top of page

Search results

626 results found with an empty search

  • AlgoSec | Securing the Future: A Candid Chat with Ava Chawla, Director of cloud security at AlgoSec

    In the bustling world of cloud security, where complexity and rapid change are the norms, Ava Chawla, Director of Cloud Security at... Cloud Security Securing the Future: A Candid Chat with Ava Chawla, Director of cloud security at AlgoSec Adel Osta Dadan 2 min read Adel Osta Dadan Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 6/15/24 Published In the bustling world of cloud security, where complexity and rapid change are the norms, Ava Chawla, Director of Cloud Security at AlgoSec, sits down to share her insights and experiences. With a relaxed yet passionate demeanor, Ava discusses how her team is pioneering strategies to keep businesses safe and thriving amidst the digital transformation. Embracing the “100x Revolution” “Look, the landscape has transformed dramatically,” Ava reflects with a thoughtful pause. “We’re not just talking about incremental changes here; it’s about a revolution—a ‘100x revolution.’ It’s where everything is exponentially more complex and moves at breakneck speeds. And at the heart? Applications. They’re no longer just supporting business processes; they’re driving them, creating new opportunities, modernizing how we operate, and pushing boundaries.” The Power of Double-Layered Cloud Security Leaning in, Ava shares the strategic thinking behind their innovative approach to cloud security. “One of the things we’ve pioneered is what we call application-centric double-layered cloud security. This is about proactively stopping attacks, and better managing vulnerabilities to safeguard your most critical business applications and data. Imagine a stormy day, you layer up with raincoat and warm clothes for protection The sturdy raincoat represents the network layer, shielding against initial threats, while the layers of clothing underneath symbolize the configuration layer, providing added insulation. Together, these layers offer double layer protection. For businesses, double-layer cloud security means defense in depth at the network layer, unique to AlgoSec, and continuous monitoring across everything in the cloud. Now combine double-layered security with an application centric approach focused on business continuity and data protection across the applications that run the business. Cloud configurations risks are inevitable. You are responsible for safeguarding the business. Imagine you have a tool where you start with an AI-driven view of all your business applications and the attack surface, in seconds you can spot any vulnerable paths open for exploitation as it relates to your most critical applications. Application centric double layer security – the double layers is that extra layer of protection you need when the environment is unpredictable. Combine this with an app-centric perspective for effective prioritization and better security management. It’s a powerful combination! This approach isn’t just about adding more security; it’s about smart security, designed to tackle the challenges that our IT and security teams face every day across various cloud platforms.” Making Security Predictive, Not Just Reactive Ava’s passion is evident as she discusses the proactive nature of their security measures. “We can’t just be reactive anymore,” she says, emphasizing each word. “Being predictive, anticipating what’s next, that’s where we really add value. It’s about seeing the big picture, understanding the broader implications of connectivity and security. Our tools and solutions are built to be as dynamic and forward-thinking as the businesses we protect.” Aligning Security With Business Goals “There’s a beautiful alignment that happens when security and business goals come together,” Ava explains. “It’s not just about securing things; it’s about enabling business growth, expansion, and innovation. We integrate our security strategies with business objectives to ensure that as companies scale and evolve, their security posture does too.” A Vision for the Future With a reflective tone, Ava looks ahead. “What excites me the most about the future is our commitment to innovation and staying ahead of the curve. We’re not just keeping up; we’re setting the pace. We envision a world where technology empowers, enhances, and expands human potential. That’s the future we’re building towards—a secure, thriving digital landscape.” A Closing Thought As the conversation wraps up, Ava’s enthusiasm is palpable. “Our promise at AlgoSec is simple: we empower businesses without interfering with their productivity. We turn digital challenges into growth opportunities. It’s not just about managing risks—it’s about leveraging them for growth.” In a world driven by rapid technological advancements and significant security risks, Ava Chawla and her team at AlgoSec are crafting solutions that ensure businesses can navigate the complexities of the digital landscape with confidence and creativity. Schedule a demo Related Articles Q1 at AlgoSec: What innovations and milestones defined our start to 2026? AlgoSec Reviews Mar 19, 2023 · 2 min read 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • Vulnerability scanning

    Vulnerability scanning is only half the battle. Explore the difference between different types of scans, common pitfalls in modern cloud environments, and how to turn scan data into actionable security policies. Vulnerability scanning Select a size Which network Can AlgoSec be used for continuous compliance monitoring? Yes, AlgoSec supports continuous compliance monitoring. As organizations adapt their security policies to meet emerging threats and address new vulnerabilities, they must constantly verify these changes against the compliance frameworks they subscribe to. AlgoSec can generate risk assessment reports and conduct internal audits on-demand, allowing compliance officers to monitor compliance performance in real-time. Security professionals can also use AlgoSec to preview and simulate proposed changes to the organization’s security policies. This gives compliance officers a valuable degree of lead-time before planned changes impact regulatory guidelines and allows for continuous real-time monitoring. What is vulnerability scanning? Vulnerability scanning is the automated inspection of IT system attributes, applications, servers, ports, endpoints, and configuration parameters to detect weaknesses before adversaries find and exploit them. With increasingly sophisticated adversaries and costly breaches, organizations must be proactive. Vulnerability scanning is the cornerstone of this approach, giving companies an edge in defending their assets and operations against malicious actors. Vulnerability scanning vs. vulnerability management As the first step in the vulnerability management lifecycle, vulnerability scanning provides a snapshot of a cloud or IT infrastructure, generating baseline data for remediation, system validation, and improvement. This allows an organization to get ahead of threat actors performing their own reconnaissance. Vulnerability management, on the other hand, is a continuous governance process that encompasses the entire lifecycle: asset discovery, risk assessment, prioritization, remediation, validation, and reporting. Scanning is the tactical instrument; management is the strategic framework. How does a vulnerability scan work? A scan works much like reconnaissance, leveraging either: Passive techniques , which only observe and log configurations and asset inventories or Active but safe engagement with systems to identify open ports and missing security patches How do scanners “see” flaws? Vulnerability scanners inspect IT assets and detect vulnerabilities by matching their fingerprints against known vulnerability signatures from authoritative sources, including open-source databases (e.g., CISA’s Common Vulnerabilities and Exposures (CVE) and NIST’s National Vulnerability Database (NVD) ) and proprietary databases (e.g., Qualys and Tenable ). A scanner interacts with databases using the Open Vulnerability and Assessment Language (OVAL) . This standardized framework describes vulnerabilities, configurations, and system states so that scanners can compare their detection with vulnerabilities logged in databases. A scanner’s detection workflow includes: Fingerprinting: Collects signatures of IT assets, e.g., operating system type, patch level, installed software versions, service configurations, etc. Signature matching: Compares fingerprints against OVAL definitions or proprietary vulnerability databases Correlation logic (advanced): Applies logical rules to reduce false positives, e.g., no report for an Apache 2.4.38 vulnerability if the system runs Apache 2.4.50 with the relevant patch Confidence scoring: Generates confidence levels indicating detection certainty, helping analysts prioritize validation efforts Benefits of vulnerability scanning A snapshot of an organization’s vulnerability landscape has multiple advantages. Proactive vulnerability detection Scanning identifies security gaps before malicious actors exploit them. Find and fix an SQL injection vulnerability during routine scanning cycles—not after an unauthorized database exfiltration. Efficient risk management Businesses can prioritize risks based on a scanner’s generated vulnerability landscape. Security teams can then focus on fixing high-severity vulnerabilities for critical assets rather than applying uniform patching across all systems. Efficiency brings time and cost savings as well. This is critical, given IBM’s most recent average cost estimate for a breach stands at $4.4 million. Automated scanning helps businesses limit the vulnerabilities that lead to such incidents and their financial fallout. Regulatory compliance & enhanced security posture Vulnerability scanning is now an explicit cybersecurity requirement across multiple regulatory frameworks. Continuous scanning creates a feedback loop that improves baseline security. As vulnerabilities are identified and remediated, the overall attack surface shrinks, increasing operational costs for adversaries while reducing organizational risk exposure. What does a vulnerability scan entail? The vulnerability scanning process follows four steps. 1. Scope definition This involves determining IP ranges, hostnames, and FQDNs and DNS-resolvable targets for web applications and cloud resources. This step also differentiates systems by their criticality to business operations and excludes systems that cannot tolerate scanning. 2. Discovery & fingerprinting Before vulnerability identification begins, scanners must understand the target environment. This starts with identifying active systems, analyzing their behavior, logging their services, and retrieving their versions from service banners and application-specific queries. 3. Vulnerability probing The scanner compares service versions against known vulnerable configurations. It then evaluates their security settings or patch level to determine if those systems lack critical security updates. 4. Reporting & raw data export This final phase is where a scanner takes its findings and turns them into actionable intelligence. For many scanners, this involves assigning CVSS scores (0-10) to quantify vulnerability impact. This report then feeds into the broader vulnerability management workflow. Is there only 1 type of vulnerability scanning? Vulnerability scanning is not limited to one form. In fact, there are eight major types to choose from: External vulnerability scans assess an attack surface from outside the corporate network perimeter, targeting cloud assets, public-facing web applications, and internet-exposed infrastructure. Internal vulnerability scans simulate the perspective of an authenticated user or an attacker with initial access to uncover opportunities for lateral movement, vectors for privilege escalation, or segmentation failures. Credentialed scans authenticate to target systems using legitimate credentials to provide "inside-out" visibility and reduce false positives. Uncredentialed scans operate without authentication, relying on external observation. These scans can carry higher false-positive rates because they cannot detect local vulnerabilities or audit system configurations. Network scans focus on infrastructure vulnerabilities, e.g., network devices, protocols, and services, to identify vulnerabilities that may enable lateral movement and man-in-the-middle attacks. Database scans check relational and NoSQL database systems for weak authentication, excessive privileges, configuration errors, and unpatched database engines. Website scans , aka dynamic application security testing (DAST), probe web apps for real-time vulnerabilities via the HTTP interface, e.g., injection flaws, authentication bypass, and security misconfigurations. Host-based scans deploy agents on endpoints (workstations, servers) for continuous vulnerability assessment, identifying new vulnerabilities as software is installed or updated. Limitations of Vulnerability Scanning Getting ahead of an adversary gives companies an edge in what is a volatile ecosystem. However, vulnerability scanning is by no means a comprehensive security practice. Let’s discuss why. Zero-day vulnerabilities Vulnerability scanners rely on known vulnerability fingerprints. So what happens when they encounter a strange pattern? Zero-day vulnerabilities, or new flaws unknown to vendors and security researchers, are invisible to signature-based detection, which means they can slip through and lead to incidents. Misconfiguration blindspots This is another limitation tied to only being able to identify known software vulnerabilities. Scanners struggle with business-logic flaws and complex misconfigurations, such as custom application logic errors, context-dependent weaknesses, and cloud-specific misconfigurations. Authentication challenges Many vulnerability scanners rely on remote or network-level assessments to detect system flaws. While they may detect exposed assets and services, they cannot access internal configurations or workflows. No behavioral insight Vulnerability scanners assess impressions and signatures, not behavior or activity . Without covering how systems handle actual inputs in real-world operations or an attack, the scanner may miss critical vulnerabilities and underestimate real-time risks. From bulk scanning to "context-aware" discovery Traditional vulnerability management follows a simple CVSS-centric approach: Identify all vulnerabilities, rank them by severity score (0-10), and patch from highest to lowest. But a CVSS score of 9.8 only answers "How bad could exploitation be?" rather than "How likely is exploitation?" Introducing smart scanning Smart scanning combines traditional vulnerability identification with threat intelligence, business context, and exploitation likelihood. It prioritizes vulnerabilities based on business risk rather than theoretical severity. The Exploit Prediction Scoring System (EPSS) is a data-driven model that estimates the probability of vulnerability exploitation in the next 30 days. A vulnerability with a 9.0 CVSS but a 0.1% EPSS receives lower priority than a 7.0 CVSS vulnerability with an 85% EPSS. Scan smart with AlgoSec AppViz Traditional vulnerability scanners answer one question: "What vulnerabilities exist?" AlgoSec AppViz answers the operationally critical follow-up: "Which vulnerabilities can attackers actually reach?" AlgoSec AppViz delivers business-specific value by prioritizing a detected vulnerability risk not only by severity but also by business criticality. This saves you precious time by generating actionable reports that better protect your business. Are you ready to move beyond traditional vulnerability scanning? Schedule a demo of AlgoSec today. Get the latest insights from the experts Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec | CSPM vs. CNAPP: Which Solution to Choose?

    Protecting cloud-based applications and workloads requires robust security solutions such as CSPM, CIEM and CWPP. CNAPP tries to answer... Cloud Security CSPM vs. CNAPP: Which Solution to Choose? Rony Moshkovich 2 min read Rony Moshkovich Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 11/24/22 Published Protecting cloud-based applications and workloads requires robust security solutions such as CSPM, CIEM and CWPP. CNAPP tries to answer all 3 but how do you know which solution is right for your specific organization? Ava Chawla, AlgoSec’s Global Head of Cloud Security unravels the differences between them and shares her expert opinion on the solution that offers the most value for organizations. What is Cloud Security Posture Management (CSPM)? A CSPM tool monitors the logs and configuration files of the services you use in your cloud environment. It will scan the entire cloud environment to detect and prevent misconfiguration errors. This is important because configurations in the cloud happen quickly and just as quickly introduce new threats into the environment. For robust ongoing protection, you need to monitor the environment continuously and automatically. Here’s where CSPM comes in. The best CSPM solutions implement configuration best practices and automatically initiate corrective actions to remove risks, thus improving cloud security, ensuring adherence to compliance policies, and reducing the likelihood of breaches. Additionally, they are agentless, do not require long configuration, and don’t add to your cloud bills by utilizing additional cloud resources. What is Cloud Infrastructure Entitlement Management (CIEM)? In cloud environments, identity goes beyond users and groups. It also plays a vital role in managing all the resources and services that need to access data. All these accesses happen very quickly and constitute a complex web of interactions. It’s crucial to know when and between whom these interactions occur to ensure that only legitimate resources can access or modify data. But as your cloud resources increase, the complexity of entitlements also grows. It’s not easy to keep track of these entitlements or to maintain the security-focused principle of least privilege (PoLP). CIEM tools are specialized identity-centric solutions to manage cloud access risk and govern entitlements in hybrid and multi-cloud environments. With CIEM, you can manage entitlements across all your cloud resources and maintain PoLP to mitigate the risk created by granting excessive permissions to cloud resources. What is a Cloud Workload Protection Platform (CWPP)? CWPP solutions manage cloud applications and workloads. They can reach back into on- prem environments and thus effectively detect and prevent security problems like malware and vulnerabilities across the entire hybrid landscape. CWPP solutions can scale automatically and support your organization as your cloud environment grows or changes. What is a Cloud Native Application Protection Platform (CNAPP)? Each of these solutions are geared towards a specific area of cloud security. CSPM prevents misconfiguration errors, CIEM platforms manage cloud access risks, and CWPP protects your assets and workloads. But what if you want a single solution that can completely manage the security of your cloud environment? Try a Cloud Native Application Protection Platform . CNAPP solutions combine security posture management, workload protection, and entitlement management into one single platform to provide comprehensive, holistic security across multi-cloud environments. Thus, you can protect your entire cloud estate with one solution instead of having to implement and manage multiple point solutions. Another advantage of a CNAPP tool is that it will enable you to “shift left”. Thus, you can not only secure applications in production environments, but also manage the runtime and DevOps aspects of security. For this reason, these platforms are aimed at both security professionals and DevOps practitioners. Conclusion and Next Steps A CNAPP solution is the most comprehensive solution. However, in today’s market there is no one tool that truly covers all the functionalities that CNAPP promises. Therefore, each organization should choose the solution that fits its immediate needs, including taking other considerations into account such as the skill level and the maturity of its cloud adoption. One important thing to remember: Regardless of the solution you choose, make sure it’s agentless. Agentless is important in today’s cloud security because agent-based solutions are hard to manage, expensive, and intrusive. If you’re looking for a modern agentless CSPM with container protection to safeguard your cloud-based application and workload data, then Prevasio might be the best option for you. Schedule a demo Related Articles Q1 at AlgoSec: What innovations and milestones defined our start to 2026? AlgoSec Reviews Mar 19, 2023 · 2 min read 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • Data center migration checklist + project plan template

    Minimize risks and maximize benefits with a successful data center migration Explore key considerations and strategies Data center migration checklist + project plan template Select a size Which network Can AlgoSec be used for continuous compliance monitoring? Yes, AlgoSec supports continuous compliance monitoring. As organizations adapt their security policies to meet emerging threats and address new vulnerabilities, they must constantly verify these changes against the compliance frameworks they subscribe to. AlgoSec can generate risk assessment reports and conduct internal audits on-demand, allowing compliance officers to monitor compliance performance in real-time. Security professionals can also use AlgoSec to preview and simulate proposed changes to the organization’s security policies. This gives compliance officers a valuable degree of lead-time before planned changes impact regulatory guidelines and allows for continuous real-time monitoring. Data center migration What is a data center migration? What are the four types of data center migration? What are data center migration best practices? How to plan for a successful data center migration? What are some common challenges of a data center migration? What are some common drawbacks of a data center migration? Checklist for a successful data center migration What are some data center migration tools? Get the latest insights from the experts Use these six best practices to simplify compliance and risk mitigation with the AlgoSec White paper Learn how AlgoSec can help you pass PCI-DSS Audits and ensure Solution overview See how this customer improved compliance readiness and risk Case study Schedule time with one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • 1, 2 ,3 punch on Network Segmentation | AlgoSec

    Robert Bigman is uniquely equipped to share actionable tips for hardening your network security against vulnerabilities Don’t miss this opportunity to learn the latest threats and how to handle them Webinars 1,2,3 punch on Network Segmentation The zero-trust network layer is a best practice to use when securing application connectivity. However, achieving zero trust for your organization requires multiple tools that work together. Join us for a conversation about: – Creating zero-trust in networks. – Integrating application connectivity with cloud, SDN, and on-prem network security controls. – Maintaining the network and micro-segmentation in harmony. June 8, 2022 Marco Raffaelli Akamai Asher Benbenisty Director of product marketing Relevant resources Defining & Enforcing a Micro-segmentation Strategy Read Document Building a Blueprint for a Successful Micro-segmentation Implementation Keep Reading Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Bridging NetOps and SecOps: An Experts’ Panel

    Silos hurt security NetworkSecurity is the responsibility of both NetOps SecOps In this panel with Cisco, Conscia AlgoSec security experts, we’ll share how to bring the teams together Webinars Bridging NetOps and SecOps: An Experts’ Panel Silos hurt security. Your network and its security are not managed by just one team. It is the responsibility of both NetOps and SecOps, but these teams don’t always play well together. In this security experts’ panel, Doug Hurd from Cisco, Henrik Skovfoged from Conscia, Oren Amiram and Tsippi Dach from AlgoSec will share how you can bring NetOps and SecOps teams together with Cisco ACI, Cisco Secure Workload (formerly Cisco Tetration) and AlgoSec. Discover how NetOps and SecOps teams can: Bridge the NetOps/SecOps divide, improve communication, and break down the silos between network and security. Align network, security, and business application owners Improve the entire network security with Cisco Secure Workload and firewall management Automate tasks and gain network traffic visibility of networks and security controls for threat detection, analysis and response across Cisco ACI and the entire hybrid and multi-vendor network. March 16, 2021 Alex Hilton Chief Executive at Cloud Industry Forum (CIF) Tsippi Dach Director of marketing communications Relevant resources Cisco & AlgoSec achieving application-driven security across your hybrid network Keep Reading DevSecOps: Putting the Sec into the DevOps Keep Reading Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • Micro-segmentation – from Strategy to Execution | AlgoSec

    A ZeroTrust network architecture mitigates risk by only providing the minimally required access to your network resources But implementing it is easier said than done Webinars Micro-segmentation – from Strategy to Execution Organizations heavily invest in security solutions to keep their networks safe, but still struggle to close the security gaps. Micro-segmentation helps protect against the lateral movement of malware and minimizes the risk of insider threats. Micro-segmentation has received lots of attention as a possible solution, but many IT security professionals aren’t sure where to begin or what approach to take. In this practical webinar, Prof. Avishai Wool, AlgoSec’s CTO and co-founder will guide you through each stage of a micro-segmentation project – from developing the correct micro-segmentation strategy to effectively implementing it and continually maintaining your micro-segmented network. Register now for this live webinar and get a practical blueprint to creating your micro-segmentation policy: What is micro-segmentation. Common pitfalls in micro-segmentation projects and how to avoid them. The stages of a successful micro-segmentation project. The role of policy change management and automation in micro-segmentation. Don’t forget to also click on the links in the Attachments tab. July 7, 2020 Prof. Avishai Wool CTO & Co Founder AlgoSec Relevant resources Microsegmentation Defining Logical Segments Watch Video Micro-Segmentation based Network Security Strategies Keep Reading Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec | The importance of bridging NetOps and SecOps in network management

    Tsippi Dach, Director of Communications at AlgoSec, explores the relationship between NetOps and SecOps and explains why they are the... DevOps The importance of bridging NetOps and SecOps in network management Tsippi Dach 2 min read Tsippi Dach Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 4/16/21 Published Tsippi Dach, Director of Communications at AlgoSec, explores the relationship between NetOps and SecOps and explains why they are the perfect partnership The IT landscape has changed beyond recognition in the past decade or so. The vast majority of businesses now operate largely in the cloud, which has had a notable impact on their agility and productivity. A recent survey of 1,900 IT and security professionals found that 41 percent or organizations are running more of their workloads in public clouds compared to just one-quarter in 2019. Even businesses that were not digitally mature enough to take full advantage of the cloud will have dramatically altered their strategies in order to support remote working at scale during the COVID-19 pandemic. However, with cloud innovation so high up the boardroom agenda, security is often left lagging behind, creating a vulnerability gap that businesses can little afford in the current heightened risk landscape. The same survey found the leading concern about cloud adoption was network security (58%). Managing organizations’ networks and their security should go hand-in-hand, but, as reflected in the survey, there’s no clear ownership of public cloud security. Responsibility is scattered across SecOps, NOCs and DevOps, and they don’t collaborate in a way that aligns with business interests. We know through experience that this siloed approach hurts security, so what should businesses do about it? How can they bridge the gap between NetOps and SecOps to keep their network assets secure and prevent missteps? Building a case for NetSecOps Today’s digital infrastructure demands the collaboration, perhaps even the convergence, of NetOps and SecOps in order to achieve maximum security and productivity. While the majority of businesses do have open communication channels between the two departments, there is still a large proportion of network and security teams working in isolation. This creates unnecessary friction, which can be problematic for service-based businesses that are trying to deliver the best possible end-user experience. The reality is that NetOps and SecOps share several commonalities. They are both responsible for critical aspects of a business and have to navigate constantly evolving environments, often under extremely restrictive conditions. Agility is particularly important for security teams in order for them to keep pace with emerging technologies, yet deployments are often stalled or abandoned at the implementation phase due to misconfigurations or poor execution. As enterprises continue to deploy software-defined networks and public cloud architecture, security has become even more important to the network team, which is why this convergence needs to happen sooner rather than later. We somehow need to insert the network security element into the NetOps pipeline and seamlessly make it just another step in the process. If we had a way to automatically check whether network connectivity is already enabled as part of the pre-delivery testing phase, that could, at least, save us the heartache of deploying something that will not work. Thankfully, there are tools available that can bring SecOps and NetOps closer together, such as Cisco ACI , Cisco Secure Workload and AlgoSec Security Management Solution . Cisco ACI, for instance, is a tightly coupled policy-driven solution that integrates software and hardware, allowing for greater application agility and data center automation. Cisco Secure Workload (previously known as Tetration), is a micro-segmentation and cloud workload protection platform that offers multi-cloud security based on a zero-trust model. When combined with AlgoSec, Cisco Secure Workload is able to map existing application connectivity and automatically generate and deploy security policies on different network security devices, such as ACI contract, firewalls, routers and cloud security groups. So, while Cisco Secure Workload takes care of enforcing security at each and every endpoint, AlgoSec handles network management. This is NetOps and SecOps convergence in action, allowing for 360-degree oversight of network and security controls for threat detection across entire hybrid and multi-vendor frameworks. While the utopian harmony of NetOps and SecOps may be some way off, using existing tools, processes and platforms to bridge the divide between the two departments can mitigate the ‘silo effect’ resulting in stronger, safer and more resilient operations. We recently hosted a webinar with Doug Hurd from Cisco and Henrik Skovfoged from Conscia discussing how you can bring NetOps and SecOps teams together with Cisco and AlgoSec. You can watch the recorded session here . Schedule a demo Related Articles Q1 at AlgoSec: What innovations and milestones defined our start to 2026? AlgoSec Reviews Mar 19, 2023 · 2 min read 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • Cisco ACI & AlgoSec: Achieving Application-driven Security Across your Hybrid Network | AlgoSec

    Webinars Cisco ACI & AlgoSec: Achieving Application-driven Security Across your Hybrid Network As your network extends into hybrid and multi-cloud environments, including software-defined networks such as Cisco ACI, managing security policies within your hybrid estate becomes more and more complex. Because each part of your network estate is managed in its own silo, it’s tough to get a full view of your entire network. Making changes across your entire network is a chore and validating your entire network’s security is virtually impossible. Learn how to unify, consolidate, and automate your entire network security policy management including both within the Cisco ACI fabric and elements outside the fabric. In this session Omer Ganot, AlgoSec’s Product Manager, will discuss how to: Get full visibility of your entire hybrid network estate, including items within the Cisco ACI security environment, as well as outside it. Unify, consolidate, and automate your network security policy management, including elements within and outside of the Cisco ACI fabric. Proactively assess risk throughout your entire network, including Cisco ACI contracts, and recommend the necessary changes to eliminate misconfigurations and compliance violations February 5, 2020 Omer Ganot Product Manager Relevant resources AlgoSec Joins Cisco’s Global Price List Keep Reading Migrating and Managing Security Policies in a Segmented Data Center Keep Reading AlgoSec Cisco ACI App Center Demo Watch Video Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

  • AlgoSec | Sunburst Backdoor, Part II: DGA & The List of Victims

    Previous Part of the analysis is available here. Next Part of the analysis is available here. Update from 19 December 2020: ‍Prevasio... Cloud Security Sunburst Backdoor, Part II: DGA & The List of Victims Rony Moshkovich 2 min read Rony Moshkovich Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 12/17/20 Published Previous Part of the analysis is available here . Next Part of the analysis is available here . Update from 19 December 2020: Prevasio would like to thank Zetalytics for providing us with an updated (larger) list of passive (historic) DNS queries for the domains generated by the malware. As described in the first part of our analysis, the DGA (Domain Generation Algorithm) of the Sunburst backdoor produces a domain name that may look like: fivu4vjamve5vfrtn2huov[.]appsync-api.us-west-2[.]avsvmcloud[.]com The first part of the domain name (before the first dot) consists of a 16-character random string, appended with an encoded computer’s domain name. This is the domain in which the local computer is registered. From the example string above, we can conclude that the encoded computer’s domain starts from the 17th character and up until the dot (highlighted in yellow): fivu4vjamve5vfrt n2huov In order to encode a local computer’s domain name, the malware uses one of 2 simple methods: Method 1 : a substitution table, if the domain name consists of small letters, digits, or special characters ‘-‘, ‘_’, ‘.’ Method 2 : base64 with a custom alphabet, in case of capital letters present in the domain name Method 1 In our example, the encoded domain name is “n2huov” . As it does not have any capital letters, the malware encodes it with a substitution table “rq3gsalt6u1iyfzop572d49bnx8cvmkewhj” . For each character in the domain name, the encoder replaces it with a character located in the substitution table four characters right from the original character. In order to decode the name back, all we have to do is to replace each encoded character with another character, located in the substitution table four characters left from the original character. To illustrate this method, imagine that the original substitution table is printed on a paper strip and then covered with a card with 6 perforated windows. Above each window, there is a sticker note with a number on it, to reflect the order of characters in the word “n2huov” , where ‘n’ is #1, ‘2’ is #2, ‘h’ is #3 and so on: Once the paper strip is pulled by 4 characters right, the perforated windows will reveal a different word underneath the card: “domain” , where ‘d’ is #1, ‘o’ is #2, ‘m’ is #3, etc.: A special case is reserved for such characters as ‘0’ , ‘-‘ , ‘_’ , ‘.’ . These characters are encoded with ‘0’ , followed with a character from the substitution table. An index of that character in the substitution table, divided by 4, provides an index within the string “0_-.” . The following snippet in C# illustrates how an encoded string can be decoded: static string decode_domain( string s) { string table = "rq3gsalt6u1iyfzop572d49bnx8cvmkewhj" ; string result = "" ; for ( int i = 0 ; i < s.Length; i++) { if (s[i] != '0' ) { result += table[(table.IndexOf(s[i]) + table.Length - 4 ) % table.Length]; } else { if (i < s.Length - 1 ) { if (table.Contains(s[i + 1 ])) { result += "0_-." [table.IndexOf(s[i + 1 ]) % 4 ]; } else { break ; } } i++; } } return result; } Method 2 This method is a standard base64 encoder with a custom alphabet “ph2eifo3n5utg1j8d94qrvbmk0sal76c” . Here is a snippet in C# that provides a decoder: public static string FromBase32String( string str) { string table = "ph2eifo3n5utg1j8d94qrvbmk0sal76c" ; int numBytes = str.Length * 5 / 8 ; byte [] bytes = new Byte[numBytes]; int bit_buffer; int currentCharIndex; int bits_in_buffer; if (str.Length < 3 ) { bytes[ 0 ] = ( byte )(table.IndexOf(str[ 0 ]) | table.IndexOf(str[ 1 ]) << 5 ); return System.Text.Encoding.UTF8.GetString(bytes); } bit_buffer = (table.IndexOf(str[ 0 ]) | table.IndexOf(str[ 1 ]) << 5 ); bits_in_buffer = 10 ; currentCharIndex = 2 ; for ( int i = 0 ; i < bytes.Length; i++) { bytes[i] = ( byte )bit_buffer; bit_buffer >>= 8 ; bits_in_buffer -= 8 ; while (bits_in_buffer < 8 && currentCharIndex < str.Length) { bit_buffer |= table.IndexOf(str[currentCharIndex++]) << bits_in_buffer; bits_in_buffer += 5 ; } } return System.Text.Encoding.UTF8.GetString(bytes); } When the malware encodes a domain using Method 2, it prepends the encrypted string with a double zero character: “00” . Following that, extracting a domain part of an encoded domain name (long form) is as simple as: static string get_domain_part( string s) { int i = s.IndexOf( ".appsync-api" ); if (i > 0 ) { s = s.Substring( 0 , i); if (s.Length > 16 ) { return s.Substring( 16 ); } } return "" ; } Once the domain part is extracted, the decoded domain name can be obtained by using Method 1 or Method 2, as explained above: if (domain.StartsWith( "00" )) { decoded = FromBase32String(domain.Substring( 2 )); } else { decoded = decode_domain(domain); } Decrypting the Victims’ Domain Names To see the decoder in action, let’s select 2 lists: List #1 Bambenek Consulting has provided a list of observed hostnames for the DGA domain. List #2 The second list has surfaced in a Paste bin paste , allegedly sourced from Zetalytics / Zonecruncher . NOTE: This list is fairly ‘noisy’, as it has non-decodable domain names. By feeding both lists to our decoder, we can now obtain a list of decoded domains, that could have been generated by the victims of the Sunburst backdoor. DISCLAIMER: It is not clear if the provided lists contain valid domain names that indeed belong to the victims. It is quite possible that the encoded domain names were produced by third-party tools, sandboxes, or by researchers that investigated and analysed the backdoor. The decoded domain names are provided purely as a reverse engineering exercise. The resulting list was manually processed to eliminate noise, and to exclude duplicate entries. Following that, we have made an attempt to map the obtained domain names to the company names, using Google search. Reader’s discretion is advised as such mappings could be inaccurate. Decoded Domain Mapping (Could Be Inaccurate) hgvc.com Hilton Grand Vacations Amerisaf AMERISAFE, Inc. kcpl.com Kansas City Power and Light Company SFBALLET San Francisco Ballet scif.com State Compensation Insurance Fund LOGOSTEC Logostec Ventilação Industrial ARYZTA.C ARYZTA Food Solutions bmrn.com BioMarin Pharmaceutical Inc. AHCCCS.S Arizona Health Care Cost Containment System nnge.org Next Generation Global Education cree.com Cree, Inc (semiconductor products) calsb.org The State Bar of California rbe.sk.ca Regina Public Schools cisco.com Cisco Systems pcsco.com Professional Computer Systems barrie.ca City of Barrie ripta.com Rhode Island Public Transit Authority uncity.dk UN City (Building in Denmark) bisco.int Boambee Industrial Supplies (Bisco) haifa.edu University of Haifa smsnet.pl SMSNET, Poland fcmat.org Fiscal Crisis and Management Assistance Team wiley.com Wiley (publishing) ciena.com Ciena (networking systems) belkin.com Belkin spsd.sk.ca Saskatoon Public Schools pqcorp.com PQ Corporation ftfcu.corp First Tech Federal Credit Union bop.com.pk The Bank of Punjab nvidia.com NVidia insead.org INSEAD (non-profit, private university) usd373.org Newton Public Schools agloan.ads American AgCredit pageaz.gov City of Page jarvis.lab Erich Jarvis Lab ch2news.tv Channel 2 (Israeli TV channel) bgeltd.com Bradford / Hammacher Remote Support Software dsh.ca.gov California Department of State Hospitals dotcomm.org Douglas Omaha Technology Commission sc.pima.gov Arizona Superior Court in Pima County itps.uk.net IT Professional Services, UK moncton.loc City of Moncton acmedctr.ad Alameda Health System csci-va.com Computer Systems Center Incorporated keyano.local Keyano College uis.kent.edu Kent State University alm.brand.dk Sydbank Group (Banking, Denmark) ironform.com Ironform (metal fabrication) corp.ncr.com NCR Corporation ap.serco.com Serco Asia Pacific int.sap.corp SAP mmhs-fla.org Cleveland Clinic Martin Health nswhealth.net NSW Health mixonhill.com Mixon Hill (intelligent transportation systems) bcofsa.com.ar Banco de Formosa ci.dublin.ca. Dublin, City in California siskiyous.edu College of the Siskiyous weioffice.com Walton Family Foundation ecobank.group Ecobank Group (Africa) corp.sana.com Sana Biotechnology med.ds.osd.mi US Gov Information System wz.hasbro.com Hasbro (Toy company) its.iastate.ed Iowa State University amr.corp.intel Intel cds.capilanou. Capilano University e-idsolutions. IDSolutions (video conferencing) helixwater.org Helix Water District detmir-group.r Detsky Mir (Russian children’s retailer) int.lukoil-int LUKOIL (Oil and gas company, Russia) ad.azarthritis Arizona Arthritis and Rheumatology Associates net.vestfor.dk Vestforbrænding allegronet.co. Allegronet (Cloud based services, Israel) us.deloitte.co Deloitte central.pima.g Pima County Government city.kingston. City of Kingston staff.technion Technion – Israel Institute of Technology airquality.org Sacramento Metropolitan Air Quality Management District phabahamas.org Public Hospitals Authority, Caribbean parametrix.com Parametrix (Engineering) ad.checkpoint. Check Point corp.riotinto. Rio Tinto (Mining company, Australia) intra.rakuten. Rakuten us.rwbaird.com Robert W. Baird & Co. (Financial services) ville.terrebonn Ville de Terrebonne woodruff-sawyer Woodruff-Sawyer & Co., Inc. fisherbartoninc Fisher Barton Group banccentral.com BancCentral Financial Services Corp. taylorfarms.com Taylor Fresh Foods neophotonics.co NeoPhotonics (optoelectronic devices) gloucesterva.ne Gloucester County magnoliaisd.loc Magnolia Independent School District zippertubing.co Zippertubing (Manufacturing) milledgeville.l Milledgeville (City in Georgia) digitalreachinc Digital Reach, Inc. deniz.denizbank DenizBank thoughtspot.int ThoughtSpot (Business intelligence) lufkintexas.net Lufkin (City in Texas) digitalsense.co Digital Sense (Cloud Services) wrbaustralia.ad W. R. Berkley Insurance Australia christieclinic. Christie Clinic Telehealth signaturebank.l Signature Bank dufferincounty. Dufferin County mountsinai.hosp Mount Sinai Hospital securview.local Securview Victory (Video Interface technology) weber-kunststof Weber Kunststoftechniek parentpay.local ParentPay (Cashless Payments) europapier.inte Europapier International AG molsoncoors.com Molson Coors Beverage Company fujitsugeneral. Fujitsu General cityofsacramento City of Sacramento ninewellshospita Ninewells Hospital fortsmithlibrary Fort Smith Public Library dokkenengineerin Dokken Engineering vantagedatacente Vantage Data Centers friendshipstateb Friendship State Bank clinicasierravis Clinica Sierra Vista ftsillapachecasi Apache Casino Hotel voceracommunicat Vocera (clinical communications) mutualofomahabanMutual of Omaha Bank Schedule a demo Related Articles Q1 at AlgoSec: What innovations and milestones defined our start to 2026? AlgoSec Reviews Mar 19, 2023 · 2 min read 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • AlgoSec | Compliance Made Easy: How to improve your risk posture with automated audits

    Tal Dayan, security expert for AlgoSec, discusses the secret to passing audits seamlessly and how to introduce automated compliance... Auditing and Compliance Compliance Made Easy: How to improve your risk posture with automated audits Tal Dayan 2 min read Tal Dayan Short bio about author here Lorem ipsum dolor sit amet consectetur. Vitae donec tincidunt elementum quam laoreet duis sit enim. Duis mattis velit sit leo diam. Tags Share this article 4/29/21 Published Tal Dayan, security expert for AlgoSec, discusses the secret to passing audits seamlessly and how to introduce automated compliance Compliance standards come in many different shapes and sizes. Some organizations set their own internal policies, while others are subject to regimented global frameworks such as PCI DSS , which protects customers’ card payment details; SOX to safeguard financial information or HIPAA , which protects patients’ healthcare data. Regardless of which industry you operate in, regular auditing is key to ensuring your business retains its risk posture whilst also remaining compliant. The problem is that running manual risk and security audits can be a long, drawn-out, and tedious affair. A 2020 report from Coalfire and Omdia  found that for the majority of organizations, growing compliance obligations are now consuming 40% or more of IT security budgets and threaten to become an unsustainable cost.  The report suggests two reasons for this growing compliance burden.  First, compliance standards are changing from point-in-time reviews to continuous, outcome-based requirements. Second, the ongoing cyber-skills shortage is stretching organizations’ abilities to keep up with compliance requirements. This means businesses tend to leave them until the last moment, leading to a rushed audit that isn’t as thorough as it could be, putting your business at increased risk of a penalty fine or, worse, a data breach that could jeopardize the entire organization. The auditing process itself consists of a set of requirements that must be created for organizations to measure themselves against. Each rule must be manually analyzed and simulated before it can be implemented and used in the real world. As if that wasn’t time-consuming enough, every single edit to a rule must also be logged meticulously. That is why automation plays a key role in the auditing process. By striking the right balance between automated and manual processes, your business can achieve continuous compliance and produce audit reports seamlessly. Here is a six-step strategy that can set your business on the path to sustainable and successful ongoing auditing preservation: Step 1: Gather information This step will be the most arduous but once completed it will become much easier to sustain. This is when you’ll need to gather things like security policies, firewall access logs, documents from previous audits and firewall vendor information – effectively everything you’d normally factor into a manual security audit. Step 2: Define a clear change management process A good change management process is essential to ensure traceability and accountability when it comes to firewall changes. This process should confirm that every change is properly authorized and logged as and when it occurs, providing a picture of historical changes and approvals. Step 3: Audit physical & OS security With the pandemic causing a surge in the number of remote workers and devices used, businesses must take extra care to certify that every endpoint is secured and up-to-date with relevant security patches. Crucially, firewall and management services should also be physically protected, with only designated personnel permitted to access them. Step 4: Clean up & organize rule base As with every process, the tidier it is, the more efficient it is. Document rules and naming conventions should be enforced to ensure the rule base is as organized as possible, with identical rules consolidated to keep things concise. Step 5: Assess & remediate risk Now it’s time to assess each rule and identify those that are particularly risky and prioritize them by severity. Are there any that violate corporate security policies? Do some have “ANY” and a permissive action? Make a list of these rules and analyze them to prepare plans for remediation and compliance. Step 6: Continuity & optimization Now it’s time to simply hone the first five steps and make these processes as regular and streamlined as possible. By following the above steps and building out your own process, you can make day-to-day compliance and auditing much more manageable. Not only will you improve your compliance score, you’ll also be able to maintain a sustainable level of compliance without the usual disruption and hard labor caused by cumbersome and expensive manual processes. To find out more about auditing automation and how you can master compliance, watch my recent webinar and visit our firewall auditing and compliance page. Schedule a demo Related Articles Q1 at AlgoSec: What innovations and milestones defined our start to 2026? AlgoSec Reviews Mar 19, 2023 · 2 min read 2025 in review: What innovations and milestones defined AlgoSec’s transformative year in 2025? AlgoSec Reviews Mar 19, 2023 · 2 min read Navigating Compliance in the Cloud AlgoSec Cloud Mar 19, 2023 · 2 min read Speak to one of our experts Speak to one of our experts Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Schedule a call

  • 5 Pillars for advanced cloud security | AlgoSec

    Secure your cloud environment with just 5 pillars Learn how Prevasio CNAPP’s innovative features and robust architecture offers a comprehensive defense mechanism that goes beyond traditional security measures Webinars 5 Pillars for advanced cloud security In this webinar you’ll discover how Prevasio CNAPP’s cutting-edge features and resilient architecture redefine cloud security, providing a comprehensive defense mechanism that transcends conventional security measures. Gain a deep understanding of the innovative strategies and advanced technologies that make Prevasio CNAPP an indispensable ally in safeguarding your critical data and applications. June 13, 2023 Jacqueline Basil Product Marketing Manager Relevant resources Cloud migrations made simpler: Safe, Secure and Successful Migrations Keep Reading AlgoSec Cloud - Cloud security policy and configuration management made simple Read Document 6 best practices to stay secure in the hybrid cloud Read Document Choose a better way to manage your network Choose a better way to manage your network Work email* First name* Last name* Company* country* Select country... Short answer* By submitting this form, I accept AlgoSec's privacy policy Continue

bottom of page