Discover the power of proactive cybersecurity defense with our comprehensive MDR services. Gain real-time threat detection, incident response, and continuous monitoring from our expert team to swiftly identify and mitigate cyber threats.

The LifeLong Customer: Navigating Cybersecurity's Seas of Trust and Growth with Robert Johnston, CEO at Adlumin

Join host Brad Hammond in this episode of the Lifelong Customer podcast, as he dives into a conversation with Robert Johnston, CEO of Adlumin. A former Marine with a strong cybersecurity background, Robert shares the genesis of Adlumin and its transition from military operations to private sector entrepreneurship.

Explore the vital role of cybersecurity in today’s digital landscape and how Adlumin revolutionizes security operations with its unique command center approach. Robert discusses the company’s market niche and the effectiveness of a channel-based go-to-market strategy. Gain insights into Adlumin’s growth journey from humble beginnings to a significant industry player, all while prioritizing customer value.

This episode offers a wealth of advice, from navigating product-market fit challenges to transitioning from founder-led efforts to professional management—a must-listen for those navigating the complex waters of cybersecurity entrepreneurship.

Listen on Apple Podcasts or Spotify.

Adlumin Unveils Warranty and Cyber Insurance Offerings that Make Coverage Attainable and Affordable for Previously Unprotected Small and Mid-Sized Organizations

Adlumin Protection Plus Suite receives Cysurance Certification to Provide Low Friction Path to Complementary Financial Protection

WASHINGTON – September 12, 2023Adlumin, the security operations platform and managed detection and response (MDR) service provider keeping mid-market organizations secure, today announced a new warranty program that provides up to $500,000 of financial protection at no cost to customers who qualify. The warranty comes as a result of a third-party testing and certification program by Cysurance, a next-generation risk mitigation company that insures, warranties and certifies security solutions. The Cysurance Certification Program enables Adlumin to offer customers significant discounts on cyber insurance policies.

Together these new offerings provide a low-friction path to attaining complementary financial protection for small and mid-sized organizations who often struggle to find coverage that fits their needs. The Adlumin Protect Warranty enables organizations to qualify for cyber insurance at a lower premium, while also providing fast reimbursement in the event of an incident, and financial resources to support operations before an organization meets its cyber insurance deductible. For organizations covered by Adlumin Protect Warranty, approved payments or agreed remediation will begin 48 hours after verification of a cybersecurity incident.

“Skyrocketing cyber claims, growing security complexity and exploding insurance premiums are pricing small to mid-market organizations out of insurance protection, leaving them exposed to crippling financial impact of cyberattacks,” said Mark Sangster, cybersecurity author and Adlumin Chief of Strategy. “We founded Adlumin to give these organizations the enterprise-grade resources they need and deserve, and these new financial protections build another layer on top of the security operations platform, managed detection and response services, and incident response services we’re already providing. Partnering with an industry leader like Cysurance is one more way we’re bringing top-tier resources to organizations of all sizes.”

Organizations that subscribe to the Adlumin Protection Plus Suite automatically qualify for $500,000 in warranty coverage at no charge, and are eligible for significantly discounted cyber insurance premiums from Cysurance.

“We are in a challenging landscape for small and midsized organizations. Security spending, breaches, and insurance premiums are on the rise, but coverage is becoming more limited and difficult to obtain. Our mission at Cysurance is to verify the proficiency of security operations and expedite the path to coverage,” said Kirsten Bay, CEO at Cysurance. “Establishing certification and coverage for cybersecurity providers, like Adlumin brings a new level of sophistication and assurance to organizations of all sizes. Cysurance-certified providers meet the most stringent requirements demanded by underwriters of risks associated with hardware, software, infrastructure, and security services. That is why we can offer Adlumin customers a streamlined path to insurance coverage and discounted policies.”

Adlumin Protect is a low-friction certification warranty designed to safeguard Adlumin customers against business continuity and insure against loss, protecting their revenue and recovery. It builds on the company’s vision to provide a single platform that equips organizations with full visibility and the tools required to combat cybersecurity threats. For more information on Adlumin Protect Warranty, visit https://adlumin.com/resource/adlumin-protect-warranty/.

About Cysurance
Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions. Cysurance-certified partners meet the most stringent requirements demanded by underwriters of risks associated with hardware, software, infrastructure, and security services deployed by enterprises across all industries and geographies. Cysurance-certified offerings minimize vulnerabilities faced by public, private, and non-profit leaders. The company dynamically ensures adherence to the constantly evolving best practices for enterprise security, through an integrated ecosystem of solution providers who work seamlessly together to cost-effectively optimize the resilience of organizations. All insurance products and services are offered by Cysurance, a licensed producer.

About Adlumin
Adlumin Inc. provides the enterprise-grade security operations platform and managed detection and response services that keep mid-market organizations secure. With one license and one platform, its patented technology gives organizations and solution providers everything they need for effective threat hunting, incident response, vulnerability management, darknet exposure monitoring, compliance support and much more. www.adlumin.com

Follow Adlumin: Twitter, LinkedIn, and Facebook.

Adlumin Contact:
Mike Reilly
fama PR for Adlumin
adlumin@famapr.com

5 Cybersecurity Trends Still on the Rise

By: Brittany Demendi, Corporate Communications Manager at Adlumin

As summer begins to wind down and we hit the mid-year mark, it is becoming increasingly evident that the cybersecurity industry continues to experience transformational shifts. In the face of persistent threats and sophisticated attacks businesses must adapt to the changes to strengthen their defense mechanisms.

Despite the various challenges brought forth by the ever-advancing technological world, one thing remains constant—cybersecurity’s critical importance is safeguarding our digital assets and personal information. As the digital landscape continues to evolve at an unprecedented pace, remaining vigilant is the key component to staying ahead of the cybercrime curve.

This blog explores five key cybersecurity trends that are still on the rise, shaping the way we approach digital security and setting the tone for the months to come.

  1. Cybersecurity Spending: According to ESG research, 65% of organizations planned to increase their budgets this year. While budgets are tightening, cybersecurity spending is still on the rise. In the past few years, cybersecurity has become a boardroom topic. Cyber threats continue to impact organizations on a daily basis and the awareness of these issues is prevalent. Companies understand the criticality of keeping customer and business data secure and investment in cybersecurity has become non-negotiable and often needed for compliance.
  2. Cloud-Based Attacks: Organizations have adapted to servicing customers through apps to employees working remotely, increasing the attack surface for adversaries. Most organizations store their data in the cloud and as a result, cybercriminals are focusing on the cloud as the main target for attacks. The key to managing cloud risk is being able to identify when user activity deviates from normal matters. This can be accomplished by investing in a solution with User Entity and Behavior Analytics and one that will ingest security signals from your productivity tools.
  3. Machine Learning Based Detections: To keep up with the sophistication and growing threat landscape, machine learning is becoming a key capability in cybersecurity. Machine learning goes beyond signature-based detection methods to identify advanced tactics cybercriminal are leveraging to bypass detection. Embracing machine learning in cybersecurity solutions is a necessary step in staying ahead of ever-evolving cyber threats.
  4. Insider Threats: This emerging challenge his emerging challenge is sometimes misunderstood. While it could be a disgruntled employee posting sensitive information, we’re referring to human error that occurs internally. According to VentureBeat, “one out of every five breaches, 19%, originate from the inside.” Whether it is an employee accidentally leaking passwords credentials or downloading malware without realizing it, not following security protocols leaves sensitive data at risk. Investing in security awareness training is essential to educating employees to better protect against this risk.
  5. Business Email Compromise (BEC) Attacks: BEC continues to be one of the top ways attackers steal information, achieve financial gains, and find their way into an organization. It works because it involves a human element. They trick and deceive users into taking harmful actions, sharing sensitive information or providing monetary gains. An AFP report also shared “evidence that BEC remains a problem, with 71% of organizations experienced an attempted or actual BEC attack in 2022. That’s up 3 percentage points from 2021, but still off the 2018 high mark of 80%.” Security professionals must focus on educating employees to gain awareness and recognize these techniques to defend against BEC attacks.

Command More Visibility

The trends above only represent a small portion of what the industry is up against and opportunities to take hold of. The key is to take all we know about cybersecurity and apply them fully to our current security programs. Knowledge is only the halfway point to winning the battle and implementing a proactive security approach is important to defend against common trends.

Amidst these escalating threats, Managed Detection and Response (MDR) providers play a pivotal role in defending organizations. Investing in a solution that provides full visibility across your environment, provides insight into policy violations, and takes a multi-layered detection approach that looks at your extended threat landscape will enable organizations to keep up with the latest trends. Investing in MDR can be an extension of your team and provide valuable threat insights to prepare for and protect against the evolving threat landscape.

How Automation Makes Cybersecurity Faster and Smarter: The Pros and Cons

By: Will Ledesma, MDR Cybersecurity Director 

The world of automation is fully upon us. We as humans want things faster, quicker, and cleaner, with trust in actions taken by computers. All too often, we see in the movies lighting speed actions happening in real-time. Is this real? In essence, we can see automation everywhere, from ordering food at a kiosk to robots making food and beverages. So how has automation taken a foothold in cybersecurity?

The concept of automation often bleeds into the artificial intelligence (AI) world. Where AI makes decisions based on a number of technologies and learned variables. In principle, automation also makes these same types of decisions, but it’s based on rules and patterns. Nonetheless, in cybersecurity, automation is only as smart as we make it. The cyber-world is colossal, and different teams and operations can all use automation in different ways.

This blog concentrates on automation in a Security Operation Center (SOC) and the pros and cons of automation used in cybersecurity.

How is Automation Being Used in Cybersecurity?

In cybersecurity, specifically Adlumin, automation monitors, audits, detects, responds, and/or prevents malicious activities against multiple technologies. One of the main challenges in the cybersecurity world is burnout. By using automation, a Security Operations Center (SOC) team can quickly scale up their operations. For example, automation helps reduce analyst fatigue. Plus provides the tools to quickly identify, contain, and respond to malicious activity. It streamlines mundane, labor-intensive tasks that would’ve otherwise required manual effort. Automation reduces the time for threat detection and provides response capabilities across an organization’s technology set. In addition, automation helps reduce costs associated with manual processes and investigations; by detecting and containing threats such as malware, phishing emails, and malicious code.

Now that we’ve covered its use let’s look at the pros and cons.

The Pros of Cybersecurity Automation

Simply put, as mentioned above, automation reduces the time for threat detection and containment. Furthermore, automation can pinpoint threats that the human eye may miss. Within Adlumin’s Security Operations Center’s (SOC) team, automation is used by taking the mindset of a Tier 3 (expert SOC analyst) and scaling that into playbooks to where automation is then inserted to make machine time-to-machine time decisions. This way, an attack can be stopped in machine time, thus denying a threat of further spreading.

Use Case: Automation Block Ingested into Next-Generation Firewall Systems

For this use case, we will examine an automation playbook that is being utilized to create IP blocklists for next-generation firewall systems (NGFW). In the past, SOCs had to have subject matter experts (SME) that knew a slew of technologies. Using automation, we have removed the need for a dedicated SME that knows how to create network objects, apply that to a network policy, ensure that it has been set to memory, and, most importantly, we have reduced the risk surface area. No longer must a company open additional vectors into its network for SOC SMEs. In addition, a customer drops the risk of worrying about the account management headache that comes with having to give credentials to outside-the-organization users or even depending on a third-party company that requires change request nightmares. Adlumin’s automation can implement a blocklist inseconds versus minutes, hours, or even days.

In addition to automation serving as an additional defender alongside cyber defense warriors, it also helps reduce mean time to remediation (MTTR), thus reducing service level agreements (SLA). Automation will also grab key intel artifacts and inject those in machine time into Adlumin for an analyst to utilize on a single pane of glass. Thus, reducing time to clicks instead of needing to go to additional outside sources.

The Cons of Cybersecurity Automation

The cons of cybersecurity automation are that threat actors are now also using automation within their attack playbooks. The playing field has been reduced in terms of expertise from attackers. Now a team can have one lead that creates and distributes a malicious weapon set to where other attackers can point and click on what they want to attack. Even here at Adlumin, our red teams are using automation in their attacks to brute force their way into systems.

Due to attacks now moving at lightning speeds, defenses must be able to keep up, and automation clearly is the key. For those possibly thinking otherwise, consider this, a leader approaches you and states, “Why am I going to invest in an employee if they’re just going to leave,” where a great response would be, “But what if we don’t invest in them and they never leave?” The same is true for automation in the world of cybersecurity.

Illuminate Threats and Eliminate Risks

Learn more about how Adlumin’s Managed Detection and Response Services and Security Operations Platform can empower your team to illuminate threats, eliminate cyber risk, and command authority. Contact us today, schedule a demo, or sign-up for a free trial.

EDR vs. XDR vs. MDR: The Cybersecurity ABCs Explained

Protect your organization against modern threats with Adlumin’s guide on EDR vs. XDR vs. MDR. Learn more about the differences between the three primary threat detection and response solutions and how to choose the right one for your organization’s needs with a limited budget and resources. Download your copy today!