About Us

OVO Energy and Noetic Cyber Collaborated for Critical Cybersecurity

OVO Energy has chosen Noetic Cyber as a solution partner to assist them in gaining greater visibility and insights into their current cybersecurity posture. OVO is deploying the Noetic platform to better understand and contextualize their cyber risk. OVO Energy, the UK’s third-largest energy supplier, has adopted a cloud-first approach enabled by implementing a culture of technical autonomy in which OVO teams select the cloud platforms and services best suited to their specific needs.

Paul Ayers, CEO, and co-founder at Noetic Cyber commented, “OVO is known as an innovator in the UK energy market in its business model and approach to technology. Our partnership with them showcases that innovation as we’re working together to address a fundamental cybersecurity challenge in finding and securing unknown and unprotected assets.”

OVO’s security team requires an automated way to understand their cybersecurity landscape across cloud platforms, SaaS applications, on-premises systems, and others.  The team adopted a data model that supports multiple business units and product teams, allowing them to maintain their current agility while also ensuring that central visibility of security control coverage and configuration. It will secure the organization and meet the regulatory requirements of the UK’s critical national infrastructure.

The collaboration with Noetic will provide OVO with the integration of Noetic’s existing security and IT management tools to ingest security data, creating a multi-dimensional map of all assets in the organization and their cyber relationships. OVO team can identify security coverage gaps, cloud service misconfigurations, and security control violations, all of which are prioritized based on business criticality and potential impact.

The Noetic platform integrates with OVO’s existing tooling for EDR, vulnerability management, device control, application security, network monitoring, cloud management, and more to continuously discover, inventory, and manage all assets in OVO’s environment.

The Novetic platform can assist OVO in identifying and correcting security coverage gaps in common cloud and endpoint use cases. By mapping business criticality, asset exposure, and exploitability to the existing vulnerability process, critical insights into patching and vulnerability management. Providing more detailed information and context on affected assets to the security operations team for incident investigation. Working with GRC to ensure that all aspects of the OVO business build and manage controls based on a common understanding of security data.

Read more articles:

thatDot Launched Novelty Detector for Cybersecurity

Kroll and Armis Have Partnered for Cyber Resilience

Kroll and Armis have partnered to expand cyber preparedness and response services for operational technology (OT) and industrial control systems (ICS) to secure clients far beyond the traditional endpoint. Armis is a market leader in unified asset visibility and security, with a knowledge base of over two billion connected devices, particularly in the health care industry. Asset discovery, network configuration, and traffic flow capabilities provide Kroll incident responders with visibility into ICS and OT environments, which are continuously secured using Kroll Responder, a managed detection and response (MDR) solution.

Marc Brawner, Managing Director, and Global Head of Managed Services for Cyber Risk at Kroll commented, “Identifying and protecting difficult-to-manage OT and IoT devices is an increasingly critical aspect of a modern cyber security program. The proliferation of these devices and related vulnerabilities is opening new avenues of attack by threat actors. By bringing together our extensive experience in responding to thousands of incidents every year with the Armis platform, together we can significantly reduce these risks. We look forward to working with Armis to further strengthen our client’s cyber resiliency.”

Kroll’s experience responding to over 3,200 incidents per year, combined with Armis’ technical visibility and expertise, will drive threat intelligence, detection, and response capabilities. Kroll can reduce the risk exposure of OT and ICS environments for clients, make informed recommendations to improve resilience, and respond in the event of suspicious activity because of the partnership.

Kroll expanded its MDR capabilities by acquiring Redscan in 2021. Armis enhances Kroll’s MDR solution by incorporating Armis’ agentless architecture to secure clients’ environments far beyond the traditional endpoint.

David Creed, Vice President, Worldwide Service Providers at Armis stated, “By leveraging Armis’ industry-leading platform, this partnership will help both Kroll and Armis clients stay better protected against cyber risks. Together, Armis and Kroll are uniquely positioned with their capabilities and offerings to serve organizations across industries, providing enhanced preparedness, response, and unmatched visibility.”

Read more articles:

What is IoT Security?

Kivu and Fortalice partnered to provide cybersecurity services to their joint customers

Kivu Consulting, Inc. and Fortalice Solutions, LLC announced a strategic partnership to provide end-to-end cybersecurity services. These world-class organizations will be able to address rising customers’ demands for numerous cybersecurity areas as a result of their collaboration. Fortalice has  knowledge of offensive cybersecurity, security engineering, open-source intelligence, strategic communications, and risk and compliance experience. Kivu brings decades of experience in incident response, digital forensics, breach cleanup, and managed services to the table.

“Now more than ever, clients need cybersecurity firms to offer ‘best-in-class’ abilities across all their urgent needs. As a women-owned business headed by the first female CIO at the White House under George W. Bush, Fortalice’s excellence in handling incidents from triage to remediation perfectly complements Kivu’s reputation as the ‘go-to’ firm for incident response, post-breach remediation, and managed services,” said Chad Holmes, CEO of Kivu Consulting.

Organizations require advanced, distinct skillsets to plan for, respond to, and recover from breaches as bad actors become more sophisticated. Professionals with diversified and highly specialized backgrounds make up the Fortalice and Kivu Consulting teams. “The professionals at Fortalice and Kivu have spent time reimagining how to provide solutions that meet clients exactly where they are in that moment. Our combined teams bring to the industry some of the globe’s leading expert problem-solvers, many of whom have decades of experience”This combination assures our clients have access to a deeper bench of professionals, all at the top of their game, bringing the highest skill levels to all stages of cybersecurity,” said Theresa Payton, CEO of Fortalice Solutions.

Kivu and Fortalice will collaborate to service clients based on their needs as a result of the partnership. Together, the two companies will provide a broad range of services throughout the breach lifecycle.

T-Mobile’s Security breach now Affects 54.6 Million People

T-Mobile has continued to work around the clock on the forensic analysis and investigation into the cyberattack against T-Mobile systems while also taking a number of proactive steps to protect customers and others whose information may have been exposed.

Their investigation still underway and will take some time, but they are sure that they have blocked the bad actor’s access and egress points.

T-Mobile previously disclosed that personal information from roughly 7.8 million current T-Mobile postpaid customer accounts, including first and last names, dates of birth, Social Security numbers, and driver’s license/ID numbers, had been compromised. Phone numbers, as well as IMEI and IMSI information, the normal identifier numbers linked with a mobile phone, were also hacked, according to T-Mobile. In addition, another 5.3 million existing postpaid customer accounts have been discovered as having one or more linked customer names, addresses, dates of birth, phone numbers, IMEIs, and IMSIs fraudulently accessed. SSNs or driver’s license/ID details were not compromised in these other accounts.

T-Mobile previously disclosed that data files containing information on about 40 million past or potential T-Mobile customers, including first and last names, dates of birth, Social Security numbers, and driver’s license/ID numbers, had been compromised. Since then, another 667,000 former T-Mobile customers’ accounts have been accessed, with user names, phone numbers, addresses, and dates of birth exposed. SSNs or driver’s license/ID details were not compromised in these other accounts.

T-Mobile has also discovered further stolen data files, including phone numbers, IMEI numbers, and IMSI numbers. There was no personally identifying information in that data.

There is still no indication that any of the stolen files contained any consumer financial information, credit card information, debit card information, or other payment information.

Approximately 850,000 current T-Mobile prepaid customer names, phone numbers, and account PINs were exposed, according to T-Mobile. T-Mobile has reset ALL of the PINs on these accounts proactively. Additional dormant prepaid accounts were also accessed for similar information. Up to 52,000 names associated with current Metro by T-Mobile accounts may have been included as well. There was no personally identifiable information in any of these data sets. Furthermore, no former Sprint prepaid or Boost customers were among the T-Mobile files obtained.

T-Mobile is continuing to take steps to protect everyone who is at danger from this cyberattack, including those who were recently identified by T-Mobile. T-Mobile has communicated with millions of customers and others who have been affected, and is offering assistance in a variety of ways.