KELA Announces New Partnership With CYWARE to Deliver Data and Intelligence From Its Unique Security Data Lake

KELA, the world's leader in preventing cybercrime, today announced a partnership with CYWARE, the leading Virtual Cyber Fusion platform provider. KELA will list their cybercrime threat intelligence data in CYWARE's Situational Awareness Platform (CSAP), to enable near-instant, seamless, secure sharing of the rich data lake of historical, processed intelligence from the hardest-to-reach cybercrime sources around the internet that KELA holds.

Commenting on the partnership, Itsik Kesler, CTO at KELA, said: "We are excited to make our unique intelligence available via CYWARE. Reaching cybercrime sources may be risky and complicated for organizations, yet through this partnership, our high-end intelligence becomes available in a safe and structured way for joint customers through CSAP."

Shahar Kodraty, Head of Alliances at Cyware, added: "CSAP provides enterprises, information sharing communities (ISACs/ISAOs), and national CERTs with precise control over the sharing of sensitive threat intelligence, vulnerabilities, and malware advisories. By partnering with KELA, we can offer valuable exposure to Cybercrime threat intelligence. When accompanied by Cyware's low-code security automation and threat response, organizations can streamline security operations and stay ahead of threats."

KELA's annual State of CYBERCRIME Threat Intelligence E-book found that security practitioners want to be able to quickly access cybercrime sources in a secure and non-attributional manner and receive an immediate notification of a suspected breach related to any organizational assets via proactive monitoring of the cybercrime underground. Many of these sources are extremely hidden within the cybercrime underground and include ransomware blogs, cybercrime forums, Telegram groups, data leak sites, and illicit markets. 

As part of its continuing mission to empower organizations to neutralize relevant threats and shed light on the unknown, undetected cybercrime activity, KELA equips defenders with visibility into underground operations, through CYWARE's CSAP platform, to stay ahead of attackers while maintaining anonymity and abiding by any security restrictions.

KELA's security data lake contains a combination of data automatically collected from various cybercrime underground sources and intelligence insights provided by cybercrime intelligence subject matter experts. This data - spanning closed forums, illicit markets, automated cybercrime shops, instant messaging channels used by criminals, and more - can be used by defenders in order to understand how their attack surface is viewed by attackers and facilitate intelligence-driven defense.

About KELA

An award-winning cybercrime threat intelligence firm, KELA's mission is to provide 100% actionable intelligence on threats emerging from the cybercrime underground to support cybercrime prevention. Our success is based on a unique integration of our proprietary automated technologies and qualified intelligence experts. Trusted worldwide, our cybercrime threat intelligence and cybercrime attack surface intelligence technology automatically penetrates the hardest-to-reach corners of the internet to provide you with unique, contextualized, and actionable insights. Our solutions infiltrate underground places your team can't reach and thoroughly learn your unique requirements to uncover direct threats to your organization. KELA's tailored threat visibility, combined with cybercrime attack surface intelligence, arms you with highly contextualized intelligence, as seen from the eyes of attackers, thus enabling proactive network defense. For more information, visit www.ke-la.com.

About Cyware

Cyware helps enterprise cybersecurity teams build platform-agnostic cyber fusion centers by delivering cyber threat intelligence and next-generation SOAR (security orchestration, automation, and response) solutions. As a result, organizations can increase speed and accuracy while reducing costs and analyst burnout. Cyware's Cyber Fusion solutions make secure collaboration, information sharing, and enhanced threat visibility a reality for MSSPs, enterprises, government agencies, and sharing communities (ISAC/ISAO/CERTs and others) of all sizes and needs. For more details, visit cyware.com.

Media Contact 

Efrat David

efratd@ke-la.com

Source: KELA

Share:


Categories: Business Technology

Tags: cybercrime, cybercrime threat intelligence, cybercrime underground