security Officers (CISOs) grapple with multifaceted challenges, including the ominous specter of tool sprawl and the intricate web of User Access Reviews (UARs). As organizations strive to fortify their digital perimeters, the emergence of orphan users has become a pivotal concern. Orphan and dormant users can serve as potential entry points for both inside and outside threats, making effective management crucial. Check out our latest blog post to delve into the intersection of UARs, orphan users, and the innovative solutions that Cypago brings to the forefront >> https://hubs.ly/Q02dtd7k0 #Cybersecurity #CISO #OrphanUsers #UserAccessManagement
To view or add a comment, sign in
-
Thank you to Global News CA Live for inviting our cybersecurity expert, Hank Fordham to discuss the ongoing IT disruptions. Now more than ever, it is vital for companies to understand the importance of IT Resilience and remain vigilant against those who may want to take advantage of this situation. We are pleased to learn that disruptions are being addressed. Here are some additional steps you can take to protect yourself throughout the ongoing outage according to our Cybersecurity Specialist, Hank Fordham:
Earlier this morning, a segment aired on GlobalNews British Columbia, where Hank Fordham, our Cybersecurity Expert at X10 Technologies, shared his thoughts on the global tech outage. He also offered valuable advice on how people can reduce the impact and prevent hackers from exploiting the situation. It is important to encourage IT resilience and remain vigilant throughout the ongoing outage to prevent anyone from taking advantage of the situation. To learn more, watch the full video below: -- #cybersecurity #ITresiliance #globalIToutage #technews #technology Bradley Fox Oleg Ivanov Catherine Uy Gregory F Genge, MBA Hussein Kurji, Wayne Lambert, Sarah Santos, Simon Copon, Eddie Chisholm, Kevin Jackson, David Hoffer, Cai Manding
To view or add a comment, sign in
-
Throwback Thursday: Did you know that Bob Thomas at BBN Technologies created the first computer virus, the "Creeper," in 1971? It wasn't designed to harm but to demonstrate the concept of a self-replicating program. This fascinating tech history reminds us how far cybersecurity has come and how critical it is for modern businesses. At Protovate, we stay ahead of such threats by integrating cutting-edge security measures in all our software solutions. Stay secure, stay innovative. protovate.com #TBT #TechHistory #Cybersecurity #ITIndustry #BusinessInnovation
To view or add a comment, sign in
-
Still spending hours managing User Access Reviews and making sure permissions are properly and timely assigned (AND REMOVED)? At Cypago we have a holistic view towards Cyber GRC Automation. This undoubtedly includes providing the ability to automate and leverage technology to support the user access and permissions review processes. With Cypago you can now automatically detect and remediate orphan users. Our recent blogpost goes into more detail. Relatable? send me a message
[New Blog] In the dynamic world of cybersecurity, Chief Information Security Officers (CISOs) grapple with multifaceted challenges, including the ominous specter of tool sprawl and the intricate web of User Access Reviews (UARs). As organizations strive to fortify their digital perimeters, the emergence of orphan users has become a pivotal concern. Orphan and dormant users can serve as potential entry points for both inside and outside threats, making effective management crucial. Check out our latest blog post to delve into the intersection of UARs, orphan users, and the innovative solutions that Cypago brings to the forefront >> https://hubs.ly/Q02dtd7k0 #Cybersecurity #CISO #OrphanUsers #UserAccessManagement
To view or add a comment, sign in
-
Pindrop CEO Vijay Balasubramaniyan will be on CNN's Anderson Cooper 360 tonight to showcase the power of Pulse, the #startup’s groundbreaking technology that can help lead the fight against deepfakes. I predicted last year that deepfakes would emerge as the top cyber issue in 2024. So far, my predictions have unfortunately proven accurate. Pindrop’s technology identifies sophisticated threats, like the TTS engine used in the fake President Biden robocall attack. Looking forward to tuning in to what will undoubtedly be a very insightful conversation on the future of AI and cybersecurity.
Pindrop is hitting the airwaves on CNN's Anderson Cooper 360°! Discover how our groundbreaking technology, PindropⓇ Pulse, can help lead the fight against deepfakes. Watch as our CEO, Vijay Balasubramaniyan, showcases the power of Pulse in identifying sophisticated threats, like the TTS engine used in the fake President Biden robocall attack. Catch us live: TONIGHT at 8pm ET on CNN #Pindrop #DeepfakeDetection #CyberSecurity #AndersonCooper360 Tune in here: https://lnkd.in/gXJWzHbf
To view or add a comment, sign in
-
[New Blog] In the dynamic world of cybersecurity, Chief Information Security Officers (CISOs) grapple with multifaceted challenges, including the ominous specter of tool sprawl and the intricate web of User Access Reviews (UARs). As organizations strive to fortify their digital perimeters, the emergence of orphan users has become a pivotal concern. Orphan and dormant users can serve as potential entry points for both inside and outside threats, making effective management crucial. Check out our latest blog post to delve into the intersection of UARs, orphan users, and the innovative solutions that Cypago brings to the forefront >> https://hubs.ly/Q02dtd7k0 #Cybersecurity #CISO #OrphanUsers #UserAccessManagement
To view or add a comment, sign in
-
Dive into the captivating narrative of Kevin Lee Poulsen, a renowned figure in the cybersecurity realm. From his intriguing past as a notorious hacker to becoming a luminary in digital defense, Kevin's journey is a testament to transformation and redemption. Let's build a resilient, secure IT infrastructure for a connected and safer future. To know more, visit: https://lnkd.in/dyaBPpGr #Sumeru #cybersecurityawareness #cybersecurity #cyberattack #cyberdefense
To view or add a comment, sign in
59,526 followers
Great to see Marmon Holdings prioritizing independence and flexibility for its manufacturing companies. It's impressive that they recognize the challenges of future-proofing unique security stacks and are actively seeking out AI-native solutions like Abnormal to combat AI-driven threats.