Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
New chart shows how fast a computer can crack your exact password — and simple tweaks to protect it
https://thehill.com/changing-america/enrichment/education/584713-new-chart-shows-how-fast-a-computer-can-crack-your
Excerpt:
The World Economic Forum released a series of tips to help inform people how to change their passwords to maximize security.
==================================================================
What is simpler than adding more characters, and complexity ('tweaks') to passwords?
What has better security?
What is less than half the cost?
The answer to these questions is Wave VSC 2.0 (MFA) for organizations!
=================================================================
Rethink cybersecurity and use Wave's awesome solutions!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Phishing remains the most common cause of data breaches, survey says
https://www.darkreading.com/edge-threat-monitor/phishing-remains-the-most-common-cause-of-data-breaches-survey-says
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Key Features:
Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
• Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies
==================================================================
I heard it once said - Alone we are smart. Together we are brilliant!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Colorado energy company loses 25 years of data after cyberattack while still rebuilding network
https://www.zdnet.com/article/colorado-energy-company-loses-25-years-of-data-after-cyberattack-still-rebuilding-network/
Excerpts:
We are committed to restoring our network and getting back to normal operations...
DMEA CEO Alyssa Clemsen Roberts said the impact on their systems was "extensive" and that a good portion of their saved data such as forms and documents was corrupted
"It's a bit of a surprise that we haven't seen more attacks on public utilities, but there is no question that more are coming." Nayyer explained.
==================================================================
If DMEA were using Wave solutions, these unknown and unapproved devices (hackers) would not have had access to the network to do all this damage! Wave solutions could be doing a much better job of protecting organizations like DMEA!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
Excerpt:
Security that’s confirmed, not assumed
With Wave, you’ll know that you’re secure. Because we start with the individual devices, you get a broad, deep view of your network. You can see exactly who’s on it, with what devices and what apps, at any given time. Just for example, if Bob goes home and tries to log onto Facebook with the company laptop, Wave can stop him.
A big piece of this heightened security is device authentication. Traditional two-factor authentication requires what amounts to two user IDs. But by using the TPMs inside your devices, Wave can confirm the identity of not only users, but also the devices they’re on. Combine that with fast, enforced encryption of sensitive data via your SEDs—all easily managed with Wave software—and your data is protected from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots … even (and no one else can say this) hardware keyloggers. Not to mention Bob.
Do we need to say that with Wave, compliance is no problem?
=================================================================
http://www.wavesys.com/compliance
With device-based security, compliance is simple!
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Windows 11 adoption nears 9%, but businesses are waiting
https://www.computerworld.com/article/3643074/windows-11-adoption-nears-9-but-businesses-are-waiting.html
==================================================================
The more business wait to upgrade to Window 11 machines, obviously the better off the environment is. While businesses wait to adopt Windows 11, smart businesses should turn on their already built-in hardware security (TPMs and SEDs), and do so by using Wave software! Otherwise, a good portion of the world will continue to have devices, data and networks that aren't properly protected!
Use data protection that actually works... Use Wave solutions!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Double Extortion Ransomware Victims Soar 935%
https://thecybersecurity.news/general-cyber-security-news/double-extortion-ransomware-victims-soar-935-14978/?nowprocket=1
Excerpts:
Researchers have recorded a 935% year-on-yr enhance in double extortion attacks, with info from more than 2300 providers posted on to ransomware extortion web-sites.
==================================================================
OVER 2300 COMPANIES' DATA ARE POSTED ONTO RANSOMWARE EXTORTION SITES! WAVE CAN PROVIDE THE DATA PROTECTION FOR ORGANIZATIONS THAT CAN STOP THE ABOVE FROM CONTINUING TO HAPPEN!
TIME FOR A GREAT CHANGE IN CYBERSECURITY.....TIME FOR WAVE!
==================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!
==================================================================
http://www.wavesys.com/data-protection
To keep data safe, arm your devices!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Ransomware actors steal data of 400K patients from LA Planned Parenthood
https://www.scmagazine.com/analysis/breach/ransomware-actors-steal-data-of-400k-patients-from-la-planned-parenthood
Excerpt:
The investigation found attackers gained access to the PPLA network between Oct. 9 and Oct. 17, wherein they were able to exfiltrate some files on the network.
=================================================================
If only Planned Parenthood LA and other organizations used Wave solutions to keep ransomware actors from accessing their networks, this cyber incident wouldn't have happened.
How? Only allow known and approved (authorized) devices access to your network. You can do this for your organization with Wave! This data breach should not have happened. Wave's solutions stop the problem; these other products (ie. continuous monitoring) don't fix it, like Wave can!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
FBI: Cuba ransomware breached 49 US critical infrastructure orgs
https://www.bleepingcomputer.com/news/security/fbi-cuba-ransomware-breached-49-us-critical-infrastructure-orgs/
=================================================================
Avoid these ransomware attacks and data breaches. It's time for organizations to wake up to the smell of sweet success of using Wave solutions!
Better security at less than half the cost!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Crooks are selling access to hacked networks. Ransomware gangs are their biggest customers
https://www.zdnet.com/article/theres-been-a-big-jump-in-crooks-selling-access-to-hacked-networks-ransomware-gangs-are-their-best-customers/
Dark web forum posts offering compromised VPN, RDP credentials and other ways into networks have tripled in the last year.
=================================================================
Use Wave VSC 2.0 (MFA) to stop the crooks!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
Excerpt:
What can it be used for?
What do you use your smart card for today? With the exception of keying open the door at work, Wave Virtual Smart Card can perform any of the services or applications you rely on your smart card for today. Secure VPN, WiFi, remote desktop, cloud applications – it can all be done with a virtual smart card.
==================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Suspected Chinese hackers breach more US defense and tech firms
https://www.cnn.com/2021/12/02/politics/china-hackers-espionage-defense-contractors/index.html
=================================================================
There are over 100+ companies (TCG) that support trusted computing, and two of their hardware security standards (TPM and SED) need to be activated for better security! Not using these standards has sent the world into a downward spiral within the cybersecurity realm. Wave and its software along with this hardware security could protect organizations so much better than software security alone The above posted article just shows that our current cybersecurity is not working.
Rethink cybersecurity and use Wave's awesome solutions!
=================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
=================================================================
With device based security, compliance is simple!
http://www.wavesys.com/compliance
=================================================================
To keep your data safe, arm your devices!
http://www.wavesys.com/data-protection
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/products/wave-virtual-smart-card
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
What the SEC Requires From Businesses After a Data Breach
https://securityintelligence.com/articles/sec-business-data-breach/
Consumers have become wary of data breaches and the decreased safety of their personal information. However, the cost of a data breach is no longer only a matter of money and your company’s good name. There is now a third critical reason to pay attention: the U.S. Securities and Exchange Commission — more commonly referred to as the SEC.
The SEC has begun to take aim at the business practices that can lead to breaches. So, what does the SEC’s involvement mean for cybersecurity professionals?
Why Is the SEC Involved in Data Breach Response?
You might think about the SEC in terms of stocks and the stock market. But it has a three-part mission: protect investors, facilitate capital formation and maintain fair, orderly and efficient markets.
To protect investors, the SEC works to make sure consumers are not investing their hard-earned money in a company’s stock based on false or misleading information. That might mean looking into falsified earning reports, but it also goes much deeper.
The SEC aims for transparency. So, they require each business to disclose all types of risk that can affect the company’s earnings and, in the end, the stock price. This process increases the odds that an investor has access to all the information about a company’s financial health.
The possible risks encompass much more than fraud; they can include everything from supply chain issues to natural disasters. The purpose is to share anything and everything that could possibly affect the financial future of the company.
This leads us right to the answer about why the SEC cares about cybersecurity. When a company faces a cybersecurity attack or event, it affects its revenue. According to the IBM Cost of a Data Breach Report 2021, the average cost of a ransomware attack (the costliest type of breach) is $4.62 million. And the average cost of the least costly type of data breach (breaches in hybrid cloud environments) is still very expensive, at $3.61 million.
What This Means for Revenue
This means cybersecurity practices play a large part in a company’s revenue. Even minor breaches result in severe losses. Most consumers never consider cybersecurity when deciding where to invest their money.
Very few cybersecurity issues develop because of a single poor decision or mistake. Instead, there are multiple choices and factors that lead to the vulnerabilities that allow a breach to happen.
The issue concerns the SEC because when an organization faces a major incident, the price of that company’s stock almost always goes down. But consumers don’t have cybersecurity-related information when they purchase company stock. So, they are making those purchasing decisions without key information. That can make their investment much riskier than they realize.
Why now? It’s simple. The costs of breaches are going up, which means the risk to investors is increasing.
The IBM Cost of a Data Breach Report 2021 found the cost of a breach increased 10% between 2020 and 2021. As you might expect, the increased number of people working from home was a factor. Breaches involving remote work cost $1.07 million more than other breaches.
Reputation is a bit harder to quantify. But the fact that 38% of the cost of a breach comes from lost business is notable.
What Is the SEC Doing About Cybersecurity Risks and Incidents?
The SEC is leveraging fines to companies with poor cybersecurity practices more and more.
In July 2021, the SEC settled with Pearson Plc, a London-based public educational publishing company. Pearson agreed to pay $1 million in response to charges of misleading investors regarding a 2018 breach, which involved the theft of millions of student records, including dates of birth and email addresses. The SEC’s stance was that Pearson did not have good enough disclosure controls and procedures.
And Pearson isn’t the only case like this. In August 2021, the SEC announced actions against eight financial firms for failures in their cybersecurity procedures and policies. Each of the companies had email account takeovers that caused exposure of client personal information, and the settlements ranged between $200,000 and $300,000 for each company. Experts agree that these are likely just the beginning. They are a signal that the SEC is now focusing on the risks cybersecurity issues pose to investors.
How to Avoid SEC Fines After a Data Breach
Harvard Business Review’s article on this subject is right on the money. First, create a committee for disclosure to conduct quarterly surveys to uncover everything that needs to be disclosed.
Secondly, disclose early. In a past case, the SEC ruled that six months was too long. Companies should take action as soon as possible. Along those lines, HBR gave further guidance that companies should disclose they understand the full scope of the breach.
The final two suggestions — conduct forensic assessments and build visibility into your assets — provide practical advice. They can guide you to create a process that makes it easy to quickly and accurately disclose cybersecurity issues.
Let the SEC’s Data Breach Response Increase Your Cybersecurity Funding
Chief information security officers often ask me how they can show their company’s leaders how important cybersecurity is. And this SEC news is an outstanding proof point. It’s a great illustration of how cybersecurity incidents cost reputation and money. Plus, no one wants to get fined by the SEC. It’s just not a good look.
Before your next budgeting meeting, set up time to meet with your company leaders. Bring copies of recent SEC sanctions and a list of potential vulnerabilities in your own company. Start with sharing the SEC’s recent actions. Next, make the case for areas that could cause your company the same fate. Then tie it right back to your budget. Show how investments in cybersecurity can help prevent your organization from becoming the SEC’s next target.
You’ve known for years, if not decades, the importance of cybersecurity to your company. And while at first glance it appears the SEC news is bad for the industry, it’s actually the opposite. It’s even more proof that your company’s success and future depend on taking effective and proactive cybersecurity measures now.
==================================================================
Avoid data breaches, and thus avoid the SEC.....Use Wave solutions!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Lloyd’s Carves Out Cyber-Insurance Exclusions for State-Sponsored Attacks
https://threatpost.com/lloyds-cyber-insurance-exclusions/176669/
Excerpt:
The insurer's new definition of cyber-war leaves plenty of latitude for the insurer to refuse to pay.
==================================================================
Instead of being an organization that goes through the possibility of denial of coverage after experiencing a cyber attack, be an organization that proactively uses Wave solutions to prevent cyber attacks.
Better security at less than half the cost!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
2.1 Million People Affected by Breach at DNA Testing Company
https://www.securityweek.com/21-million-people-affected-breach-dna-testing-company
Ohio-based DNA testing company DNA Diagnostics Center (DDC) this week disclosed a data breach affecting 2.1 million people.
In a data breach notice posted on its website, DDC said it detected unauthorized access to its network on August 6. An investigation has determined that the attackers had accessed an archived database containing personal information collected between 2004 and 2012 for a national genetic testing organization system that was acquired by the firm in 2012.
“This system has never been used in DDC’s operations and has not been active since 2012,” the company said. “DDC has been and remains fully operational, and the systems and databases that are actively used by DDC were not infiltrated.”
DDC has determined that the hackers may have copied certain files and folders between May 24 and July 28, 2021.
The data breach notification posted on the company’s website does not provide any other details regarding the attack, but information submitted to the Maine Attorney General’s Office shows that the incident has impacted more than 2.1 million individuals.
Information that may have been obtained by the hackers includes names, Social Security numbers, bank account numbers, and payment card data.
DDC has been informing impacted people about the breach and offering them free credit monitoring services.
DDC says it has conducted more than 20 million DNA tests since 1995. The company offers paternity, immigration, COVID-19, DNA relationship, fertility and other types of testing.
=================================================================
Isn't free credit monitoring services becoming lacking in true effectiveness unlike being proactive and using Wave solutions upfront.
If DDC and other organizations used Wave solutions, they would be very happy that unauthorized devices wouldn't be accessing their networks and stealing their sensitive data!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
CISA Releases Guidance on Securing Enterprise Mobile Devices
https://www.securityweek.com/cisa-releases-guidance-securing-enterprise-mobile-devices
=================================================================
If the CISA used the Wave/ARM blueprint for securing Enterprise Mobile Devices, organizations would be a lot more secure!
=================================================================
Wave Joins ARM TrustZone Ready Program
Committed to Helping Chip Manufacturers Implement Industry Standard Security for Mobile Platforms
http://www.wavesys.com/buzz/pr/wave-joins-arm-trustzone-ready-program
Lee, MA -
September 26, 2012 -
Wave Systems Corp. (NASDAQ:WAVX) today announced that it has joined the ARM TrustZone® Ready Enablement Program to provide support and infrastructure for implementing enterprise security capabilities in mobile devices. As a partner in the program, Wave joins other industry leaders in helping chip manufacturers design and implement new industry standard security capabilities within ARM’s TrustZone architecture to enable full cross-platform interoperability across PCs, tablets, smartphones and other mobile devices.
TrustZone Technology (developed by ARM, the world’s leading semiconductor IP supplier) is a System-on-Chip security concept that involves a hardware-isolated space for a Trusted Execution Environment (TEE). Once integrated, core security services such as cryptography, storage and user interfaces can enable services to be deployed with a new level of security and convenience.
The primary goal of ARM's TrustZone Ready enablement program is to guide chip and device manufacturers to design robust, industry-certified security architecture into their products that will meet the needs of service providers looking to deploy secure services on secured platforms. Companies that implement system-wide security into their platforms can benefit from this program through a cohesive set of design blueprints, market requirements, and checklists aligned with industry standards.
“Smart phones, tablets and other devices are essential for today’s enterprise, and require access to sensitive applications and data. While these devices have excellent security for the mobile operator’s services, they lack basic security for use within an enterprise network,” commented Steven Sprague, Wave’s CEO. “ARM, with the TrustZone Ready Program, is taking the lead in making sure that standards-based security implemented in the TrustZone Trusted Execution Environment (TEE) is integrated into chipsets for mobile devices. Wave is committed to sharing its expertise in Trusted Platform Module (TPM) implementations, application development and trust infrastructure support.”
“Wave’s infrastructure for managing TPM and TPM-mobile-enabled devices will allow enterprise users to exploit the full capabilities of Trusted Computing Group standards across multiple device types,” added Jon Geater, Director of Technology for ARM Secure Services Division and Board Representative of ARM at GlobalPlatform. “ARM welcomes Wave into the TrustZone Ready Program as a valuable partner that will bring secure enterprise services to TrustZone secured devices running GlobalPlatform Trusted Execution Environments.”
Eliminating passwords, Providing Health Measurements for mobile devices
The TPM, shipped on more than half a billion PCs, is a cryptographic component built on specifications from the Trusted Computing Group. The TPM brings strong, enterprise-grade security features to consumer devices that are widely deployed in enterprise networks. The TPM for mobile devices is uniquely designed to support the security needs of multiple stakeholders, allowing enterprises to provide strong security in end-user applications, satisfy the security requirements of third-party application developers, and support other parties.
With a TPM Mobile implemented within the hardware-based security boundaries of ARM’s TrustZone and protected by a full function Trusted Execution Environment, enterprises will be able to take advantage of the strong security of the TPM in the following ways:
• Protect corporate devices and user identities
• Measure and attest to the integrity and health of the mobile device
• Implement secure network access
• Provide secure messaging for corporate traffic
• Reduce the need for user passwords, with reliance on the device itself as a strong authentication token for access to services and data, including cloud-based functions.
• Offer central control over devices which are lost or stolen to protect sensitive data
Increased emphasis on trusted computing is driving the security industry toward hardware-based technologies that offer improved access control, encryption, and the early detection of malware. With Wave’s industry-leading trusted computing solutions, customers are empowered to secure endpoint data, protect data-in-motion and ensure that only trusted devices gain access to the enterprise network. Wave’s solution will provide enterprises with cross-platform interoperability between PCs and mobile devices for trusted computing-based functions and applications.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
The Booming Underground Market for Bots That Steal Your 2FA Codes
https://www.vice.com/en/article/y3vz5k/booming-underground-market-bots-2fa-otp-paypal-amazon-bank-apple-venmo
The bots convincingly and effortlessly help hackers break into Coinbase, Amazon, PayPal, and bank accounts.
=================================================================
One would think that organizations effected in this article, and others would be clamoring for Wave Knowd so that customers with existing 2FA don't get scammed over the phone by unknowingly giving their code to the hackers! Wave Knowd could stop this from happening since there is no code to give for Wave Knowd (it's based on machine identity)! There would be many happy organizational customers and users of Wave's service!
================================================================
Wave Knowd Introduces New Model for Internet Authentication Without Passwords
Knowd ‘Trust Score’ Assures User Identity when Accessing Web Services
http://www.wavesys.com/buzz/pr/wave-knowd-introduces-new-model-internet-authentication-without-passwords
Lee, MA -
May 9, 2013 -
Wave Systems Corp. (NASDAQ: WAVX), the Trusted Computing Company, today announced Wave Knowd, a new web service available for preview that significantly reduces the vulnerability and use of passwords by leveraging the unique identity of computing devices. With a simple integration of Wave Knowd, any website can establish reliable and consistent identity relationships with the devices its customers use most often for Internet services. Wave Knowd, which signifies “Known Devices,” is being tested by partners to provide the backbone for general purpose machine identity.
“The maturation of the web mandates a change in how we, and our computing devices, connect to the web,” said Steven Sprague, Wave CEO. “With cable television, satellite radio, bank kiosks and mobile phones, the service relationship is tied to the endpoint device. The web needs the security and simplicity of this same model, where our computing devices themselves play an added role in authentication. I access dozens of web services every day from the computer in my home office, and want those sites to know and trust my PC so they’ll stop continually asking me to log in. Wave Knowd enables that trust.”
To make web authentication stronger and simpler, Wave Knowd provides a new approach to signing on and accessing Cloud and Internet services. From online banking to business services and even consumer gaming, passwords are failing to provide a level of security that either service providers or users can trust. Knowd is built upon the concept that only known devices should ever access a protected network. Knowd incorporates all of your access and identity solutions together to establish a relationship of trust between users’ computing devices, and the web services they access.
“We interact online using so many devices now, but from a security perspective those devices aren’t all equal. Accessing medical records or confidential business files from my kid’s smartphone is certainly not as trustworthy as connecting from my business PC with an encrypted drive,” continued Mr. Sprague. “Wave Knowd is all about making the Web simpler and safer, and that new foundation of trust begins with known devices, and known capabilities.”
Once machine identity is established, any web site—from gaming, social networking or shopping; to banking, business and financial services—can use Wave Knowd to create a reliable and persistent identity for the connecting device. Knowd allows Web sites to streamline access for users who repeatedly log on from trusted devices, while bolstering security. Initial authentication creates a unique and anonymous relationship between each computing device and each web service accessed, and then the level of trust between the two grows over time. Knowing the device can also help the site prevent fraud and phishing, or simply provide quicker no-password access. Wave is the partner helping to create and manage these relationships.
“Wave Systems was the obvious choice to provide ID Dataweb’s attribute exchange with device identity services,” said David Coxe, CEO at ID Dataweb. “In Knowd, Wave has provided a system that is rooted in state of the art device security technologies such as the Trusted Platform Module and other secure elements, while also offering a simple web based integration. It’s easy to identify if a connecting device is highly trusted, or whether it requires added screening and security.”
ID Dataweb uses Wave’s Knowd solution as part of the Identity Ecosystem supported through a grant from the U.S. Department of Commerce’s National Institute of Standards and Technology’s NSTIC initiative (National Strategy for Trusted Identities in Cyberspace). ID Dataweb has created a standards-based platform to simplify online identity verification using OpenID credentials.
Providing the Tools to Manage Trust in the Cloud: What’s Your Trust Score?
Wave Knowd is a powerful enhancement for any website. The endpoint identity service links an individual users’ unique device identity, with the Internet services that are typically protected only by username and password access. Users are prompted by their cloud service provider to register their primary computing devices to create a unique and persistent device identity relationship with their Internet services and service providers. No personal ID information is obtained by Wave, as Knowd works purely as a machine identity service. Furthermore, registered devices are given a unique ID for every service provider, establishing a separate trust relationship with each service.
Wave Knowd asserts a Trust Score that helps both consumers and cloud services or relying parties to determine the level of trust granted to each specific computing device. For example, a home PC that is used regularly for banking will quickly build a high Trust Score. Users can achieve a higher Trust Score by installing a small software application (Wave Knowd currently supports Windows 7 and 8, with Apple and Android to follow later this year). Business-class PCs containing a standard Trusted Platform Module (TPM) can establish even greater trust by leveraging the TPM security chip to create and securely store a unique device ID.
Knowd provides a web service with a new capability to enable or disable features based on the device that the user is actively using, providing a new security option for the end user. Perhaps an account password can only be reset from the user’s registered home computer and not from anywhere in the world, thereby linking in all of the user’s investment in the security of their home, from their alarm system to the doorman. Every web service can benefit from integrating Wave Knowd as part of the user’s experience.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
As the cyber insurance bubble begins to burst, the market scrambles for a new approach
https://www.scmagazine.com/feature/policy/as-the-cyber-insurance-bubble-begins-to-burst-the-market-scrambles-for-a-new-approach
Excerpts:
Lloyds of London, the carrier holding nearly a fifth of the cyber insurance market, discouraged its syndicate from taking cyber business in 2022.
According to S&P Global Marketing Intelligence data, in 2016, 43 cents out of every dollar paid in cyber insurance premiums was spent paying and insurance claim or related cost. Between 2016 and 2019, that number known as a loss ratio, when it's written as a percentage-never went as high as 48 cents In 2020 it ballooned to 73 cents on the dollar.
=================================================================
An approach that works (Wave) is what is needed! Hardware security is already built-in to an organization's computers. The hardware security (TPMs and SEDs) just need to be activated along with Wave's software to keep the ransomware attackers from accessing your computers, data and networks. The Trusted Computing Group (100+ companies) support these standards (TPM and SED). Not using them is putting a lot of pressure and stress on organizations and insurance companies! Use these standards, use Wave solutions, and enjoy better cybersecurity!
==================================================================
http://www.wavesys.com/data-protection
Excerpt:
Wave’s solution: start with the device
The Wave approach to this challenge is to make the IT perimeter irrelevant. Wave turns on and manages the self-encrypting drives (SEDs) and trusted platform modules (TPMs), or security chips, that are already embedded in many of your devices. The upshot is that each and every device is equipped with its own data protection system—while being centrally managed. This gives you unprecedented yet straightforward control over exactly who has access to your data, with what devices, over what networks.
We cost less too. Wave works on your existing hardware, across platforms. That’s because our solutions are based on an open standard that’s already been implemented on 600 million–plus laptops and is now working its way onto mobile devices. Our software is all you need to reach a whole new level of data protection. It’s one of the big reasons why total cost of ownership can be almost half that of a traditional software-based system that doesn’t even work very well.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Report Shows Global Financial Giants Are at Risk of Cyberattacks
https://www.nextgov.com/cybersecurity/2021/11/report-shows-global-financial-giants-are-risk-cyberattacks/187087/
Excerpt:
It identified 6,472 breaches and leakages, plus more than 3.3 million exposed records from the 20 companies—with the number of exposed records growing “six-fold” in just two years. About two-thirds of the breaches and leakages included personally identifiable information (PII), including the top executives from breached companies in 71% of the recorded cases.
=================================================================
Why not use cybersecurity solutions (Wave) that actually work?!
Are the current cyber solutions really working??? Wave can do a LOT better than the statistics in the above excerpt! Use better security, use Wave solutions!
=================================================================
Wave Announces 5-Year Master License Agreement for Virtual Smart Card 2.0 with Leading Global Financial Services Company
Wins competitive evaluation against market leader in two-factor authentication tokens
http://www.wavesys.com/buzz/pr/wave-announces-5-year-master-license-agreement-virtual-smart-card-20-leading-global
Lee, MA -
December 17, 2015 -
Wave Systems Corp. (NASDAQ: WAVX) announces a five-year master licensing agreement (MLA) with a leading global corporation (as determined by the 2015 Fortune Global 500 List) for its Virtual Smart Card 2.0 solution. This MLA sets the terms and pricing for licenses and maintenance across the customer’s global organization and establishes it as their preferred two-factor authentication solution. Instead of one large license purchase for the entire organization, each of the customer’s subordinate divisions will make separate orders in accordance with the terms of this MLA.
The first purchase of 2,000 VSC 2.0 licenses under this agreement, when added to a previous purchase, completes the requirement for the customer’s global IT division. That division will now lead the internal effort to standardize the remaining 150,000+ endpoints within their organization with the new Wave VSC 2.0 solution. While there are no minimum order requirements under the agreement, discussions for additional orders are underway.
“Our five-year agreement with this customer is the first very large scale contract for VSC 2.0 and is an important milestone for Wave,” said Bill Solms, President and CEO of Wave Systems. “This customer is a major global financial services company and their standards for protecting their systems from unauthorized access and the integrity of their data are of the highest order. Wave had to pass a very rigorous technical and business review to win the competition. We believe that this client’s decision to choose Wave Virtual Smart Card 2.0 over their incumbent solution gives us tremendous credibility in the two-factor authentication market. We will remain engaged with this company in order to complete the additional sales and deployments in the months ahead.”
Wave Virtual Smart Card 2.0 is a tokenless, hardware-based, two-factor authentication solution that offers superior security at less than half the cost of comparable solutions. It is the industry’s only enterprise-grade virtual smart card management solution that works on Windows 7, 8 and 10. It also provides management support for the Microsoft Virtual Smart Card on Windows 8 and 10. Wave’s VSC solution emulates the functionality of physical smart cards or tokens, but offers greater convenience to users, significantly lower total cost of ownership, and a greatly reduced risk of unauthorized access.
Wave Virtual Smart Card 2.0 gives IT the ability to:
• Remotely create and delete virtual smart cards
• Provide help desk-assisted recovery
• Configure Passphrase and card policies
• View the status of virtual smart cards and enrolled certificates
• Generate reports for compliance
• Support virtual smart cards on laptops, tablets and desktops with both TPM 1.2 and TPM 2.0 security chips
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Federal agencies issue cybersecurity warning ahead of Thanksgiving
https://nypost.com/2021/11/24/cisa-fbi-issue-cybersecurity-warning-ahead-of-thanksgiving/
=================================================================
If you are part of an organization that doesn't want to throw away computers and hurt the environment, use Wave solutions for protecting your computers, data and network from unauthorized devices, and save a lot of money in the process!
It seems that ESG would also embrace Wave for their benefits to the environment!
Please spread the message.
Happy Thanksgiving!
=================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Will the shift to Windows 11 mean more e-waste?
https://www.computerworld.com/article/3641833/will-the-shift-to-windows-11-mean-more-e-waste.html
Excerpts:
Because the move to Windows 11 is likely to force users to buy new hardware, a lot of older computers may wind up in the trash — worsening environmental issues for everyone.
•40 million tons of electronic waste is generated every year. As the site notes, it’s like throwing out 800 laptops every second.
•The average cellphone user replaces the device every 18 months.
•E-waste comprises 70% of our overall toxic waste.
•Only 12.5% of E-Waste is recycled.
•85% of E-Waste going to landfills and incinerators is mostly burned, releasing toxins into the air.
•Electronics contain lead, which can damage the central nervous system and kidneys. (A child’s mental development can be affected by low level exposure to lead.)
•The most common hazardous electronic items include LCD desktop monitors, LCD TVs, Plasma TVs, and TVs and computers with Cathode Ray Tubes.
•E-waste contains hundreds of substances, many of them toxic. This includes mercury, lead, arsenic, cadmium, selenium, chromium, and flame retardants.
•80% of E-Waste in the US and most other countries is transported to Asia.
•300 million computers and 1 billion cellphones go into production annually. That number is expected to grow by 8% per year.
Now, layer on the increasing amount of e-waste that will be created by the retirement of Windows 10 hardware and you can imagine we’re going to have a big problem on our hands.
=================================================================
If organizations used Wave to activate their TPMs and SEDs in older computers and used Wave software, the computers would be more secure, and there wouldn't be e-waste generated. Wave could not only secure these older computers with its security, and by activating hardware security (TPMs and SEDs), but also contribute to a more environmentally friendlier World!
=================================================================
Better security at less than half the cost!
=================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Report: China May Steal Encrypted Government Data Now to Decrypt with Quantum Computers Later
https://www.nextgov.com/emerging-tech/2021/11/report-china-may-steal-encrypted-government-data-now-decrypt-quantum-computers-later/187020/
==================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
Excerpts:
Enterprises choose Wave to manage SEDs
Why? From our single console, you can manage all your organization’s self-encrypting drives (SEDs) easily and remotely, whether they number in the hundreds, or hundreds of thousands.
SEDs are the most secure, best-performing and most transparent encryption option for protecting data on laptops. These drives automatically encrypt all data written to the drive, so you don’t have to decide what’s important enough to encrypt. They also perform this encryption in the hardware of the drive, so you don’t end up with the performance issues software full-disk encryption is infamous for. SEDs are available as HDD or SSD, and are sold by most major drive manufacturers.
Wave’s management solution delivers remote drive initialization, user management, drive locking, user recovery and crypto-erase for all Opal-based, proprietary and solid-state SEDs.
Key Features:
Data protection
Drive locking is supported in sleep or standby (S3) modes
=================================================================
The above article and excerpts reveals the importance of SEDs, and Wave SED management in protecting a stolen laptop and its data by the Chinese! Organizations should be required to be using already built-in SED laptops and a SED management software like Wave's!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
GoDaddy hack causes data breach affecting 1.2 million customers
https://www.bleepingcomputer.com/news/security/godaddy-hack-causes-data-breach-affecting-12-million-customers/
Excerpt:
The incident was discovered by GoDaddy last Wednesday, on November 17, but the attackers had access to its network and the data contained on the breached systems since at least September 6, 2021.
==================================================================
If GoDaddy only allowed known and approved devices access to its network by using Wave solutions, this 'incident' wouldn't have happened! Wave could be saving so MANY organizations from incidents like this!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
This feature of Wave solutions would be helpful in many ways to organizations that choose Wave!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
California Pizza Kitchen Data Breach Exposed Over 100,000 Employee Social Security Numbers
https://gizmodo.com/california-pizza-kitchen-data-breach-exposed-over-100-0-1848084509
==================================================================
Why this keeps happening to organizations when Wave has the technology to prevent it is sad.
As pointed out in a link to a tweet on Trusted Computing's twitter site, Brian D. Berger, in 2009, famously noted that trusted computing can protect business critical data, secure authentication, and strong protection of user IDs, establish strong machine identity and even ensure regulatory compliance with hardware based security.
Trusted computing used extensively could make for a much nicer World!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
76% of gamers were financially affected by a cyberattack, losing $700+ on average
https://www.helpnetsecurity.com/2021/11/17/gamers-cyberattack/
=================================================================
With hardware security and Wave, these gamers could have $700+ on average in their pockets!
It's interesting that Media Player can now be a part of Windows 11! The size of the opportunity for Wave to help in the consumer segment of the market boggles the mind!
=================================================================
http://www.wavesys.com/
U.S. Banks to Face Heightened Cybersecurity Reporting Requirements
https://www.marketwatch.com/story/u-s-banks-to-face-heightened-cybersecurity-reporting-requirements-271637265793
Excerpts:
WASHINGTON--U.S. banks face heightened reporting requirements around cybersecurity intrusions under a new rule completed Thursday by federal regulators, in a bid to boost information sharing of cyber threats.
Under the new requirements, a bank must notify its primary federal regulator of any significant cyber intrusion within 36 hours of learning of the incident, the Federal Reserve said. Banks must comply with the new reporting requirement by May.
==================================================================
Or the banks could use Wave solutions and prevent these cyber attacks from happening! Please see post #246887 for relevant information!
==================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Shrinking cyber budgets are leaving businesses at risk
https://www.helpnetsecurity.com/2021/11/16/decreased-cyber-budgets/
==================================================================
Wave Announces 5-Year Master License Agreement for Virtual Smart Card 2.0 with Leading Global Financial Services Company
Wins competitive evaluation against market leader in two-factor authentication tokens
http://www.wavesys.com/buzz/pr/wave-announces-5-year-master-license-agreement-virtual-smart-card-20-leading-global
Excerpts:
“This customer is a major global financial services company and their standards for protecting their systems from unauthorized access and the integrity of their data are of the highest order. Wave had to pass a very rigorous technical and business review to win the competition. We believe that this client’s decision to choose Wave Virtual Smart Card 2.0 over their incumbent solution gives us tremendous credibility in the two-factor authentication market. (said Bill Solms)
Wave Virtual Smart Card 2.0 is a tokenless, hardware-based, two-factor authentication solution that offers superior security at less than half the cost of comparable solutions. It is the industry’s only enterprise-grade virtual smart card management solution that works on Windows 7, 8 and 10.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
MosesStaff Locks Up Targets, with No Ransom Demand, No Decryption
https://threatpost.com/mosesstaff-locks-targets-ransom-decryption/176366/
Excerpts:
A politically motivated group is paralyzing Israeli entities with no financial goal – and no intention of handing over decryption keys.
•Multiple batch scripts that can enable SMB share or disable the Windows firewall on specific remote machines;
The next step is to collect information on the machines in the network, including domain name, machine names and administrator credentials.
MosesStaff’s Custom Malware Scheme
==================================================================
This headline should scare organizations who don't have cybersecurity like Wave solutions! With each of the excerpts above Wave has a remedy with Wave solutions! Don't lose sleep at night, protect your organization with Wave solutions! Wave is simpler, more secure and cheaper!
==================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Major Water Supplier Suffers Nine-Month Long Breach
https://flipboard.com/@erik6408/cybersecurity-and-information-security-articles-p5iqnkgtz/-/a-muN_vtWsS3GyYAkP7greEA%3Aa%3A14480466-%2F0
Excerpt:
One of Australia's largest regional water suppliers was breached for several months before detecting the unauthorized access, another worrying sign …
==================================================================
And here Wave solutions could keep the unauthorized from accessing the network. Does 'network monitoring' work as good as Wave keeping unknown and unapproved devices from accessing the network?! Australia and the rest of the world are missing out on Wave's awesome cybersecurity!
Use better security, use Wave VSC 2.0 (MFA)!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Researchers Uncover Prolific Hacker-for-Hire Group
https://thecybersecurity.news/general-cyber-security-news/researchers-uncover-prolific-hacker-for-hire-group-14378/?nowprocket=1
Excerpt:
In accordance to Trend Micro, phishing and information-thieving malware and its primary instruments to compromise its victims. That helps make multi-factor authentication (MFA), finish-to-finish encrypted applications, “robust” email and company detection and reaction applications a ought to, the seller claimed.
==================================================================
Wave VSC 2.0 (MFA) protects against phishing, and those fortunate enough to be using it can keep those prolific hackers from accessing your organization's network with real device authentication! Those not using Wave solutions are missing out on awesome cybersecurity!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
Key Features:
Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
• Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies
==================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
US joins international cybersecurity partnership
https://www.engadget.com/us-joins-paris-cybersecurity-agreement-213813652.html?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS91cmw_ZXNyYz1zJnE9JnJjdD1qJnNhPVUmdXJsPWh0dHBzJTNBJTJGJTJGd3d3LmVuZ2FkZ2V0LmNvbSUyRnVzLWpvaW5zLXBhcmlzLWN5YmVyc2VjdXJpdHktYWdyZWVtZW50LTIxMzgxMzY1Mi5odG1sJnZlZD0yYWhVS0V3aVkzZm1ldnBIMEFoV1BNZDhLSGFWSkNma1FGbm9FQ0FjUUFnJnVzZz1BT3ZWYXcydkVRbmN6cGMweFN0V0w1QzY1VG9v&guce_referrer_sig=AQAAAGruVjYDOlxbRRSQfw5SP06LPdkQh5qmVWVublmXHZzjaf-1LhjL2euKDhoKrv3bJAe4_0UqpvIi_HJP9kNYY36iLs5d2YrVq7942bF_ZCurSmK_-QdMJLEaMbhqSQZ9mQpR5sIAzt7qOTqLBc2UQhDJP4g6k7KxF0gjVPy5iDwP
=================================================================
Nice!
==================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Pentagon wants industry’s help to bolster allies and partners’ cybersecurity
https://flipboard.com/@MilitaryTimes/pentagon-wants-industry-s-help-to-bolster-allies-and-partners-cybersecurity/a-InyKPrvgRIu9FmGeXLQD_Q%3Aa%3A2607599406-e5d546b32f%2Fdefensenews.com
Excerpt:
"We're hearing frequently from our allies and partners "across NATO in Europe and in the Asia Pacific region "requests for assistance in the cybersecurity arena," she said.
==================================================================
Someone should rent a billboard soon that says, "Hardware security (SEDs and TPMs) that are already built-in to your devices with Wave solutions would give your organization better security!", and put it up in Washington.
==================================================================
http://www.wavesys.com/
Taiwan Government Faces 5 Million Cyberattacks Daily: Official
https://www.securityweek.com/taiwan-government-faces-5-million-cyberattacks-daily-official
Excerpt:
Taiwan's government agencies face around five million cyberattacks and probes a day, an official said Wednesday, as a report warned of increasing Chinese cyber warfare targeting the self-ruled island.
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Secure device & user authentication
Sometimes it feels like security is more effective at deterring your users than hackers. But you still have to protect your enterprise resources, and we’re here to help. We take pride in securing your network, data, and resources to an unprecedented level, without causing a revolt from either IT or your users. In fact, your users probably won’t even know we’re there.
Here’s how it works:
Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication
Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.
Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Hack back is a bad idea
https://betanews.com/2021/11/06/hack-back-is-a-bad-idea/
=================================================================
There would be no reason for organizations with Wave solutions to hack back because these unknown and unapproved devices (hackers) wouldn't be allowed access to the network. Wave solutions could make hacking back unnecessary, and protect the organizations' data and networks!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
State and local officials celebrate passage of infrastructure bill with $1 billion in cyber funds
https://thehill.com/policy/cybersecurity/580649-state-and-local-officials-celebrate-passage-of-infrastructure-bill-with
==================================================================
Here is the opportunity for states to get better security at less than half the cost! They could have simpler, more secure and cheaper cybersecurity with Wave solutions. And proving compliance with Wave is no problem!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Robinhood Hacked, Millions of Names, Emails Stolen
https://www.securityweek.com/robinhood-hacked-millions-names-emails-stolen
Excerpt:
After an investigation, Robinhood said the attacker socially engineered a customer support employee by phone and obtained access to certain customer support systems.
=================================================================
Here is yet another example of where Wave VSC 2.0 could have prevented a hack or breach. Robinhood and the rest of the organizations of the World would be better off having Wave VSC 2.0 as part of its defense, and the rest of Wave solutions to complete better security for them!
=================================================================
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Hackers have breached organizations in defense and other sensitive sectors, security firm says
https://www.cnn.com/2021/11/07/politics/hackers-defense-contractors-energy-health-care-nsa/index.html
Excerpt:
In the activity revealed by Palo Alto Networks, the attackers are exploiting a vulnerability in software that corporations use to manage their network passwords.
=================================================================
If the defense and other sensitive sectors were using Wave VSC 2.0, they'd be getting better security at less than half the cost, and they wouldn't have cybersecurity problems like those in the article.
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Token-free, password-free user authentication
We know you’ve dreamt about shredding your list of passwords. Go on and do it.
Because you are starting the authentication process in the device’s hardware, the user doesn’t have to interact with it. All users see is their usual Windows log-in screen – no more additional passwords to access the VPN or other resources. They just sign in once, and the secure credentials in their TPMs securely and quickly connect them to everything they need. Say goodbye to user frustration and slow OS performance.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Congress passes $1T infrastructure bill - but how does the government go about spending that much money?
https://www.registercitizen.com/news/article/Congress-passes-1T-infrastructure-bill-but-16597538.php
Excerpt:
There’s funding for cybersecurity, clean water and waste treatment systems, broadband internet connections and more.
==================================================================
The U.S. government can continue with software only as a method to protect the governments systems. And software now has vulnerabilities in 300+ places that the government has to try to fix in 6 months. Hardware based security (Wave) can protect vulnerabilities in software so that they don't become liabilities. Hardware security (built-in TPMs and SEDs) when activated and managed by software such as Wave's keeps the bad guys off the network and protects data. The existing infrastructure doesn't do that so well now judging by the number of data breaches and ransomware attacks in the last 5 years! To see a massive reduction in the number of data breaches and ransomware attacks, the U.S. government should invest in Wave solutions!
Better security at less than half the cost!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
DOD Suspends Cybersecurity Certification Program Pending Major Changes
https://www.nextgov.com/cybersecurity/2021/11/dod-suspends-cybersecurity-certification-program-pending-major-changes/186639/
==================================================================
Wave has simpler, more secure and cheaper solutions to these back and forth set backs that keep happening! Use Wave solutions! Compliance is easy with Wave, and these contractors and government would have better security at less than half the cost!
Please read the contents in the 2 links below.
==================================================================
http://www.wavesys.com/compliance
http://www.wavesys.com/wave-alternative
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Almost half of rootkits are used for cyberattacks against government organizations
https://www.zdnet.com/article/almost-half-of-rootkits-are-used-to-strike-government-targets/
==================================================================
Wave Endpoint Monitor Delivers a Powerful Weapon in the Battle against Advanced Persistent Threats
Monitors PC Health, Detects Anomalous Behavior & Ensures a Higher Level of Trust in the Endpoint
http://www.wavesys.com/buzz/pr/wave-endpoint-monitor-delivers-powerful-weapon-battle-against-advanced-persistent-threats
Lee, MA -
September 11, 2012 -
Wave Systems Corp. (NASDAQ:“WAVX”) today announced the general availability of Wave Endpoint Monitor (WEM), the only solution that detects malware by leveraging capabilities of an industry standard security chip onboard the PC. WEM provides increased visibility into endpoint health to help protect enterprise resources and minimize the potential cost of advanced persistent threats such as rootkits.
Rootkit attacks are particularly harmful in their ability to hide in host systems, evade current mainstream detection methods (such as anti-virus programs or whitelisting at the operating system level) and their capacity to replace legitimate IT system firmware. Such attacks occur before the operating system (OS) loads, targeting the system BIOS and Master Boot Record (MBR), and can persistently infect higher-level system functions including operating systems and applications.
“APTs facing enterprises today are more complex, nefarious and sophisticated than ever before,” said Richard Stiennon, Chief Research Analyst at IT-Harvest and author of Surviving Cyberwar. “Malware hiding in a device’s BIOS will go undetected by traditional anti-virus programs operating at the OS level, creating a strong need for a solution that can identify an attack as it happens. Because Wave’s approach is rooted in hardware-based technologies, rootkits and other malware can be spotted before the OS even starts.”
Wave Endpoint Monitor captures verifiable PC health and security metrics before the operating system loads, by utilizing information stored within the Trusted Platform Module (TPM), a security chip located on the motherboard of all business PCs. If anomalies are detected, IT is alerted immediately with real-time analytics. Capabilities of Wave Endpoint Monitor include:
• Securely reports PC integrity measurements for central reporting and analysis
• Ensures data comes from a known endpoint
• Alerts IT administrators to anomalous behaviors, which can be linked to the presence of malware
• Provides configurable reporting and query tools
• Ensures strong device identity through the use of hardware-based digital certificates
• Remote provisioning of the TPM
“Today’s security threat environment calls for industry-proven solutions to collect and analyze pre-operating system health information and to ensure endpoints are known and trusted,” said Steven Sprague, CEO of Wave Systems. “Since advanced persistent threats can sometimes appear as normal traffic, new rootkits often go unnoticed for long periods of time and cause severe damage in the form of infected systems and data loss. Wave Endpoint Monitor allows IT to utilize the hardware security you’ve already bought and deployed to ensure PC health from the start of the boot process while creating a higher level of trust in your endpoints.”
Wave has successfully piloted WEM with several government groups for the past six months.
The National Institute of Standards and Technology (NIST) has also recognized the importance of BIOS integrity and has issued initial guidelines for protecting a computer's BIOS in SP 800-147 and SP 800-155 (draft).
Wave Endpoint Monitor, plus Wave’s EMBASSY Remote Administration Server (ERAS) with full central management of all enterprise TPMs, supports all platforms with version 1.2 TPMs and is now available for purchase.
=================================================================
Being able to detect rootkits is another big plus when using Wave solutions to protect the government and critical industries!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Biden admin’s bug fix mandate aims to prevent the next major cybersecurity attack
https://www.theverge.com/2021/11/3/22761208/biden-administration-security-vulnerabilities-patch
Federal agencies have six months to patch cybersecurity threats found between 2017 and 2020
=================================================================
If hardware security (SEDs and TPMs) were activated and managed by Wave software not as many of these unpatched software vulnerabilities would be liabilities! By not quickly rolling out Wave's solutions, not only are many of these systems not patched in 6 months, they wouldn't have better protection of hardware security and Wave. Use better security, use Wave's solutions!
================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Protect Corporate Use of Social Media and Cloud Services with Scrambls for Enterprise
Encrypt Postings and Shared Files to Ensure Privacy and Compliance
http://www.wavesys.com/buzz/pr/protect-corporate-use-social-media-and-cloud-services-scrambls-enterprise
==================================================================
Lee, MA -
December 4, 2012 -
Scrambls for Enterprise launched today, giving organizations a means for their employees to safely collaborate over social media sites like Twitter® and Facebook, and share files with cloud services like Dropbox™ and Salesforce.com®. Scrambls protects data that is often overlooked in corporate security initiatives – information shared online via social media, files stored in the cloud and data in motion.
Employees are free to leverage existing social media infrastructures to enter status updates, Tweets, blog posts, files and more, without jeopardizing security or privacy. Scrambls for Enterprise encrypts data before it ever leaves a user’s computer or smartphone. Posts and files can only be viewed by those the enterprise grants permission to—everyone else sees scrambled text.
“Social media and cloud services are expanding the way business is done, but enterprises need greater control of the information they share across the public web,” commented Steven Sprague, scrambls co-creator and CEO of Wave Systems. “These services are often self-discovered by employees who use them to share critical information. Enterprises need to take responsibility for this new flow of data, and scrambls provides the privacy, security and audit controls similar to what you’d see with corporate email accounts.”
The power of scrambls lies in the permissions granted to group members. To read a post or descramble a file, the service automatically applies the permission to make it readable again for only those individuals granted access. Business administrators set the policy and manage the groups. Add or remove people from the groups at any time to change who can read messages and files, even after they’ve been published on the web.
“Scrambls can open up new business opportunities with use cases for every type of vertical market,” continued Sprague. “In healthcare, a private and protected channel for communication leads to better care and service. It’s easy for doctors, social workers and caregivers to have sensitive discussions about the care of a family member in real time using popular tools like Twitter or Facebook. Those conversations remain private with scrambls.”
Deploying scrambls in the Enterprise
The scrambls enterprise console gives employees, managers and IT staff the ability to manage accounts. You first create groups for access either by email addresses or through the existing corporate lists that enterprises already use (Active Directory, corporate email domains, etc.). Add more detailed rules as needed, like an expiration date for a file, or a password that can be used to view a blog post. Deploy the client install or have users download it, and they’re ready to scramble. It’s as simple as that!
Scrambls privacy and security can be added to an organization’s internal applications as well through a software developer kit. The SDK enables third-party apps and sites to integrate directly with scrambls to leverage the same groups for security, privacy and control.
Scrambls for Enterprise is available with special trial and introductory pricing for a limited time. Contact sales@scrambls.com for more information on securing social media and cloud services in your organization. A free consumer download is also available at www.scrambls.com.
About Scrambls
Scrambls is a Cloud security and privacy service developed by Wave Systems Corp. (NASDAQ: WAVX) that makes online sharing simple and safe. All you need is the scrambls plug-in added to your browser toolbar, or a scrambls-enabled application. Scrambls lets you decide what the privacy policy will be for each communication that you share. Scrambls makes Cloud sharing smarter, with security and control over what you are sharing and with whom you are sharing it.
==================================================================
You make a great point Methinks. It would seem that those using Twitter and Facebook would want to use Scrambls given what Microsoft and Google are doing!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Microsoft introduces Loop: A new collaboration tool built on Fluid Framework
https://www.zdnet.com/article/microsoft-introduces-loop-a-new-collaboration-tool-built-on-fluid-framework/
=================================================================
I don't know Methinks, but Microsoft Loop and Google Wave would be well served to use the TPM (in nearly all enterprise computers) as a device authenticator to identify each person participating in a collaboration. This could ensure proper authentication is verified for those that are collaborating.
=================================================================
http://www.wavesys.com/