Latest news with #StrikeReady


Associated Press
14-05-2025
- Business
- Associated Press
StrikeReady Launches on Google Cloud Marketplace to Deliver Day One Risk Resolution With AI-Native Security Operations Platform
Security teams can now deploy StrikeReady's AI-powered Security Command Center in minutes - deeply integrated with Google Cloud's suite of security solutions and built for instant value DALLAS, TX - StrikeReady has officially landed on Google Cloud Marketplace. Now part of the Google Cloud ISV Connect Program, StrikeReady is not just joining the ecosystem—it's broadening it. StrikeReady—a launchpad for the future of unified cyber defense—has graduated from the Google Springboard program. StrikeReady is not just adapting to the AI era—the company has pioneered it since 2019. StrikeReady leverages Google Gemini while integrating deeply with Google Security Operations—which includes Chronicle, Google Threat Intelligence—which includes Mandiant intelligence and VirusTotal, Google Security Command Center, Identity and Access Management, Gmail, and more—giving organizations a unified, vendor-neutral platform that reduces mean time to respond (MTTR) by up to 90%. Customers can deploy StrikeReady directly within their Google Cloud environments, which streamlines procurement, leverages existing Google Cloud budgets, and accelerates time to value. StrikeReady is a purpose-built platform that unifies fragmented tech stacks and supercharges security teams with automation that delivers functional AI on Day One. StrikeReady accelerates your risk management program by finally delivering risk resolution. You can integrate your Google Cloud and third-party tech stack, simplify and streamline analyst experience and collaborate while managing risk across your alerts, logs, assets, vulnerabilities, identities, and more. 'StrikeReady enables your team to fully deploy Google Cloud security solutions, Gemini AI model integration and automation—all on Day One,' said Yasir Khalid, Founder and CEO of StrikeReady. 'Unifying the user experience, while integrating collaboration in the StrikeReady platform, empowers users of any skill set to maximize their impact on investigating, remediating, and resolving risks to their organization. Key Differentiators: 'Bringing StrikeReady to Google Cloud Marketplace enables customers to quickly deploy and manage the StrikeReady platform on Google Cloud's trusted, global infrastructure,' said Dai Vu, Managing Director, Marketplace & ISV GTM Programs at Google Cloud. 'StrikeReady can now securely scale and support customers that want to use its AI-powered platform to help amplify their risk investigation, remediation and resolution efforts.' To begin a conversation on how you can transform your security operations with native AI on Day One, visit us below. About StrikeReady Founded in 2019, StrikeReady introduced the first unified, vendor-agnostic, AI-powered Security Command Center delivering full-spectrum risk visibility, intelligent threat management, and automated response from a single, integrated platform. By unifying identities, assets, vulnerabilities, and advanced simulations in one place, StrikeReady empowers organizations to proactively defend against modern threats and stay ahead of an ever-shifting cyber landscape. Moving beyond conventional AI, StrikeReady leverages its Large Action Model (LAM) to automate actions across the tech stack, creating a force multiplier for security teams seeking truly proactive risk management. Recognized by Gartner as the only Virtual Security Assistant in its Emerging Technologies report, StrikeReady is dedicated to reshaping the future of cybersecurity. For more information visit Media Contact Company Name: StrikeReady Contact Person: Cara Harbor Email: Send Email Country: United States Website: Press Release Distributed by To view the original version on ABNewswire visit: StrikeReady Launches on Google Cloud Marketplace to Deliver Day One Risk Resolution With AI-Native Security Operations Platform


Zawya
28-04-2025
- Business
- Zawya
GISEC Global 2025: Dubai Mobilises Global Cyber Defence Leaders to combat AI-driven cybercrime and ransomware
RELATED TOPICS CYBERSECURITY RELATED COMPANIES CrowdStrike Hldg Microsoft Deloitt Cisco Systems Qualys Cpx StrikeReady Dream Group Cloudflare Huawei Tech Honeywell Intl Lab Kasperskogo Spire Solutions Opswat Wck White Cyber Linkshadow From 6-8 May, 25,000+ cybersecurity experts will gather at the Middle East and Africa's largest cybersecurity event to secure the region's digital future against deepfake scams and critical infrastructure vulnerabilities Dubai, United Arab Emirates: With AI-driven cybercrime and ransomware attacks surging globally, GISEC Global 2025 returns to Dubai from May 6 - 8, bringing together the world's foremost leaders, innovators, and visionaries in a high-stakes effort to secure our digital future. GISEC Global transforms Dubai World Trade Centre into the epicentre of cybersecurity, uniting 450+ CISOs, 25,000 professionals from 160 countries, and 750+ brands—from tech giants like AWS, Huawei, and Microsoft to innovative startups—for MEA's most pivotal cyber event under the theme 'Securing an AI-Powered Future.' The year 2025 has been declared as the 'Year of Community' by His Highness Sheikh Mohamed bin Zayed Al Nahyan, President of the UAE, calling for collective action in building a connected and empowered society through AI and entrepreneurship. GISEC Global is strengthening the global cybersecurity community by fostering collaboration between governments, enterprises, and experts to secure our digital tomorrow. The 14th edition brings together critical focus areas from some of the leading players in the industry, including Huawei, AWS, Microsoft, Google Cloud Security, CISCO, Deloitte, Kaspersky, Check Point, Cloudflare and Honeywell, alongside groundbreaking cybersecurity companies such as Spire Solutions, CPX, CyberKnight, LinkShadow, OPSWAT, Qualys, CrowdStrike, StrikeReady, and Dream Group. The three-day event will reinforce the UAE's position as a world leader in AI innovation and responsible AI deployment in the face of threat actors, blending global expertise with regional priorities, and with a strong emphasis on public-private collaboration, innovation, and talent development. These priorities come at a critical juncture. The World Economic Forum's Global Security Outlook 2025 report, published ahead of GISEC Global 2025, has shown that: 66% of organisations view AI as a game-changer in cybersecurity. Nearly half (47%) warn that generative AI is simultaneously arming hackers with scalable new attack vectors However, only 14% of organisations feel confidently equipped to respond These key insights highlight how fast the global cybersecurity market is changing – an ever-growing economic sector that is expected to reach $298.5 billion by 2028, according to Markets and Markets – a significant jump from the $190.4 billion in 2023. Nowhere is this urgency more apparent than in the Middle East, where 45% of organisations rank cyber risk mitigation as their top operational priority (PWC's 2024 Global Digital Trust Insights survey). As the region accelerates its digital transformation, GISEC Global 2025 arrives at a pivotal moment to shape its secure future. The 2025 edition introduces groundbreaking new features: Next-Gen Cyber Warriors Competition: The Student Hackathon transforms classrooms into cyber defence labs, where young talent tackles real-world scenarios in network security, threat analysis, and incident response. Critical Infrastructure Programme: The launch of OT Security Conference Track addresses the growing convergence of IT and operational technology, offering actionable strategies to protect vital systems from emerging vulnerabilities. Africa Cyber Resilience Initiative: As the continent's digital economy expands, GISEC launches dedicated roundtables with CISOs and national authorities to build continent-wide defences. GISEC AI: Explore polymorphic malware, adversarial AI, and deepfake scams. This year's largest AI in cybersecurity showcase will feature pressing topics including polymorphic malware, adverbial AI, deepfake scams and Gen AI tech. Launch of GISEC North Star: Cyber71, in strategic partnership with GISEC GLOBAL, will launch a series of high-impact initiatives at the region's largest platform for innovative cybersecurity startups. It will provide a dynamic space for cybersecurity startups to network, attract investment and scale their businesses. Dubai Cyber Challenge: Premiering at GISEC Global, Organised by DESC, an exclusive 'Capture the Flag' competition will be held for Dubai government entities as teams go head to head across two days, focusing on different trends such as web security, reverse engineering and digital forensics through various challenges. Dubai's hosting of GISEC Global 2025 cements the UAE's position as the world's cybersecurity leader, recently crowned #1 in the Global Cybersecurity Index 2024. The event serves as both a showcase of the nation's security achievements and a call to action for international collaboration in our interconnected digital future. H.E. Dr Mohamed Al-Kuwaiti, Head of the UAE Cybersecurity Council, said: "GISEC Global comes at a critical time as cyber threats grow more prevalent and sophisticated," says HE Dr. Mohamed Al Kuwaiti, Head of the UAE Cybersecurity Council. "In this 'Year of Community,' our partnership with GISEC underscores the UAE's commitment to uniting global stakeholders in addressing urgent cybersecurity challenges—from safeguarding data privacy and securing critical networks to countering advanced threats through AI-powered solutions. Through initiatives like the world's largest Global Cyber Drill and strategic collaborations at GISEC, we are turning the UAE's cybersecurity vision into action, ensuring a resilient digital future for all." H.E. Yousuf Al Shaibani, Director General of Dubai Electronic Security Center (DESC), said: "Dubai's rapid digital transformation is redefining the way we live, work, and connect, making cybersecurity more critical than ever. GISEC Global 2025 stands as a pivotal gathering where global experts converge to address emerging threats and pioneer the next generation of cyber resilience. At DESC, we are steadfast in our mission to safeguard Dubai's digital ecosystem by fostering collaboration, driving innovation, and implementing robust cyber defences. Our participation in GISEC reflects our commitment to shaping global cybersecurity discourse, sharing expertise, and ensuring that Dubai remains at the forefront of secure and intelligent digital progress." Trixie LohMirmand, EVP of Dubai World Trade Centre, GISEC Global organiser, said: 'Every year, the cybersecurity industry is dealing with new threats and opportunities with GISEC Global at the heart of driving impactful discussions and action from the worldwide ecosystem. This year will be no different as we bring the best minds together once again to Dubai World Trade Centre to explore ways to not only manage cyber risks effectively, which can have far-reaching implications if not dealt with adequately, but also build a safe future that will not impact our economies.' Sean Yang, Global Cybersecurity and Privacy Protection Officer of Huawei, Lead Strategic Partner of GISEC Global, said: 'We are delighted to be extending our long-term partnership with GISEC Global by becoming its Lead Strategic Partner for the 2025 edition. Huawei is committed to securing our shared digital future with governments, industry organisations, standardisation bodies, and enterprise stakeholders. Through such partnerships, we aim to be a reliable partner in the digital and intelligent world and provide our customers with competitive and secure product solutions. GISEC Global is a leading platform to exchange ideas and expertise, as well as collaborate in building a trustworthy digital environment of various partners that can address the challenges of today and tomorrow.' GISEC Global 2025 is hosted by the UAE Cybersecurity Council, and supported by Dubai Electronic Security Center (DESC), UAE Ministry of Interior and Dubai Police. About GISEC Global GISEC Global, Middle East & Africa's largest and most impactful cybersecurity event, will return to Dubai World Trade Centre for its 14th edition taking place from 6th to 8th May 2025, under the overarching theme of 'Securing an AI-Powered Future.' Following the monumental success of 2024, the super-connector event for the region's cybersecurity industry will bring together over 25,000 attendees, 750 exhibiting brands and 350-plus speakers hailing from over 160 countries. GISEC Global stands as the unrivalled platform for navigating the ever-evolving landscape of cybersecurity. More information: About Dubai World Trade Centre With a vision to make Dubai the world's leading destination for all major exhibitions, conferences and events, DWTC has evolved from being the regional forerunner of the fast-growing MICE industry into a multi-dimensional business catalyst, focusing on Venues, Events and Real Estate Management. Complementary to the primary service offerings are a range of value-added services from media/advertising, engineering and technical consultation and wedding planning, security, and hospitality.


Forbes
18-04-2025
- Business
- Forbes
Proving The Value Of SOCs When Nothing Is On Fire
Alex Lanstein is the CTO of StrikeReady, pioneering unified AI-powered Security Command Center solutions for Security Operations Centers. Every day, security operations center (SOC) professionals protect their companies' systems through proactive threat intelligence activities that include gathering information about potential cyberattacks, analyzing their impact and determining the most effective way to respond to them. During a cyberattack, the worth of an SOC is clear. When everything is burning down, SOCs are the firefighters working to protect an organization's systems. But how do SOCs demonstrate their worth when nothing is on fire? Unfortunately, some company decision makers may regard SOCs as the seatbelt they can remove because they haven't been in any accidents lately. Even though they're getting the benefits of the daily protections SOCs provide, when there's no clear evidence of this defense, companies may decide that the precautions aren't worth the cost. SOCs already know how valuable they are, but it doesn't matter if no one else sees what they bring to the table. As a result, it's important for SOCs to actively and consistently prove their worth by changing the way they operate. When SOCs have effectively warded off security breaches, it can be difficult for them to get the visibility and credibility they deserve because nothing is happening. And when nothing is happening, an organization's management may be left wondering what the SOC actually does—and why it's even necessary. To help make the business case for SOCs, leveraging metrics is key. There are numerous points in the analyst workflow that can be highlighted. • Extracting Indicators: SOCs regularly review threat intelligence reports. It's important to highlight the importance of this work. Outlining all of the domains, IP addresses, hashes and URLs that may have been problematic without their intervention demonstrates how many fires could have burned a company's system down—but didn't get a chance to ignite. • Checking Intelligence Feeds: Often, leaders are overlooking the effort spent to proactively block threats, and they assume the things being prevented are not 'novel.' But that is not necessarily the case. SOCs should show how they've extracted and searched for indicators that were caught by security tools, on a retroactive basis. To say it another way, there is very little finished threat intel about today's threats. Those intel products are released weeks or months from 'boom,' so you need to run a retrospective analysis to help tell a better story of the attacks you blocked three months ago. It didn't happen to you, but it did impact another organization. Otherwise, there would be no intel. • Reviewing Alerts: Security tools should be maximally implemented and effective, but are they really? SOCs should provide metrics about which tools are producing what quality of alerts on an ongoing basis. Oftentimes, cybersecurity vendors wax and wane with the quality of their detection capabilities, and management should be able to understand when that once-hot vendor starts to taper off in value. • Searching Logs: Alerts are only as good as the frequency at which they're generated. Leaders won't know about threats that no one was warned about, but SOCs will. They can communicate with decision makers about their ability to look at endpoint telemetry, network traffic and browser activity logs to find indicators of threats that were present, but never triggered an alert. Creating metrics about the time it takes to execute basic hunts (indicator-based searches) shows where telemetry and search horsepower could be improved. • Simulating Attacks: A simulation is a fire that never actually sparked, but one that could have. SOCs should execute controlled threat simulations in virtual environments to determine the effectiveness of security tools for detecting and responding to possible threats. Since organizations generally don't track these time-consuming tasks, letting executives know about simulations—or even showing one in action—can illustrate the importance of SOCs' work. Despite the various metrics SOCs can report to their organizations, they generally don't monitor their effectiveness. One major factor that precludes reporting on metrics is the manual effort it takes. Developing and updating connectors to collect, analyze and correlate threat intelligence information from various security tools would be extremely onerous. Although security orchestration tools do exist, they require companies to build their own playbooks and manage APIs that can frequently change. This means only the most sophisticated organizations with security engineers can create effective workflows—leaving other companies to toil with the more labor-intensive approach. However, this doesn't mean metrics should not be measured at all. If SOC analyst workflow metrics are too challenging to quantify and record, there is another way they can show their value: benchmarking. Establishing benchmarks allows SOCs to adopt a data-based strategy that boosts their effectiveness. This also allows them to illustrate how many reports have been handled, as well as how much time was spent on each phase of the process. Some of the questions SOCs can use as the foundation for measuring benchmarks include: • How long does it currently take to fully analyze one threat intelligence report? • How many reports should be reviewed per day or week to achieve threat coverage? • Where are the logjams? • Does a tool or manual workflow cause delays? • How can automation be used to increase the speed of these processes without jeopardizing the quality? Answering these questions can be a starting point for how SOCs present their daily activities in a way that's meaningful to management. Chances are, executives aren't aware of the numerous activities SOC analysts engage in when there's no obvious threat to manage. This problem can be solved by SOCs regularly documenting their efforts through weekly reports. Cybersecurity is a dynamic field, so organizations must shift from a defensive approach to managing threats proactively. However, in order to do this, SOCs must be able to demonstrate the importance of their roles and justify their budgets. Otherwise, leaders may come to the conclusion that SOCs just aren't needed. By creating performance benchmarks and measuring how effective they are, SOCs can prove that the data fires that never burn are the most important fires of all. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?