Analytics
11/21/2012
11:39 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Kudelski Group Launches Kudelski Security

Offering consists of a set of services initially focusing on assisting companies to assess risk and vulnerabilities

Cheseaux, Switzerland, November 21st, 2012 -The Kudelski Group (SIX:KUD.S), the world's leading independent provider of media content protection and value-added service technology, announces today the launch of Kudelski Security, its new Cyber Security division.

"Having dealt with security for a few decades and having fought piracy on behalf of our customers for the last 20 years, we have developed an unmatched talent pool with a unique skillset that we want to leverage by offering a new protection paradigm to anyone exposed on the internet," said André Kudelski, CEO of the Kudelski Group. "In an increasingly connected world, companies, families, individuals are all targeted by the new cyber threats and action is needed now," he added.

Going beyond a pure technology security offering

"The purpose of Kudelski Security is to deliver tailored cyber security solutions and services to enterprises, financial institutions, government administrations and our media customers. Initial focus will be Europe, before expanding the offering worldwide, such as for our existing media customers," said Christophe Nicolas, SVP & Head of Kudelski Security.

The Kudelski Security offering consists of a set of services initially focusing on assisting companies to assess risk and vulnerabilities in order to ensure privacy and confidentiality of their data and analytics as they move their business processes and applications in a cloud dependent ecosystem. The offer will include monitoring the evolution of the threats and keeping consumer data secured, while access to data becomes more dynamic and mobile, through new consumer devices like smartphones and tablets.

Kudelski Security goes beyond a pure technology security offering by combining technological know-how and legal expertise, compliance, field investigation & crisis communication into a new type of global Cyber Alert Response Squad.

Kudelski Security's global reach and multi-disciplinary incident response is reinforced by strategic international partnerships.

The Kudelski Security core team is now counting 80 dedicated security experts with field-proven electronic defense and response capabilities and we plan to expand this team progressively. The Kudelski Security team has access to 1000+ security experts in other Kudelski Group divisions.

About Kudelski Security

Kudelski Security, a division of the Kudelski Group, is an innovative independent Swiss provider of tailored cyber security solutions and services to enterprises, financial institutions, government administrations and the media industry. Its team of cyber security professionals boasts extensive expertise in the delivery of end-to-end digital security solutions built upon real-life experiences in advanced threat detection, security assessments, asset and reputation protection, as well as piracy risk mitigation. Kudelski Security's global reach and multi-disciplinary incident response is reinforced by strategic international partnerships. Kudelski Security is headquartered in Cheseaux-sur-Lausanne, Switzerland. For more information visit: www.kudelskisecurity.com

About the Kudelski Group

The Kudelski Group (SIX: KUD.S) is a world leader in digital security and convergent media solutions for the delivery of digital and interactive content. Its technologies are used in a wide range of services and applications requiring access control and rights management to secure the revenue of content owners and service providers for digital television and interactive applications across broadcast, broadband and mobile delivery networks. The Kudelski Group is also a world technology leader in the area of access control and management of people or vehicles to sites and events. The Kudelski Group is headquartered in Cheseaux-sur-Lausanne, Switzerland. For more information, please visit www.nagra.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7407
Published: 2014-10-22
Cross-site request forgery (CSRF) vulnerability in the MRBS module for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

CVE-2014-3675
Published: 2014-10-22
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.

CVE-2014-3676
Published: 2014-10-22
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."

CVE-2014-3677
Published: 2014-10-22
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.

CVE-2014-4448
Published: 2014-10-22
House Arrest in Apple iOS before 8.1 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information from a Documents directory by obtaining this UID.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.