• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • HelpSystems Goes Phishing For Cyber Threat Hunter

    October 25, 2021 Alex Woodie

    HelpSystems dipped into the security pond again with its acquisition last week of PhishLabs, a Canadian company that develops technology designed to protect organizations from various Internet-based threats, including malicious emails, account takeover, and data leakage. As is the case with most of HelpSystems’ acquisitions, its IBM i customer are expected to be among the beneficiaries.

    For over a decade, PhishLabs has been developing a security platform designed to find and identify and counteract threats to customers. As its name suggests, the company got its start with identifying phishing attacks. Its founder and chief technology officer, John LaCour, grew frustrated with the endless game of “whack-a-mole” that he decided to take a more in-depth approach to rooting out the scourge.

    But as the security threat landscape has evolved, so too has the company’s offerings. Today, the PhishLabs Platform uses a combination of Web crawlers, machine learning technology, and visualization tools to help companies prevent themselves from falling victim to the world’s growing legion of cyber criminals, digital thieves, and Internet-based scam artists.

    Through its PhishLabs Platform, the company monitors “thousands of social media sources and ingest data from hundreds of public and private data feeds,” it says on its website. “We also integrate data from client-specific sources such as referrer logs and any third party feeds,” including security information and event management systems (SIEMs), security orchestration, automation, and response products (SOARs), threat intelligence platforms (TIPs), and intrusion detection and preventing systems (IDPS).

    PhishLabs Platform then brings proprietary algorithms and advanced analytics to bear on the data. If a real threat is identified (as opposed to a false positive, which the company notes are more prevalent than true positives) the platform gives operators mitigation measures, such as kill switches, “takedown APIs,” “fastlanes,” and browser-blocking tools to neutralize the threat.

    PhishLabs aims to protect customers from various threats, including account credential theft and takeover scams, social media attacks, business email compromise (BEC), and “vishing,” which involves the use of phone calls and voice mail to induce individuals to reveal personal information, among others.

    “Different threats demand different approaches,” the company says. “For example, look-alike domains and fake social accounts are two very different problems that require distinct collection, curation, and mitigation. Using the same technology and operations for both leads to neither being addressed well.”

    HelpSystems was impressed enough with the Mississauga, Ontario-based company make it its sixth acquisition of the year last week. According to HelpSystems chief executive officer Kate Bolseth, PhishLabs will help prevent blind spots from developing at companies while they are modernizing their applications.

    “Digital transformation has made it critical for security teams to have visibility across the digital landscape and to quickly respond to both internal and external threats,” Bolseth says in a statement announcing the deal. “PhishLabs’ ongoing intelligence collection, curation, and threat mitigation safeguards organizations’ critical digital assets and provides peace of mind for customers across the globe.”

    PhishLabs adds to HelpSystems’ growing portfolio of security-based companies that it has acquired over the last several years. In May, it acquired two Northern California security firms, including Beyond Security, which specializes in developing tools for automatically scanning complex networks and applications for security vulnerabilities, and Agari, which specializes in protecting companies against email-based threats, including phishing and BEC scams.

    The acquisition of PhishLabs is the 11th straight security-related acquisition of the past three years. Starting with its acquisition of Core Security in February 2019, HelpSystems nabbed a string of security firms, including Clearswift (December 2019), Strategic Cyber (March 2020), TITUS (June 2020, Boldon James (June 2020), Vera (December 2020), File Catalyst (January 2021), and Digital Defense (February 2020), before acquiring Beyond Security and Agari earlier this year.

    Tony Prince, chief executive officer of PhishLabs, says he’s looking forward to working with the large pool of security expertise that HelpSystems has accumulated over the years. “Our combined resources and expertise put us in a strong position to partner more strategically with our clients and help their security teams thrive as the threat landscape evolves,” Prince states in the press release.

    RELATED STORIES

    Security Vendor Shopping Spree Continues for HelpSystems

    HelpSystems Acquires Data Security, File Transfer Companies

    HelpSystems Gets New Investors, CEO

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: and response products, API, Automation, HelpSystems, IBM i, IDPS, intrusion detection and preventing systems, PhishLabs, security information and event management systems, security orchestration, SIEM, SOAR, threat intelligence platforms, TIP

    Sponsored by
    Raz-Lee Security

    With COVID-19 wreaking havoc, cybercriminals are taking advantage of the global impact that it has had on our families, our businesses and our societies. It is more important now than ever to ensure that IT systems are protected, so that when all of this is behind us, we can get back to business as usual as quickly as possible.

    iSecurity Anti-Ransomware protects organizations against ransomware attacks and other kinds of malware that may access and change business-critical data on your IBM i. It even protects against zero-day attacks. Anti-Viruses can only report on the damage an attack has caused, but not stop it.

    iSecurity Anti-Ransomware has been recently enhanced with a Self-Test feature that allows you to simulate a ransomware attack on your IBM i. The simulated attack is limited to the test folder and cannot harm any other folders or files. This new feature lets organizations see how they are protected against known or unknown ransomware.

    Key Features:

    • Real-time scanning for known and unknown ransomware threats.
    • Blocks and disconnects the intruder.
    • Instantaneously sends alerts to SIEM as well as the offending computer.
    • Self-Test for attack simulation
    • Classification of the attack based on log.
    • Automatic updates with the most current ransomware definitions.

    Contact us at https://www.razlee.com/anti-ransomware

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Various Power Systems Updates And Tweaks Guru: Quick And Handy RPG Output, Take 2

    Leave a Reply Cancel reply

TFH Volume: 31 Issue: 70

This Issue Sponsored By

  • Fresche Solutions
  • UCG Technologies
  • Connectria
  • Raz-Lee Security
  • WorksRight Software

Table of Contents

  • A Proper Accounting Of The Power Business
  • Talking Power Systems Deals With The Boss
  • Guru: Quick And Handy RPG Output, Take 2
  • HelpSystems Goes Phishing For Cyber Threat Hunter
  • Various Power Systems Updates And Tweaks

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • How Committed Is Big Blue To The IBM Cloud?
  • Immutable Copies Are Only As Good As Your Validation
  • Guru: IBM i *USRPRF Security
  • ERP Transitions Loom for SAP on IBM i Customers
  • Inflation Pumps Up Global IT Spending, Supply Chain Deflates It
  • COMMON Set for First Annual Conference in Three Years
  • API Operations Management for Safe, Powerful, and High Performance APIs
  • What’s New in IBM i Services and Networking
  • Four Hundred Monitor, May 18
  • IBM i PTF Guide, Volume 24, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.