powered by RealWire

Recent Social Media Releases from RealWire


New Research Reveals Top Trends in How Governments Modernise Legacy Systems

OutSystems and the Centre for Digital Government Release Survey Results
LONDON – 27th August, 2019 – The Centre for Digital Government (CDG), in conjunction with OutSystems, published a report on legacy systems and IT trends based on a survey of state and local government technology professionals. “Keeping Pace with Modernisation in the Age of Rapid Obsolescence” provides key recommendations for how state and local governments can move forward with their modernisation efforts.
“Government entities of all sizes face a common challenge: modernising old-line, inefficient, legacy systems to better serve constituents, government employees, and other stakeholders,” said Andy Pemberton, vice president of solution architecture with OutSystems. “But government agencies can break the cycle of maintaining legacy systems to cost-effectively modernise systems and applications.”
The report includes valuable insights into ways government entities can cost-effectively and efficiently extend the life of legacy systems, as well as modernise them with minimal investment and disruption. In addition, an on-demand webinar draws on the research from CDG and best practices from OutSystems solution architects, so people with all levels of experience can learn how to build strategic apps that drive real value for the business.
The webinar, moderated by Joe Panora, senior fellow at the Centre for Digital Government, addresses the roles low-code and microservices can play in facilitating an agile approach to legacy modernisation. It highlights ways government entities can use low-code’s strength, flexibility and ease of integration to overcome common challenges modernisation initiatives create – such as the hiring of skilled developers and the need to rip and replace systems.
Key findings in the report include:
  • 42% of agencies spend more than a quarter of their IT budgets maintaining legacy systems.
  • 57% use software or systems that are more than five years old.
  • When asked what is needed to modernise legacy systems, respondents’ top three choices were demonstrable cost savings and efficiency (57%), buy-in from departmental leadership (56%), and professional development/training for employees (49%).
A large number of government customers are using the OutSystems low-code platform to improve the citizen experience, reduce IT debt, and cut operational costs. Customers include the cities of Las Vegas, Oakland, and Shawnee, Kan., in the U.S., and the counties of Worcestershire, Surrey, and Devon and the London Borough of Hackney in the U.K. Learn more here: https://www.outsystems.com/news/digital-gov-low-code-development/.
Watch the webinar: “How Low-Code is Helping Governments Modernise Their Legacy Systems
Read the CDG report: “Keeping Pace with Modernisation in the Age of Rapid Obsolescence
About OutSystems
Thousands of customers worldwide trust OutSystems, the number one low-code platform for rapid application development. Engineers with an obsessive attention to detail crafted every aspect of the OutSystems platform to help organisations build enterprise-grade apps and transform their business faster. OutSystems is the only solution that combines the power of low-code development with advanced mobile capabilities, enabling visual development of entire applications that easily integrate with existing systems. Visit us at www.outsystems.com, or follow us on Twitter @OutSystems or LinkedIn at https://www.linkedin.com/company/outsystems.

OutSystems Customers Rollins and City of Oakland Honoured as 2019 CIO 100 Award Winners

Low-code customers recognised for enterprise excellence – driving business value through technology innovation
LONDON – 22nd August, 2019OutSystems, provider of the number one low-code application development platform, today announced that customers Rollins Inc. and the City of Oakland have won 2019 CIO 100 awards based on the business value they generated using OutSystems low-code technology. CIO 100 winners received their awards at the CIO 100 Symposium and Award Ceremony hosted by IDG on Aug. 21 in Colorado Springs.
Pest control provider Rollins and the City of Oakland each used OutSystems to create applications at least twice as fast as they could have using conventional coding. Each organisation built a series of apps to meet immediate and long-term business needs, helping to improve overall efficiencies, provide better access to information, and save significantly on development costs.
“Being recognised by a respected IT content provider like IDG for excellence in digital transformation shows the commitment to innovation that Rollins and the City of Oakland have,” said Carlos Alves, OutSystems Chief Customer Officer. “We’re proud they’ve chosen our low-code platform to create enterprise apps that take their business to the next level and connect with their audiences in ways they never could before.”
The City of Oakland wanted to make an impact on residents’ lives by modernising its digital services and increasing digital access, especially to underserved populations. Using OutSystems, five in-house developers delivered eight apps in just 12 months, including the single-sign-on OAKAPPS portal at the center of the transformation. The portal gives residents online access to a full portfolio of updated city applications, including public wi-fi, registration for city parks and recreation programs, and uploading of documents to gain city permits.
The development project generated a host of benefits for the city. It replaced and modernised hundreds of legacy applications on various platforms. It also created a blueprint for future IT initiatives, making it possible to deliver apps in weeks rather than years, and saved the city an estimated $1 million in outsourcing and subscription fees development costs.
“We wanted to make a real impact,” said Andrew “Pete” Peterson, CIO/CTO of the City of Oakland. “By using OutSystems, we are able to make our city’s services immediately available to all residents, especially to our underserved communities. That’s transformative.”
Rollins, a century-old global pest control company, wanted to launch a new customer relations app in order to eliminate a number of manual processes that involved legacy technology in business unit Orkin USA. Using OutSystems, it took the team half the time of traditional coding to roll out the new customer relations app. The app streamlines back-office administrative tasks, provides customers with service reports, and reduces alert processing to less than 20 minutes (instead of 24-36 hours).
“OutSystems gave us the ability to experiment,” said Lee Crump, CIO at Rollins. “We built fast, iterated on the outcomes, and quickly discarded things that didn’t work, letting us focus our time and energy on features that will advance the business. That’s a big strength of the rapid app development platform.”
“Across the business landscape, companies everywhere recognise the vital role that an innovative, value-driven approach to information technology plays in their success,” said Maryfran Johnson, IDG’s Executive Director of CIO Programs. “This year’s CIO 100 winning companies are inspiring examples of how IT leadership, business collaboration and digital transformation will drive future growth.”
About the CIO 100 Awards
The annual CIO 100 Awards celebrate 100 organisations and the teams within them that are using IT in innovative ways to deliver business value, whether by creating competitive advantage, optimising business processes, enabling growth or improving relationships with customers. The award is an acknowledged mark of enterprise excellence. Recipients of this year’s CIO 100 Award were selected through a three-step process. First, companies filled out an online application form detailing an innovative IT and business initiative. Next, a team of external judges (many of them former CIOs) reviewed the applications in depth, looking for leading-edge IT practices and measurable results. Finally, CIO editors reviewed the judges’ recommendations and selected the final 100.Coverage of the 2019 CIO 100 Awards will be available online at CIO.com in August 2019 and in the summer issue of CIO’s digital magazine.
About OutSystems
Thousands of customers worldwide trust OutSystems, the number one low-code platform for rapid application development. Engineers with an obsessive attention to detail crafted every aspect of the OutSystems platform to help organisations build enterprise-grade apps and transform their business faster. OutSystems is the only solution that combines the power of low-code development with advanced mobile capabilities, enabling visual development of entire applications that easily integrate with existing systems. Visit us at www.outsystems.com, or follow us on Twitter @OutSystems or LinkedIn at https://www.linkedin.com/company/outsystems.

OutSystems Achieves ISO 27017 and 27018 Certifications for Cloud Security Compliance

LONDON – 20th August, 2019OutSystems, provider of the number one low-code application development platform, today announced that it is the first leading low-code vendor to achieve two new cloud security certifications – ISO 27017 and ISO 27018.
As organisations develop, run and share a higher percentage of their applications on the cloud, stakeholders across the business are trusting platform providers to ensure their cloud-based environments are secure. These certifications demonstrate the high level of commitment OutSystems has to ensuring the privacy and protection of its customers’ data in the cloud.
“OutSystems customers deserve to know that the data and information they entrust us with is being protected using the most stringent controls in the industry,” said Jose Casinha, OutSystems Chief Security Officer. “We take our role as caretakers of information seriously. That’s why we’ve built 200 points of security into our platform and taken steps to validate our cloud security practices through the most rigorous certification processes.”
Adding the two new certifications extends the OutSystems record of achieving the highest levels of compliance for the protection of customers’ mission-critical assets. The company’s SOC 2 Level II certification combined with the achievement of ISO 27001 and ISO 22301 certifications establishes OutSystems as meeting the five Trust Services Principles –providing Security, Availability, Processing Integrity, Confidentiality, and Privacy.
ISO 27017 and ISO 27018 builds on the principles of the ISO 27001 standard, which provides a checklist of controls for a company’s establishment, operation and maintenance of an information security management system.
ISO 27017 focuses on the protection of the information in cloud services. It extends to cloud computing providers controls in earlier compliance standards that governed information management and sharing by IT vendors.
Complimenting this, ISO 27018 outlines requirements for the protection and privacy of user data in the cloud. It provides a code of practice for protecting personally identifiable information (PII) in the cloud, which was adopted by the International Organisation for Standardisation (ISO).
Learn more about how OutSystems is working to protect its customers’ sensitive data by visiting the Security page in the OutSystems Evaluation Guide.
About OutSystems
Thousands of customers worldwide trust OutSystems, the number one low-code platform for rapid application development. Engineers with an obsessive attention to detail crafted every aspect of the OutSystems platform to help organisations build enterprise-grade apps and transform their business faster. OutSystems is the only solution that combines the power of low-code development with advanced mobile capabilities, enabling visual development of entire applications that easily integrate with existing systems. Visit us at www.outsystems.com, or follow us on Twitter @OutSystems or LinkedIn at https://www.linkedin.com/company/outsystems.

Carbon Black Threat Analysis Unit (TAU) Uncovers Significant Evolution of Popular Cryptomining Campaign Affecting More than 500,000 Computers

Dubbed “Access Mining,” TAU’s discovery demonstrates how cryptomining malware has been enhanced to steal system access information for possible sale on the dark web.
By some estimates, attackers could theoretically pull in $1.6 million annually by leveraging this attack model, which began about two years ago due to cryptocurrency market fluctuations and high availability of open source attack tools.
Reading, UK – 7th August 2019 -- Carbon Black (NASDAQ: CBLK), a leader in cloud-native endpoint protection, today released a threat report outlining how a well-known cryptomining campaign has been enhanced to steal system access information for possible sale on the dark web.
Dubbed “Access Mining” by Carbon Black researchers, this particular attack stands to affect more than 500,000 computers around the world. The methods used could pave the way for more dangerous and far-reaching attacks as threats considered lower priority can open the door for more advanced, targeted attacks that can be sold to the highest bidder.
The discovery was made after the CB ThreatSight™ team alerted Carbon Black’s TAU about unusual behaviour seen across a handful of endpoints. The ensuing investigation revealed sophisticated, multi-stage malware that was sending detailed system metadata to a network of hijacked web servers, presumably for the purposes of resale on one (or many) remote access marketplaces across the dark web.
Carbon Black TAU researchers Greg Foss (@Heinzarelli) and Marina Liang (@51Bmarina) presented their research in a report released today: “Access Mining: How a Prominent Cryptomining Botnet is Paving the Way for a Lucrative and Illicit Revenue Model.”
The duo will also be presenting their results live at the Black Hat USA 2019 conference in Las Vegas on Thursday 8th August at 13:20 PT in Business Hall Theatre A.
“Access Mining is a tactic where an attacker leverages the footprint and distribution of commodity malware, in this case a cryptominer, using it to mask a hidden agenda of selling system access to targeted machines on the dark web,” the researchers said. “This discovery indicates a bigger trend of commodity malware evolving to mask a darker purpose and will likely catalyse a change in the way cybersecurity professionals classify, investigate and protect themselves from threats.”
Among the report’s key findings:
At least 500,000 machines affected
Victims have been predominantly located in Asia Pacific, Russia and Eastern Europe.
Threat actors are increasingly using repurposed tools, modified exploits and stolen infrastructure
In previous campaigns, this threat actor used a modified version of XMRig to perform Monero mining. In addition to the modified XMRig, our research showed that the group now uses readily available malware and open source tooling, such as Mimikatz and EternalBlue, which have been modified for purposes to pivot from infected systems and expand their campaign’s reach.
Newly uncovered link between Smominru and MyKings
This investigation highlights an unexpected link between Smominru cryptomining campaign and the MyKings botnet, which is outlined in the full report.
Rapid evolution thanks to open source exploits
Modified versions of Cacls, XMRig and EternalBlue were used in this campaign. Obtaining the bulk of the code via open source sites like GitHub likely sped up the innovation to Access Mining, the researchers found.
Combining commodity malware with access-for-sale is lucrative at scale
The business model for Access Mining typically combines a profit stream from cryptomining with a profit stream from selling system access. Both can be highly lucrative (from some estimates on the latest discoveries, profit can be as much as $1.6 million annually) if done at scale.
“This discovery demonstrates how virtually any company could be leveraged in a targeted attack—even if that company lacks a worldwide brand, known intellectual property assets, or a Fortune 1000 listing,” the researchers said. “Access Mining represents a scalable and economical approach for an adversary to find valuable targets.”
Click here to download the full report from Carbon Black: https://www.carbonblack.com/resources/threat-research/access-mining/
About Carbon Black
Carbon Black (NASDAQ: CBLK) is a leader in cloud-native endpoint protection dedicated to keeping the world safe from cyberattacks. The CB Predictive Security Cloud® (PSC) consolidates endpoint protection and IT operations into an endpoint protection platform (EPP) that prevents advanced threats, provides actionable insight and enables businesses of all sizes to simplify operations. By analysing billions of security events per day across the globe, Carbon Black has key insights into attackers’ behaviours, enabling customers to detect, respond to and stop emerging attacks.
More than 5,600 global customers, including approximately one third of the Fortune 100, trust Carbon Black to protect their organisations from cyberattacks. The company’s partner ecosystem features more than 500 MSSPs, VARs, distributors and technology integrations, as well as many of the world’s leading IR firms, who use Carbon Black’s technology in more than 500 breach investigations per year.
Carbon Black CB ThreatSight and CB Predictive Security Cloud are registered trademarks or trademarks of Carbon Black, Inc. in the United States and/or other jurisdictions.

ThreatQuotient Expands Global Footprint Through New Partnerships

Three New Distributor Agreements Broaden the Reach of ThreatQuotient’s Security Operations Solutions
London – 31st July 2019ThreatQuotient™, a leading security operations platform innovator, today announced new partnerships with global distributors Ectacom, Nihon Cornet and StarLink. Following international expansions into Central Europe and Australia in 2018, ThreatQuotient’s latest value added distributor (VAD) agreements leverage an extensive network of channel partners and solution providers to broaden the reach of their security operations platform across the Middle East, Asia-Pacific, Japan and China. Additionally, ThreatQuotient has expanded its office in the UK and doubled the size of their offices in Virginia and Maryland.
Actionable threat intelligence is becoming more and more critical to the success of an organisation’s cybersecurity strategy. ThreatQuotient’s portfolio of solutions is designed with partners in mind, and will allow customers to handle incidents and reduce risk more efficiently based on their unique priorities. The ThreatQ™ platform supports multiple use cases including incident response, threat hunting, spear phishing, alert triage, vulnerability management and serving as a threat intelligence platform. ThreatQ Investigations, the industry’s first cyber security situation room, embeds visualisation and documentation in a shared environment so that teams and team members can accelerate investigation and response through collaboration and coordination.
“ThreatQuotient recognises the value of the channel, and we are committed to our partners and to develop mutually beneficial relationships. We are very proud to continue our global expansion through new distributor agreements with Ectacom, Nihon Cornet and StarLink,” says Haig Colter, Director of Alliances at ThreatQuotient. “We continue to innovate and provide our partners with the tools they need – reliable products and programs – to meet and exceed their sales goals. ThreatQuotient is eager to continue growing and meeting international demand for security operations solutions.”
ThreatQuotient’s solutions improve efficiency and response times by breaking down silos and enable teams to share intelligence and tasks easily, allowing partners to provide the appropriate solutions to the many teams within an organisation responsible for security – Security Operations Center (SOC), Incident Response (IR), Risk Management, Vulnerability Management, Endpoint and Network teams, to name a few. With the largest and most in-depth set of integrations in the industry, the vendor agnostic ThreatQ platform works seamlessly with and complements a wide range of solutions that channel partners may offer, including tools for enrichment and analysis, orchestration, sensors, SIEM and log management, ticketing and intelligence feeds.
“Traditional security systems and strategies do not have the threat-centric approach needed to truly secure today’s organisations. ThreatQuotient enables customers to accelerate their security operations and proactively manage incidents and respond with precision,” said Nidal Othman, Co-Founder and Managing Director, StarLink. “Security incidents will only continue to rise, and attackers will use the overload of alerts against enterprises they wish to target. It is a pleasure to partner with ThreatQuotient and bring their market-leading capabilities to more organisations across the globe.”
In the first half of 2019, ThreatQuotient was recognised several times for leadership in IT innovation. Most recently, the company was named to the CRN Emerging Vendors List for the fourth consecutive year. Previously, ThreatQuotient was included on the 2019 Channel Chiefs List for the second time, and the 2019 Partner Program Guide for the channel program’s success to date. Additionally, ThreatQuotient’s SVP of Sales, Gigi Schumm, was named the winner of the third annual Women in Sales Executive Leadership Award by the Institute for Excellence in Sales (IES). To learn more about ThreatQuotient’s award-winning solutions or channel program, visit https://threatquotient.com.
About ThreatQuotient
ThreatQuotient’s mission is to improve the efficiency and effectiveness of security operations through a threat-centric platform. By integrating an organisation’s existing processes and technologies into a single security architecture, ThreatQuotient accelerates and simplifies investigations and collaboration within and across teams and tools. Through automation, prioritisation and visualisation, ThreatQuotient’s solutions reduce noise and highlight top priority threats to provide greater focus and decision support for limited resources. ThreatQuotient is headquartered in Northern Virginia with international operations based out of Europe and APAC. For more information, visit https://threatquotient.com.