BlueVoyant

New York, NY, USA
2017
  |  By Shira Reuveny and Inbal Sdayoor
Over the past year, BlueVoyant’s cyber threat analysts have identified a significant rise in third-party phishing tactics, most notably with a campaign impersonating the Zelle digital payment service. By mimicking a well-known payment site like Zelle, threat actors can evade detection more effectively while collecting credentials and personally identifiable information (PII) from online users of hundreds of financial institutions.
  |  By Milan Patel
Organizations’ security operations (SecOps) programs are under increased pressure due to more sophisticated threats, a continually expanding attack surface, and strained internal resources. To help solve these challenges, BlueVoyant MDR delivers 24x7 threat monitoring, detection, hunting, and response powered by advanced automation and human expertise.
The new NIS2 directive is designed to strengthen the cyber resilience of over 160,000 companies that operate in the EU - either directly or indirectly. Coming into force by 17th October, NIS2 regulations will outline how these essential entities can combat increasingly sophisticated and frequent cyber attacks.
  |  By BlueVoyant Threat Fusion Cell
BlueVoyant’s Threat Fusion Cell (TFC) uncovered a focused campaign targeting the advanced manufacturing sector. This campaign aims to steal Microsoft credentials, by spoofing Microsoft’s login page, to phish for potentially compromising sensitive information.
  |  By Jaime Guimera Coll
As we explored the capabilities of Copilot for Security, we discovered that while the native plugins offer access to a vast array of data, they didn't cover everything we needed for some of our specific use cases and promptbooks. For instance, we wanted detailed insights into Conditional Access policies from Entra ID, Intune policies, Secure Score, and more. Although Microsoft continues to enhance the native plugins by adding new skills, we opted to develop our own custom plugins.
  |  By Andrea Feldman
Fraudulent cyber attacks targeting the airline industry are a common issue largely seen coming out of the underground, such as the deep and dark web. According to RSA Security, airlines are the industry most affected by online fraud, accounting for 46% of fraudulent transactions. As a result, the financial costs for airlines are huge with losses due to fraud estimated at 1.2% of the total global airline revenue.
  |  By BlueVoyant and Protiviti
We're excited to announce that Protiviti, a global leader in consulting services and recognized authority in Microsoft compliance and identity, has formed a strategic partnership with BlueVoyant, an industry-leading MXDR Sentinel services provider, that additionally offers an AI-driven cyber defense platform.
  |  By BlueVoyant
BlueVoyant's Cyber Defense Platform seamlessly integrates AI-powered internal, external, and supply chain cyber defense to help organizations improve their cyber posture.
  |  By Milan Patel
We are over the moon to share that BlueVoyant has been awarded the Microsoft Worldwide Security Partner of the Year, demonstrating our leading-edge cyber defense capabilities and our strong partnership with Microsoft. We have also been recognized as the Microsoft United States Security Partner of the Year for the third time, and the Microsoft Canada Security Partner of the Year for the first time.
  |  By Alisdair McLaughlin
October is rapidly approaching, and that means new cybersecurity regulations known as NIS2 are set to be enacted by European Union (EU) member states. States are required to publish their local version of the NIS2 Directive into law by the 17th of October. Whilst many countries are well on track, however, some have already acknowledged they will not meet the deadline. This delay leaves organisations somewhat in the dark as to what they will need to comply with and by when.
  |  By BlueVoyant
In today's increasingly hostile threat landscape, organizations are grappling with a lack of resources and overworked security operations teams, making effective, full-coverage threat detection and response a significant challenge. BlueVoyant Managed Detection & Response provides a cloud-native solution that offers end-to-end consulting, implementation, and managed security services with 24x7 security threat detection and response.
  |  By BlueVoyant
The BlueVoyant Cyber Defense Platform helps secure Azure, Microsoft 365, and hybrid cloud environments. We're trusted by more than 1,000 clients in 40-plus countries.
  |  By BlueVoyant
Discover how to unleash the full capabilities of your Microsoft Security tools and optimize your Copilot experience with BlueVoyant.
  |  By BlueVoyant
Identify gaps and achieve NIS2 readiness with BlueVoyant.
  |  By BlueVoyant
Seamlessly integrate internal, supply chain, and external cyber defenses.
  |  By BlueVoyant
Discover how supply chain cyber breaches are impacting global organizations in BlueVoyant's fourth annual survey into supply chain cyber risk management.
  |  By BlueVoyant
We're excited to announce our acquisition of @conquestcyber, a leading provider of cybersecurity and risk management solutions for highly regulated industries and frameworks.
  |  By BlueVoyant
BlueVoyant’s MDR for Splunk and Splunk Enterprise Security creates a co-managed SOC to strengthen your security posture by maximizing and optimizing your Splunk Enterprise Security.
  |  By BlueVoyant
Your business is your castle. Once upon a time, you could keep it safe by constructing strong walls, posting a few guards at the door, raising the drawbridge, and digging a deep moat around it. That's now the stuff of fairy tales. Today's networks simply can't be locked down due to the nature of business itself. The perimeter that was once contained to a single building now spreads as far as your furthest third-party connection or remote employee. And while your business benefits from this greater flexibility and increased operational efficiency, so do the cybercriminals.
  |  By BlueVoyant
When it comes to designing or improving upon your organization's security program, one key area to focus on and include is cyber resilience. Either as a complementary stand-alone program or embedded into an existing cyber defense program, cyber resilience refers to a company's ability to continue business operations and outcomes in spite of cyber attacks or events.
  |  By BlueVoyant
In the past few years, third-party cyber attacks have imparted financial and reputational damage to every sector, from banks to healthcare systems to governments. The average cost of a third-party data breach in 2021 was $4.33 million, according to a report from IBM and the Ponemon Institute. While CISOs are well aware of the potential supply chain devastation from attacks, preventing them has been a challenge. In this white paper, we'll walk through three third-party breach scenarios, including real-world examples, offering practical solutions to prevent such attacks.
  |  By BlueVoyant
Businesses operating within the EU must prepare to comply with the stringent requirements of NIS2. Failure to do so could result in significant penalties, highlighting the urgency for organisations to act swiftly. NIS2 introduces new requirements in areas such as risk management, corporate accountability, reporting obligations, and business continuity.
  |  By BlueVoyant
In today's connected world, there's no shortage of entry points into financial institutions. From online banking websites to mobile apps, these crucial parts of a business are also easy targets. Taking a proactive approach to protect your customers' assets and your brand is the answer, but where do you start?

A comprehensive security operations platform empowered by AI to enable uninterrupted protection against potential threats.

BlueVoyant combines internal and external cyber defense capabilities into outcomes-based, cloud-native cybersecurity solution by continuously monitoring your network, endpoints, attack surface, and supply chain, as well as the clear, deep, and dark web for threats.

BlueVoyant Cyber Defense Platform:

  • Detection & Response: Protect your endpoints, network, and cloud from sophisticated threats while leveraging your existing security tool investments — EDR, SIEM, others.
  • Supply Chain Defense: Rapidly identify and drive remediation of critical cybersecurity issues in your third-party ecosystem, including zero-day and emerging vulnerabilities.
  • Digital Risk Protection: Detect and eliminate cyber threats originating in the clear, deep, and dark web before they impact your business and customers.
  • Cyber Posture Management: Systematic approach that involves the continuous measurement, management, and mitigation of cyber risk.
  • Proactive Defense: Collaborative and holistic approach to attack surface management that includes vulnerability management, penetration testing, phishing awareness, dark web threat research, and configuration management.

Seamless AI-driven internal, external, and supply chain cyber defense, all within one powerful Security Operations Platform.