Analytics
11/21/2012
11:39 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Kudelski Group Launches Kudelski Security

Offering consists of a set of services initially focusing on assisting companies to assess risk and vulnerabilities

Cheseaux, Switzerland, November 21st, 2012 -The Kudelski Group (SIX:KUD.S), the world's leading independent provider of media content protection and value-added service technology, announces today the launch of Kudelski Security, its new Cyber Security division.

"Having dealt with security for a few decades and having fought piracy on behalf of our customers for the last 20 years, we have developed an unmatched talent pool with a unique skillset that we want to leverage by offering a new protection paradigm to anyone exposed on the internet," said André Kudelski, CEO of the Kudelski Group. "In an increasingly connected world, companies, families, individuals are all targeted by the new cyber threats and action is needed now," he added.

Going beyond a pure technology security offering

"The purpose of Kudelski Security is to deliver tailored cyber security solutions and services to enterprises, financial institutions, government administrations and our media customers. Initial focus will be Europe, before expanding the offering worldwide, such as for our existing media customers," said Christophe Nicolas, SVP & Head of Kudelski Security.

The Kudelski Security offering consists of a set of services initially focusing on assisting companies to assess risk and vulnerabilities in order to ensure privacy and confidentiality of their data and analytics as they move their business processes and applications in a cloud dependent ecosystem. The offer will include monitoring the evolution of the threats and keeping consumer data secured, while access to data becomes more dynamic and mobile, through new consumer devices like smartphones and tablets.

Kudelski Security goes beyond a pure technology security offering by combining technological know-how and legal expertise, compliance, field investigation & crisis communication into a new type of global Cyber Alert Response Squad.

Kudelski Security's global reach and multi-disciplinary incident response is reinforced by strategic international partnerships.

The Kudelski Security core team is now counting 80 dedicated security experts with field-proven electronic defense and response capabilities and we plan to expand this team progressively. The Kudelski Security team has access to 1000+ security experts in other Kudelski Group divisions.

About Kudelski Security

Kudelski Security, a division of the Kudelski Group, is an innovative independent Swiss provider of tailored cyber security solutions and services to enterprises, financial institutions, government administrations and the media industry. Its team of cyber security professionals boasts extensive expertise in the delivery of end-to-end digital security solutions built upon real-life experiences in advanced threat detection, security assessments, asset and reputation protection, as well as piracy risk mitigation. Kudelski Security's global reach and multi-disciplinary incident response is reinforced by strategic international partnerships. Kudelski Security is headquartered in Cheseaux-sur-Lausanne, Switzerland. For more information visit: www.kudelskisecurity.com

About the Kudelski Group

The Kudelski Group (SIX: KUD.S) is a world leader in digital security and convergent media solutions for the delivery of digital and interactive content. Its technologies are used in a wide range of services and applications requiring access control and rights management to secure the revenue of content owners and service providers for digital television and interactive applications across broadcast, broadband and mobile delivery networks. The Kudelski Group is also a world technology leader in the area of access control and management of people or vehicles to sites and events. The Kudelski Group is headquartered in Cheseaux-sur-Lausanne, Switzerland. For more information, please visit www.nagra.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1421
Published: 2014-11-25
mountall 1.54, as used in Ubuntu 14.10, does not properly handle the umask when using the mount utility, which allows local users to bypass intended access restrictions via unspecified vectors.

CVE-2014-3605
Published: 2014-11-25
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-6407. Reason: This candidate is a reservation duplicate of CVE-2014-6407. Notes: All CVE users should reference CVE-2014-6407 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

CVE-2014-6093
Published: 2014-11-25
Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 7.0.x before 7.0.0.2 CF29, 8.0.x through 8.0.0.1 CF14, and 8.5.x before 8.5.0 CF02 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-6196
Published: 2014-11-25
Cross-site scripting (XSS) vulnerability in IBM Web Experience Factory (WEF) 6.1.5 through 8.5.0.1, as used in WebSphere Dashboard Framework (WDF) and Lotus Widget Factory (LWF), allows remote attackers to inject arbitrary web script or HTML by leveraging a Dojo builder error in an unspecified WebSp...

CVE-2014-7247
Published: 2014-11-25
Unspecified vulnerability in JustSystems Ichitaro 2008 through 2011; Ichitaro Government 6, 7, 2008, 2009, and 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; and Ichitaro 2014 Tetsu allows remote attackers to execute arbitrary code via a crafted file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?