Tuesday, 30 June 2020

Zero trust further considered - another benefit of living in the times of AI

The path to securing the remote workforce should be seamless and experienced as a hassle-free balance between safety and a quality user-experience. It is pivotal to implement appropriate security practices, as inadequate measures can lead to unmanaged risks and the endangerment of corporate systems, data and employees.



from Cyber Security News https://ift.tt/2Zplqv5

Security leadership: Women on the frontline

Meet 13 female executives who are succeeding in security leadership roles.



from Cyber Security News https://ift.tt/3gdX8ej

ISACA announces 2020-2021 Board of Directors

Global technology association ISACA recently installed its 2020-2021 Board of Directors at its virtual Annual General Meeting, featuring a strong combination of executive expertise and association and chapter leadership experience.



from Cyber Security News https://ift.tt/38hUAJw

Risk management concerns rising at ports as COVID-19 disruption grows

The spread of COVID-19 and the economic and trade disruption the pandemic has caused, is prompting port managers to examine new ways to improve risk management and digital processes, according to the latest global ports survey conducted by Remy InfoSource.

from Cyber Security News https://ift.tt/3ga6g3J

Georgia State named National Center of Academic Excellence in Cyber Defense Research and Education

The National Security Agency (NSA) and the Department of Homeland Security (DHS) have designated Georgia State University as a National Center of Academic Excellence in Cyber Defense Research and a National Center of Academic Excellence in Cyber Defense Education through 2025.

from Cyber Security News https://ift.tt/38gnI40

Russian cybercriminal group targeting American remote workers

A Russian ransomware group whose leaders were indicted by the Justice Department in December is retaliating against the U.S. government, many of America’s largest companies and a major news organization, identifying employees working from home during the pandemic and attempting to get inside their networks with malware intended to cripple their operations, reports The New York Times. 

from Cyber Security News https://ift.tt/3gbRysT

New study shows exploitable attack surface within cloud services and remote healthcare

Vectra® AI released its 2020 Spotlight Report on Healthcare, which shows an upward trend in exploitable behaviors and discredits claims that external threats would lead to increased internal threat activity.

from Cyber Security News https://ift.tt/2VwOO1E

Top three ways hackers get around authentication

Criminal hackers use a variety of techniques to get around current verification protocols involving passwords. Broadly speaking, they fall into three categories.

from Cyber Security News https://ift.tt/2NJABtC

Leveraging packet data to improve network agility and reduce costs

Traditional network management approaches of multiple point products, manual change processes, monolithic policies and data silos no longer work. Business, risk, service and security assurance programs all need to be agile, efficient and anticipate future threats and remedies.

from Cyber Security News https://ift.tt/3eR4Rig

Monday, 29 June 2020

ISACA guide outlines how to strengthen enterprise supply chain resiliency

A new white paper from ISACA, ‘Supply Chain Resilience and Continuity: Closing Gaps Exposed in a Global Pandemic’, offers approaches that enterprises can implement to increase the resiliency of their supply chain.



from Cyber Security News https://ift.tt/3ibofsm

Stephen Tycer named CISO at the University of Arkansas

Stephen Tycer has been named the new chief information security officer (CISO) at the University of Arkansas, effective June 29.   

from Cyber Security News https://ift.tt/2VtkHI5

66% increase in GDPR data breach notifications across European markets

According to a Linklaters analysis, there has been a major increase of data breach notifications to data protection authorities, with an average increase in notifications of 66 percent compared to Year 1 of the EU General Data Protection Regulation (‘GDPR’). 

from Cyber Security News https://ift.tt/2YGIbLR

Sunday, 28 June 2020

Steps for businesses to respond to COVID-19 now and prepare for what comes next

There is hope in these uncertain times: with the right planning and execution, businesses can bounce back from what's quickly becoming a global recession and return to good health. It takes the right strategy, a flexible approach and a desire to achieve organizational resilience.

from Cyber Security News https://ift.tt/2NAfdHi

Microsoft Office 365 – convenience in the cloud or an open invitation to hackers?

The question is this. Is this skepticism based on fact or as a result of that well-established human trait – resistance to change? In other words, does the convenience offered by a cloud app outweigh potential security threats such as hacking, and how susceptible are SaaS (Software as a Service) cloud apps to attack in the first place? To answer this question, let’s consider Microsoft Office 365, which is one of the most widely used software packages on the planet with more than 27 million consumer users and over 100 million enterprise users.

from Cyber Security News https://ift.tt/2Vo3XlC

Understanding the needs of IoT security

From a security perspective, we also tend to look at IoT in the wrong way. With every new device, we assume the technology will be vulnerable with a very high risk of compromise. The reality is that most IoT devices have a very low risk individually, but their functionality is what leaves them susceptible.

from Cyber Security News https://ift.tt/3872uW6

Congressional cybersecurity leaders introduce legislation to establish a National Cyber Director

A bipartisan group of six House members introduced a bill to establish a National Cyber Director in the Executive Office of the President to coordinate cyber policy across the Federal government.



from Cyber Security News https://ift.tt/3dB7svm

Why every CIO should retire their VPNs

Now is the time every CIO should retire their virtual private network (VPN) technology.



from Cyber Security News https://ift.tt/3dCcVC4

Friday, 26 June 2020

Domestic abuse prevention app exposes victims in massive data breach

vpnMentor’s research team, led by analysts Noam Rotem and Ran Locar, recently discovered a sensitive data breach originating from the domestic violence prevention app Aspire News App. 

from Cyber Security News https://ift.tt/3861JfH

Attackers target exposed API endpoints to facilitate DDoS attacks and mine cryptocurrencies

Malicious actors are taking advantage of the opportunity to target exposed API endpoints and craft malware-infested images to facilitate distributed denial-of-service (DDoS) attacks and mine cryptocurrencies.

from Cyber Security News https://ift.tt/2YCeknX

California Rep. Josh Harder to introduce bill to harden school cybersecurity

Representative Josh Harder (CA-10) will introduce the Protecting Students from Cybercrimes Act, a bill which would provide grants to help local school districts harden their cybersecurity infrastructure.

from Cyber Security News https://ift.tt/3eOtA73

Thursday, 25 June 2020

Balancing security and innovation in a crisis

With security resources and budgets stretched thin to accommodate remote workforces, cybercriminals were quick to capitalize on the increased attack surface and general uncertainty, striking with a 667 percent increase in coronavirus-related cyberattacks. 

from Cyber Security News https://ift.tt/3g0CUoe

Conforming data collection to cybersecurity industry regulations

“There are only two types of companies: those that have been hacked, and those that will be.” When former FBI Director Robert Mueller spoke those words in 2012, he sounded hyperbolic. Almost a decade later, it seems prophetic.

from Cyber Security News https://ift.tt/2VmvBiO

NSA outlines requirements for secure collaboration services for US government telework

Due to COVID-19 concerns, many United States Government (USG) personnel must now operate from home while continuing to perform critical national functions and support continuity of government services.

from Cyber Security News https://ift.tt/2VjOLpv

Northern Kentucky University launches undergraduate cybersecurity program

Northern Kentucky University now offers the only undergraduate cybersecurity program in the Great Cincinnati region.



from Cyber Security News https://ift.tt/2CFrEzj

ISC West 2020 in-person event has been canceled

ISC West 2020 scheduled for October 5-8 in Las Vegas, Nev., has been canceled due to industry and market circumstances.

from Cyber Security News https://ift.tt/3fTwwPy

Information Security Forum explores the risks and challenges of open source software

The Information Security Forum has announced the release of Deploying Open Source Software: Challenges and Rewards, helping security professionals recognize the benefits and perceived challenges of using OSS and set up a program of protective measures to effectively manage OSS.

from Cyber Security News https://ift.tt/3fZggwI

Most Americans willing to forego personal data privacy to combat spread of COVID-19 and return to work faster

Three in four Americans (75 percent) are thinking more about data privacy issues amid COVID-19, yet most are willing to share their personal information to keep others safe and to return to work faster, a pulse survey of 1,000 workers by KPMG found.

from Cyber Security News https://ift.tt/3dwrQO7

Are Home Wireless Networks Worth the Effort?

Security issues with computers and networks are in the news constantly. While there are issues users need to address when using networks, the advantages of a home network far outweigh any potential disadvantages. With the advent of the Internet of Things, homeowners will garner even more from their home networks. So, there are several possible responses when anyone asks why set up a home network?

What can be connected to a home network?

While the original intent of home networks was to connect multiple computers to a single Internet source, home networks now serve as a hub connecting countless devices. Home networks still connect multiple computers but, today, networks are routinely used to connect gaming devices, televisions, and even home appliances, allowing all devices to communicate within the home or with remote devices.

How are networks set up?

There are two ways to design home networks. First, they can be wired together. In the past, that was the only option. All devices were physically linked using a series of cables. However, wiring devices created a variety of issues, especially when devices were some distance apart. Routing wiring is problematic and can be unsightly. Today, most home networks are wireless, relying on radio waves rather than physically attaching each device using cables.

Is it difficult to configure a wireless home network?

As a rule, no. Modern devices were designed to accommodate home wireless networks. While the initial installation may take a little time, linking devices is generally quite simple. Using wireless networks also saves money, as devices like printers are easily shared by multiple devices. DVD players, televisions and gaming equipment can all take advantage of a single modem and wireless router, cutting down on clutter.

Are security issues important?

Of course. However, the equipment comes with detailed instructions to prevent unauthorized access to the network. Open networks, where no password is needed to access the network, are strongly discouraged by security professionals. Simply following the recommendations provided by Internet and equipment providers will normally provide a relatively high level of security for home networks. Because security issues are evolving, it’s always important to stay abreast of potential threats. When prompted to allow providers to send updates, do so.

Home networks are evolving rapidly, especially with newer generation security and environmental systems taking advantage of network capabilities to improve home comfort and safety. If your home does not have a network, consider installing one today.



from We Hate Malware https://ift.tt/31j9BJw

Wednesday, 24 June 2020

Jason Lee named CISO at Zoom

Zoom Video Communications, Inc. announced that Jason Lee will join the company as its Chief Information Security Officer.



from Cyber Security News https://ift.tt/386BJkE

An attacker’s perspective on choosing a red-team or pen-test engagement

Sitting on the frontlines as a red-teamer, people regularly ask me, “Should I do a pentest or hire a red team?”  But that’s not the question they should be asking. 



from Cyber Security News https://ift.tt/3fQSUsQ

Introducing Nulledflix - a video streaming service created exclusively for a cybercriminal forum

Digital Shadows has identified Nulledflix, a brand new live-streaming service on the English-language cybercriminal platform Nulled  that enables members to watch live streams together.

from Cyber Security News https://ift.tt/3hX8e9l

TSA updates roadmap to address current global risks & threats to nation’s transportation systems

The Transportation Security Administration (TSA) published an outline of key objectives to continuously improve security and safeguard the nation’s transportation systems.

from Cyber Security News https://ift.tt/37WN46F

New survey reveals impact of pandemic on business productivity, performance and security

A new survey revealed that the transition to widespread remote work presented myriad business challenges and security risks for the employees on the front lines of IT security.



from Cyber Security News https://ift.tt/31fvTMe

Tuesday, 23 June 2020

Deepfakes will tell true lies

Organizations need to enhance current technical security controls to mitigate against the threat of deepfakes to the business. Training and awareness will also need revamping with special attention paid to this highly believable threat.

from Cyber Security News https://ift.tt/2CxR1D7

Black Hat research predicts significant changes to security operations post COVID-19 and exploit concerns for 2020 U.S. Election

Black Hat's sixth annual community survey, Cyber Threats in Turbulent Times, highlights how the COVID-19 pandemic and U.S. presidential election will have a significant impact on the information security industry in 2020.



from Cyber Security News https://ift.tt/2Z26UcB

Homeland Security Advisory Council announces new Youth Engagement Subcommittee nembers

The Department of Homeland Security (DHS) Homeland Security Advisory Council (HSAC) has introduced eight new members to the Youth Engagement Subcommittee. 

from Cyber Security News https://ift.tt/3fQSm6t

Despite gains in budget and strategic priority for SOCs, burnout, overload and chaos persist in many organizations

The second annual Devo SOC Performance ReportTM, based on a survey conducted by Ponemon Institute, found that 60% of Security Operations Center (SOC) team members are still considering changing careers or leaving their jobs due to stress. 



from Cyber Security News https://ift.tt/3hVLzKs

Monday, 22 June 2020

How hackers are using COVID-19 to find new phishing victims

Hackers will always exploit a crisis, and the coronavirus outbreak is no different. Since January, cybercriminals have leveraged the COVID-19 pandemic to stage all manner of cyberattacks, from ransomware take-overs of hospital systems to private network hacking. But the latest cybercrime scheme exploits the greatest cybersecurity vulnerability of all: human emotion.

from Cyber Security News https://ift.tt/2CynxVR

Half of information security professionals had no contingency plan in place for COVID-19

Half of infosec professionals revealed that their organizations didn’t have a contingency plan in place, or didn’t know if they did, for a situation like COVID-19 or a similar scenario. 

from Cyber Security News https://ift.tt/2VpIjxB

Bethany De Lude named CISO at Cred

Cred, a blockchain-based financial services platform, announced Bethany De Lude will take over all security operations as Chief Information Security Officer.



from Cyber Security News https://ift.tt/37TaQQU

MITRE establishes Center for Technology & National Security Advisory Board

MITRE’s Center for Technology & National Security (CTNS), created to enhance MITRE’s engagement with senior government leadership, named five highly esteemed national security officials to its newly established advisory board.



from Cyber Security News https://ift.tt/3drU4cK

Security Industry Association announces virtual 2020 AcceleRISE conference for young security talent

The Security Industry Association (SIA) has announced the details for AcceleRISE 2020 – a virtual conference created by SIA’s RISE community for young professionals in the security industry – taking place July 27-31.

from Cyber Security News https://ift.tt/2NjBBVd

Darryl Bercegeay named CISO at Investar Bank

Investar Bank recently hired Darryl Bercegeay as its Chief Information Security Officer (CISO) and Senior Vice President.



from Cyber Security News https://ift.tt/2V71bBj

Sunday, 21 June 2020

With ransomware attacks increasing, cyber insurance now seen as a necessity, not a luxury

Threat actors launched a cyberattack against the Texas Office of Court Administration, the IT provider for many Texas courts, and encrypted their computer systems with ransomware, leaving those systems useless. Cognizant, which has a large presence in Dallas-Fort Worth and is one of the world’s largest and most sophisticated providers of information technology services for other companies, was hit with ransomware with losses currently estimated between $50 million and $70 million.

from Cyber Security News https://ift.tt/3hR1XMv

New challenges for AI, data privacy and the 5G hackathon

There is a trade-off between technology innovation and security. The adoption of emerging technologies like 5G will fuel the proliferation of Internet of Things (IoT) which are often built with basic security controls, creating a larger attack surface. At the same time, reliance on data means that data breaches can cause greater damage.

from Cyber Security News https://ift.tt/31aN3dM

UA Little Rock to offer Bachelor’s degree in cybersecurity

The University of Arkansas at Little Rock is introducing a new four-year degree program in cybersecurity in the fall 2021 semester to help meet the rising demand for cybersecurity professionals. 



from Cyber Security News https://ift.tt/3hOmH7t

Saturday, 20 June 2020

A Brief Guide For Increasing The Security Of Your Mobile Devices

[dropcaps]I[/dropcaps]n today’s society, mobile phone security is a vital necessity. Consumers now use smart-phones as much or more than computers to transmit confidential information. These actions could; however, in the end expose them to more security risks as cyber crimes are on the rise. The highest percentage of these crimes are associated with online shopping.

What is Mobile Phone Security?

Essentially, mobile phone security encompasses the tactics used to prevent the compromise of private information. The tactics are used to prevent the exploitation of weaknesses found within the smart-phones. The security methods are generated to improve the mobile experience for all users and prevent the theft of their intellectual property and personal information.

The Most Common Threats

Malicious software is often introduced through text messages. These attacks rely on average users who don’t know how this software works. It can manipulate the smart-phone and send messages to the user via their contacts. In most instances, a link is included. When the user clicks the link, the software attacks and could cause a complete denial of service while it acquires all information within the device.

Security Tips to Protect Your Information

Smart-phone users who shop online should always use links that offer a secured socket layer. You’ll recognize them within the address bar. They start with “https:” and show a padlock out to the side in most instances.

Secure Your Phone

Always set up a password for your smart-phone. This prevents anyone from gaining physical access to your information if you lose your phone. Don’t use any names connected to you directly. Don’t use the birth date of your children. Use something random that you could remember that isn’t accessible if a thief acquires your wallet.

Additionally, you should use GPS for your phone. Some contract packages include this feature. However, if your plan doesn’t you could download an app for free.

Smart-phones have replaced the storage of a PC for most consumers. Unfortunately, this could leave their information ripe for the picking. By using effective security tactics for your smart-phone, you prevent a security breach that could cause a significant loss of your confidential information. Read further for more security tips to keep your smart-phones safe.



from We Hate Malware https://ift.tt/3120ooS

Three Basic Steps to Keep Your Computer Data Secure

[dropcaps]A[/dropcaps] large percentage of computer users routinely neglect to protect the information on their computers. That makes them potential targets for malicious software that can quickly gather that data and use it to empty bank accounts and run up charges on credit cards. Recent malware attacks have also held unprotected computers hostage, with hackers demanding ransom before providing a code to unlock the computer. By following some basic steps, computer users can avoid the majority of threats to their computers’ security.

Use Strong Passwords for All Sites

While it’s tempting to use the same password for everything, that’s a dangerous practice. If one site is hacked, the security of all your commonly used programs and sites is threatened. Computer security experts always recommend using strong passwords and never using the same password for multiple sites. Obviously, even moderate computer users can quickly generate many hard-to-remember passwords, so taking advantage of some sort of password management software is a great idea.

A great software tool that can help you to keep track of all your passwords securely is LastPass.  I highly recommend this software.  It has helped me out so much as I can create random passwords now without worrying that I’m going to forget them.

Keep Software Up to Date

Browsers are constantly under attack by hackers, so it is important to install updates as they are provided. It’s also important to install and routinely run software designed to discover and eliminate all types of malware. If you’re the type of person who tends to forget to do so, configure the software to update and run automatically. Doing so will prevent a large percentage of the malware typically circulating from infecting your computer.

Always Back Up Your Data Files

No matter how careful you are, there is still a potential for malware to infect your computer. While system hardware is generally easy to restore, losing valuable data can create significant problems. Set up a regular routine for backing up all files, either to an on-site backup hard drive or to a cloud-based storage system. Again, the process can be automated or manual. The important thing is that steps are taken to back up all files often. If your computer is ever infected, the losses will be minimized.

I suggest Backblaze or MyPCBackup, which I use myself.  I use Backblaze for my video editing PC and MyPCBackup for my business laptop.  They are very cost effective ways of backing up your computer as you can set the software to back up at a set time each day, which is enormously helpful.  Online backup is also helpful in terms of being an “off site” backup in case of a disaster such as a flood or house fire.

The data security best practices are constantly evolving, which means all computer users should take the time to stay abreast of changes affecting their systems. By doing so, the chances of your data being lost or stolen will be significantly reduced. Taking some time to put a few precautions in place now can save a great deal of time and stress later.



from We Hate Malware https://ift.tt/3hJuSC3

Thursday, 18 June 2020

Hugo Teufel Joins CenturyLink as Chief Privacy Officer

CenturyLink, Inc. announced that Hugo Teufel has joined the technology company as its new chief privacy officer. As a noted expert in the field, he will advise the company on privacy and security issues and will work closely with CenturyLink’s sales, IT and security teams to help design, implement and refine strategic privacy initiatives throughout the company.

from Cyber Security News https://ift.tt/2AQwIQL

New NIST Standards on IAST and RASP Deliver State-of-the-Art AppSec

The new NIST standards for IAST and RASP are a testament that outside-in AppSec approaches are antiquated, inefficient, and ineffective. Security instrumentation is more than a paradigm shift of the future—it is an opportunity for today.

from Cyber Security News https://ift.tt/3egqvvZ

Small-to-Medium-Sized Enterprises More Likely to Adopt Cyber Insurance

Cowbell Cyber released “The Economic Impact of Cyber Insurance,” a survey analysis focused on cyber insurance for SMEs.

from Cyber Security News https://ift.tt/2YLfLiT

Wednesday, 17 June 2020

Want to Stop Data Breaches? Keep an Eye Out for These Six Employee Personas

Although it is tempting to think of breaches as being exclusively caused by malicious cybercriminals hacking corporate networks, the truth is that a significant portion are caused—or least facilitated—by insiders.

from Cyber Security News https://ift.tt/3edR4SH

5 Tips for Minimizing Third-Party Risk

Outsourcing has become a vital part of most business strategies. Not only is it a way to save money, but it’s a simple way to take advantage of expertise you might not currently have in house. But outsourcing can also leave companies vulnerable if the third-party doesn’t have proper cybersecurity procedures.

from Cyber Security News https://ift.tt/2UShxxe

Widespread Cybersecurity Problems Across Intelligence Community, Claims US Senator Ron Wyden

U.S. Senator Ron Wyden has asked Director of National Intelligence John Ratcliffe to explain what steps he is taking to improve the cybersecurity of some of the nation's most most sensitive secrets, held by federal intelligence agencies, after Wyden obtained a "damning" CIA report on cybersecurity failures that led to “the largest data loss in CIA history" after a CIA employee stole "at least 180 gigabytes" of information and then provided that to WikiLeaks. 

from Cyber Security News https://ift.tt/2CaY3NU

AI: Beating Bad Actors at Their Own Game

Like any technology, AI holds the potential to be weaponized, and more of this type of activity is certainly on the horizon.

from Cyber Security News https://ift.tt/2UWgblf

Research Confirms Links Between Cyber Attacks, Consumer Purchasing and Brand Loyalty

New research has found that while most consumers are taking necessary security precautions to protect their online accounts, businesses may not be doing enough to protect their information – inadvertently driving sales to competitors that can. 



from Cyber Security News https://ift.tt/2Nacbtg

Tuesday, 16 June 2020

The Security Vulnerabilities Emerging from the Coronavirus Pandemic

The pandemic has exposed deeper, more significant cracks in enterprise security. As companies plan for a phased return to normal operations, it’s imperative that they are aware of these vulnerabilities and make addressing them a central part of their coronavirus response.

from Cyber Security News https://ift.tt/30PknqT

40% of Consumers Hold CEO Personally Responsible for Ransomware Attacks

Two-fifths (40%) of consumers hold business leaders personally responsible for ransomware attacks businesses suffer, according to global research from Veritas Technologies.  



from Cyber Security News https://ift.tt/37Dn3cA

University of Idaho Launches Cybersecurity Bachelor's Degree Program

The University of Idaho College of Engineering is launching Idaho's first bachelor's degree program in cybersecurity, open to students this fall.



from Cyber Security News https://ift.tt/2YGbgWO

New SOC Research Reveals Security Teams Overconfident in Detecting Cyberthreats

A new report that examines the processes and effectiveness of corporate security operations centers (SOCs) reveals that 82% of SOCs are confident in the ability to detect cyberthreats, despite just 22% of frontline workers tracking mean time to detection (MTTD), which helps determine hacker dwell time. 



from Cyber Security News https://ift.tt/2N6FDQQ

BlockFi Hires New Chief Security Officer

Crypto lender and financial services company BlockFi announced that it has hired Adam Healy as its new Chief Security Officer.



from Cyber Security News https://ift.tt/37AUPit

Cybersecurity Index Shows the Most Exposed Countries

A new Cybersecurity Exposure Index (CEI) reveals which countries are the most and least exposed to cybercrime.



from Cyber Security News https://ift.tt/3d3Ifta

Massive Vulnerability Found Across 100's of Millions IoT Devices

JSOF has discovered a series of vulnerabilities stemming from one small software library that has rippled across the supply chain, affecting 100's of millions of IoT devices. 



from Cyber Security News https://ift.tt/3eagGQf

Uptick in Nation State Misinformation Campaigns and Cyberattacks on Healthcare Sector

4iQ released its COVID-19 Threat Report, which explores a host of notable scams that have surfaced during these uncertain times, including sextortion/blackmail emails, fake news, ransomware and phishing campaigns.

from Cyber Security News https://ift.tt/2Y6gITB

Charles Blauner Joins Team8 as Operating Partner and CISO in Residence

Charles Blauner, previously Global Head of Information Security at Citigroup, joins Team8 as Operating Partner and CISO in Residence.



from Cyber Security News https://ift.tt/3fuQ78A

Overreliance on Passwords Continues to Compromise Data Security, Finds Thales

According to the 2020 Thales Access Management Index – U.S. and Brazil Edition1– four out of ten IT security professionals still see usernames and passwords as one of the most effective means to protect access to their IT infrastructure, even though most hacking-related breaches are a result of weak, stolen or reused user credentials.

from Cyber Security News https://ift.tt/3hCg3kO

Understanding the Cloud-Based Backup Service and Solutions

[dropcaps]H[/dropcaps]aving your data and files securely and automatically backed up is one of the most important steps you can take. Putting your documents, music, photos, and other data into the cloud lets you get your files no matter what computer or mobile device you are using. It offers a convenient way to back up your data. Switching to a cloud-based backup is an important decision that requires a clear understanding of how a solution will integrate into your business.

What is Cloud Backup

Cloud backup is a form of service through which cloud computing resources and infrastructure are used on creating, editing and restoring data, services or application backup. This form of backup is also known as online or remote backup, and it is remotely done over the internet.

The Backup Services

Many great cloud storage services have free accounts that usually come with few limitations. Some cloud storage services are niche while other specialize on e-signatures, so that your collaborators can sign all those documents that you are storing and sharing via the internet. File-syncing has become an integral part of online backups.

These days, one can sign up for an online cloud storage service such as Dropbox, Box or the Google drive and have all your files made available to you, no matter where you are located or which device you are using. The very best cloud backup solutions play nicely with other apps and services to make the experience of working with your files to be seamless.

Key benefits of Cloud backup services

As companies cope with the growing amount of corporate information that is being generated every day, they face the daunting task since not having their data, they have no business. Cloud backups, recovery and restore options have emerged as secure, cost effective and reliable solutions. The key benefits of cloud-based storage services include:

[list][item icon=”fa-flag” ]Lower total cost of ownership – A cloud backup, recovery and restore services takes the advantage of your existing infrastructure so that you do not need to buy or install expensive equipment.[/item] [item icon=”fa-flag” ]Improved reliability and speed recovery – Cloud based solutions and recovery systems instantly restore data regardless of your location including the individual files. You can work with managed service provider in establishing recovery point objectives.[/item] [item icon=”fa-flag” ]A more secure method of file transfer – The files that are selected for backup are encrypted before they are transmitted and remain encrypted once they reach their destination.[/item] [item icon=”fa-flag” ]Smarter use of IT resources – A cloud storage and recovery solution allows your business or other services to redirect IT resources to more pressing challenges or strategic initiatives within your organization. There is a built-in scalability of this form of backup that makes it easy for businesses to grow.[/item] [item icon=”fa-flag” ]Stronger compliance safeguards – Although companies continue to assume liability for the data security when moving to the cloud, a provider using multiple data centers that are geographically diverse can offer a backup solution with more reliability and redundancy.[/item][/list]

By use of cloud backups, you can access your files from your phone. Regardless of the information contained in your files and folders, you can rest assured that no one can access any of these files without your permission. Software in the background keeps your files continuously updated and automatically backed up. You can set up an account for unlimited storage and have thousands of your files backed up.



from We Hate Malware https://ift.tt/2C30L87

Monday, 15 June 2020

How to Minimize the Risk of Insider Threats (Physical and Cyber) During COVID-19

Which 13 physical and cybersecurity threats should security leaders be on the lookout for during the COVID-19 pandemic?

from Cyber Security News https://ift.tt/2AFJhyf

CISA, SAFECOM, NCSWIC and FPIC Release Encryption Key Management Fact Sheet

To help agencies understand and effectively manage encryption keys, SAFECOM and the National Council of Statewide Interoperability Coordinators (NCSWIC), in collaboration with the Federal Partnership for Interoperable Communications (FPIC), developed the Encryption Key Management Fact Sheet. Public safety organizations can leverage the Fact Sheet's information and familiarize themselves with the many aspects of encryption key management. 

from Cyber Security News https://ift.tt/3hy0Kt5

Sunday, 14 June 2020

How Data Tokenization Affords Analytical Value

Recently, data tokenization has proved to be a successful protection method for securing sensitive information and all instances of personal data. This is because it allows information to retain its analytical value, while ensuring that it meets regulatory requirements.

from Cyber Security News https://ift.tt/2N1T04s

Cellular Connectivity at the Forefront of Network Security

Embedding cellular technology in a business continuity plan allows organizations to scale the network as needed, offer further security for those outside the corporate walls and ensures IT teams can more easily monitor and resolve any potential issues faster and easier. The workforce of tomorrow will see remote work security and cellular connectivity go hand-in-hand.

from Cyber Security News https://ift.tt/2zv9Zcm

Thursday, 11 June 2020

Microsoft: Misconfigured Kubeflow Workloads are a Cybersecurity Risk

Microsoft's Azure Security Center (ASC), which regularly searches for and researches for new attack vectors against Kubernetes workloads, revealed a new campaign that was observed recently targeting Kubeflow, a machine learning toolkit for Kubernetes.

from Cyber Security News https://ift.tt/3fkjg6z

How "Militia-Sphere" Platforms Have Grown Exponentially During COVID-19

A new report, COVID-19, Conspiracy and Contagious Sedition: A Case Study on the Militia-Sphere, details how the Militia-sphere’s messaging has grown increasingly extreme as the pandemic has progressed, to the point of threatening and enacting violent attacks. 

from Cyber Security News https://ift.tt/3fdZvxi

Campbell University Announces New Department of Security and Computing

The Campbell University College of Arts and Sciences has announced the formation of a new academic department, the Department of Security and Computing, which will house cybersecurity, homeland security and ITS programs.

from Cyber Security News https://ift.tt/2XUCA4s

Bob Olsen Promoted to Lead Ankura's Global Cybersecurity and Privacy Group

Bob Olsen, Senior Managing Director, has been appointed Global Head of Cybersecurity and Privacy at Ankura, global business advisory services firm. Based in Baltimore, Olsen will be responsible for supporting the continued expansion and growth of the firm’s cybersecurity and privacy practices in both existing and developing markets.



from Cyber Security News https://ift.tt/37nAnkY

Honda Pauses Production and Closes Offices due to Ransomware Attack

Honda's global operations have been hit with a ransomware attack. The company said earlier that the attack had affected operations at several facilities, as well as both customer service and financial services operations. 

from Cyber Security News https://ift.tt/3f8PMbE

Why Visitor Management is Critical for Business Continuity During and Post-COVID-19

What are seven concrete steps you can put in place to address visitor management in this crisis situation and during your recovery phase for re-entry to the office?

from Cyber Security News https://ift.tt/3dZAx4A

The Top Five Cybersecurity Defense Insights for 2020

CyberEdge's annual Cyberthreat Defense Report (CDR) reveals the top five cybersecurity insights for 2020. 

from Cyber Security News https://ift.tt/2XU3n0E

Device Hardening Techniques End Users Can Employ to Outsmart Hackers

Video surveillance systems have always been vulnerable to attacks. Ever since IP technology was first introduced, security cameras have been an attractive target for hackers.

from Cyber Security News https://ift.tt/3cUxFVl

Wednesday, 10 June 2020

Tech that Saves Lives: The New Trend in Car Seat Safety

[dropcaps]E[/dropcaps]very summer, stories surface of caregivers who accidentally leave a little one in the car, often with horrific consequences. Tech companies have stepped in to offer parents life-saving solutions, with the hope that, once again, technology can help where human memory fails. Find out which options provide reliable assistance and which ones fall short.

Intel’s Smart Clip

Usually, child car deaths occur when an infant or toddler is left in the car for more than a few minutes. Often, a change in the family transportation schedule or a communication failure results in a memory lapse, and the child is forgotten in the car. The temperature within the vehicle rises to dangerous levels very quickly during the summer. In the winter, prolonged exposure to the cold also becomes a danger.

To combat the problem, Intel developed the Smart Clip, a small device that attaches to any car seat. It replaces the main clip on the car seat straps and rests over the baby’s chest. Inside the clip is a BlueTooth sensor. If you walk too far from the vehicle and the clip remains buckled, the sensor is triggered. The alert goes to your phone, where the Intel Smart Clip app provides additional information such as your baby’s temperature. Every 20 seconds, users receive alerts until they go back and unbuckle the baby from the car seat.

The clip’s sensor can also tell whether or not the car is moving, and it shows that information right under the temperature readout in the app. Once the caregiver unfastens the Intel Smart Clip, the sensor registers that the baby is safely out of the car seat and deactivates the alert.

First Years True Fit IAlert

TOMY International was an early proponent of technology as a life-saver in instances of hot-car death. In 2013, TOMY’s First Years car seats rolled onto the market. Each seat featured motion sensors, angle sensors, and temperature sensors for a complete readout of the child’s condition and safety. Should the seat’s temperature rise too dramatically, the unit sent an alarm to the caregiver’s phone. In addition, it let parents know if the baby was not buckled in while the car was moving, or if the seat was not properly installed in the vehicle. Although the seats worked well when alerting the primary contact, users complained that secondary contacts rarely received the necessary alerts─ and when they did receive them, they were significantly delayed. Currently the seats are unavailable as the company works to address the technical issues.

Evenflo Advanced Embrace

Another high-tech car seat with an emphasis on safety is the Evenflo Advanced SensorSafe Embrace. Walmart offers these seats, which include a hot-car alert system. Released in 2015, this model is in high demand among families with little ones. It features a special sensor with a tone that sounds loudly if the child is still buckled in when the keys are removed from the ignition. With a reasonable price and a wireless receiver that works with the car’s diagnostic system, the product is currently the only crash-tested car seat with this life-saving technology. With successes from Evenflo and Intel, other manufacturers may soon follow, integrating technology into car seats for infants and toddlers.



from We Hate Malware https://ift.tt/30tg7wY

Taking a Closer Look at Remote Workplace Fraud Vulnerabilities: How to Mitigate Escalating Threats

As a future of remote work comes into focus, IT and security professionals are becoming increasingly aware that employees could unknowingly leave a door open to fraud, cybercrime and more.

from Cyber Security News https://ift.tt/2YnMDOn

Kristin Myers Named EVP, Chief Information Officer & Dean for Information Technology at Mount Sinai Health System

Mount Sinai Health System has appointed Kristin Myers, MPH, as Executive Vice President, Chief Information Officer, and Dean for Information Technology (IT). Ms. Myers most recently served as Senior Vice President for Technology.

from Cyber Security News https://ift.tt/2YmCW2O

Cybersecurity Concerns with Online Voting for 2020 Presidential Election

A new report by researchers at the Massachusetts Institute of Technology (MIT) and University of Michigan discusses the cybersecurity vulnerabilities associated with OmniBallot, a we-based system for blank ballot delivery, ballot marking and (optionally) online voting. 

from Cyber Security News https://ift.tt/3fcgAYp

FBI: Increased Use of Mobile Banking Apps Could Lead to Exploitation

As the public increases its use of mobile banking apps, partially due to increased time at home due to COVID-19, the FBI anticipates cyber actors will exploit these platforms.

from Cyber Security News https://ift.tt/30tJBL0

TikTok to Boost Security Team

TikTok says it plans to hire 100 security, data and privacy protection experts in the U.S. by the end of 2020.



from Cyber Security News https://ift.tt/3cTmMmL

FCC Proposes $225 Million Fine for 1 Billion Robocalls

The Federal Communications Commission proposed a $225 million fine against Texas-based health insurance telemarketers for making approximately 1 billion illegally spoofed robocalls.



from Cyber Security News https://ift.tt/2XP7YB6

Digital Shadows Report: New DDoS Tool Advertised on the Dark Web

A new report by Digital Shadows Photon Research Team examines a newly launched DDoS protection filter mechanism dubbed EndGame advertised on the dark web community forum Dread, which required a combined effort from many parts of the dark web to create a solution for an ongoing problem that has been slowly killing off the cybercriminal scene one platform at a time.

from Cyber Security News https://ift.tt/2XRZ1Hw

75% Increase in Reports of Ransomware Attacks on Healthcare Entities

A new report from Corvus found there was a 75 percent increase in reports of ransomware attacks on healthcare entities from H1 2019 to H2 2019. 

from Cyber Security News https://ift.tt/3cNDFze

Singapore Introduces COVID-19 Contact Tracing App

Singapore is reportedly developing a wearable device that may be issued to every resident as a way to facilitate contact tracing during the COVID-19 pandemic. The move, however, has elicited concerns from the public about the lack of privacy associated with contact tracing devices. 

from Cyber Security News https://ift.tt/2XOYwxP

Increasing Cybersecurity Gaps and Vulnerabilities due to Remote Work During COVID-19

Fifty-six (56) percent of employees are using their personal computers as their company’s go remote in response to COVID-19 according to the Work-from-Home (WFH) Employee Cybersecurity Threat Index released by Morphisec.

from Cyber Security News https://ift.tt/2MLf9nB

Tuesday, 9 June 2020

David Fairman Named CSO for Asia-Pacific Region for Netskope

David Fairman has been named Chief Security Officer (CSO), APAC for Netskope.



from Cyber Security News https://ift.tt/30qaI9N

5 Minutes with Michael Bruemmer

Michael Bruemmer is Vice President of the Experian® Data Breach Resolution group and Consumer Protection at Experian. Why does believe security serve as a calming force during the COVID-19 pandemic?



from Cyber Security News https://ift.tt/2YiYn4P

Security Awareness Training – Keys to Delivering a Successful Program

Security awareness training is no longer a “nice-to-have” for organizations. End users have become a critical component of effective security postures. Employees must have a strong understanding of cybersecurity best practices and learn how to detect and defend against targeted attacks. This shift in priority is needed to address an ongoing trend in the larger threat landscape. Cybercriminals have moved away from complicated, time-consuming technical exploits to concentrate on end users, a large and frequently vulnerable attack surface. Small or large, nearly every attack now begins in the same way: by relentlessly targeting people through email, social networks, and/or cloud and mobile applications.

from Cyber Security News https://ift.tt/2UsVP2I

OSAC to Hold Annual Meeting Online this Year

The Overseas Security Advisory Council (OSAC) announced that its Annual Briefing will be held online this November, during the week of November 16.



from Cyber Security News https://ift.tt/3cM8YKJ

Kansas Introduces the COVID-19 Contact Tracing Privacy Act

A new Kansas emergency bill passed earlier this week includes the COVID-19 Contact Tracing Privacy Act, which aims to protect the privacy of persons whose information is collected through contact tracing and the confidentiality of contact data. 

from Cyber Security News https://ift.tt/2AQIJW8

Monday, 8 June 2020

Maritime Industry Sees 400% Increase in Attempted Cyberattacks Since February 2020

There has been a 400 percent increase in attempted hacks since February 2020 coinciding with a period when the maritime industry turned to greater use of technology and working from home due to the Coronavirus pandemic, according to Israeli cybersecurity specialist Naval Dome. 

from Cyber Security News https://ift.tt/3cJhxG7

White House Says Fewer Cybersecurity Incidents Affected Federal Networks in 2019

In a Federal Information Security Modernization Act of 2014 report filed with Congress last week, the White House says the number of cybersecurity incidents recorded at US federal agencies in 2019 went down by 8 percent.

from Cyber Security News https://ift.tt/30mExYL

Mittal Desai Named Chief Information Officer for the Federal Energy Regulatory Commission

Federal Energy Regulatory Commission (FERC) Chairman Neil Chatterjee announced the selection of Mittal Desai to serve as the Commission’s Chief Information Officer, effective June 7, 2020. Desai currently is a Senior Advisor and Risk Analyst in FERC’s Office of the Executive Director.

from Cyber Security News https://ift.tt/2XHgRfZ

Ryan Smith Named Vice President and Chief Information Officer at Intermountain Healthcare

Ryan Smith has been selected as Intermountain Healthcare’s new vice president and chief information officer (CIO) after an extensive nationwide search following the announcement of Marc Probst’s upcoming retirement.

from Cyber Security News https://ift.tt/3cIOrXi

Friday, 5 June 2020

Going Ergonomic with Your Tech

Most computer users have felt it─ that twinge in your wrists or elbows, or that cramp in your neck and shoulders. It’s the sign that your body has been in an uncomfortable position of strain for too long. Whether you spend hours typing at work or hours at home surfing and gaming, you need ergonomic technology to help your body handle the tasks that you need─ or want─ to accomplish.

Making the Curve

One tester claimed that the Microsoft Sculpt Ergonomic keyboard was his favorite for work, while others swear by the Logitech Wireless Keyboard K350, with its convenient cordless design and 3 years of battery life. In addition to its naturally curved shape, the Logitech K350 boasts 2.4 GHz wireless connectivity. For individuals who type all day at the office, the Microsoft Natural Ergonomic Keyboard 4000 provides a “gull wing” design with a 14-degree spread at the center. The keyboard’s wavy surface and key arrangement allow wrists and hands to stay in a natural, relaxed position. The wrist rest provides additional support.

Splitting the Sections

Another keyboard takes ergonomic comfort even further with a dramatic split design. The Kinesis Freestyle Solo Keyboard, created for Mac computers, comes in two separate sections with a Pivot Tether in the middle, holding them together. You can go one step further and take off the tether if you need different positioning.

Tossing Out Tradition

Is your hand cramping up from using your mouse? Ditch the traditional mouse design altogether and try the Roller Mouse Free from Contour Design. Instead of the typical oval, curvaceous ergonomic mouse, this device takes on the shape of a long, slim bar outfitted with buttons. Instead of gripping or flexing, the Roller Mouse Free interprets rolling and sliding motions from your fingers and navigates the screen accordingly.

Shaking It Up

Another mouse option takes the standard mouse design and turns it on its side. The VerticalMouse 3 Wireless from Evoluent adapts the “handshake” orientation and works well for users with large hands. Its five buttons are programmable, and its battery lasts for up to three months.

Feeling Left Out

Since left-handed users are in the minority, they are often neglected when manufacturers design ergonomic mice; but the Humanscale Switch Mouse remedies that problem. Its triangular base permits a natural, comfortable hold for either left-handed or right-handed users. Instead of a scroll wheel that could put more stress on the wrist and fingers, this mouse incorporates a navigation dish, a disc-like device for easier scrolling. The rounded palm rest and the extender feature make this the perfect solution for users of all types.

Seeing Eye to Eye

One way to prevent aches in your shoulders and neck is to keep your monitor at eye level. If your desk has no higher second level on which to set your monitor, consider a display arm so that you can mount your monitor and adjust its height and angle to best suit your height. With a minimal investment and a few key changes to your work space, you can use your computer comfortably again.



from We Hate Malware https://ift.tt/2A6djen

Data Breach Report in Capitol One Litigation Not Privileged

On May 26, the District Court found in the In Re: Capital One Consumer Data Security Breach Litigation that a report prepared by Mandiant concerning the Capitol One data breach (Breach Report) was not protected by the work product privilege and must be turned over to Plaintiffs. What are some lessens to be learned from this data breach litigation response?



from Cyber Security News https://ift.tt/3eV0wdo

Elizabeth Lindsay-Wood Joins Moffitt Cancer Center as Chief Information Officer

Elizabeth “Beth” Lindsay-Wood, MBA, CHCIO, has joined Moffitt Cancer Center as vice president and chief information officer (CIO). She will be responsible for leading Moffitt’s information technology teams and preparing the organization to accelerate its digital transformation.

from Cyber Security News https://ift.tt/2A56sls

Nearly 80% of Companies Experienced a Cloud Data Breach in Past 18 Months

Nearly 80% of the companies surveyed had experienced at least one cloud data breach in the past 18 months, and nearly half (43%) reported 10 or more breaches, according to a new study from Ermetic and intelligence firm IDC.

from Cyber Security News https://ift.tt/3gTmhfL

Google Researchers Warn Iranian and Chinese Hackers Targeting Presidential Candidates

Google Threat Analysis Group researchers warn that Chinese and Iranian hackers are targeting campaign staffers for both President Donald Trump and Presidential candidate Joe Biden with phishing emails. 

from Cyber Security News https://ift.tt/3cDM8EZ

CISA Launches CISA Central to Keep Public and Private Partners Informed on Relevant Physical and Cyber Threats

The Cybersecurity and Infrastructure Security Agency (CISA) has launched CISA Central, a hub for staying on top of threats and emerging risks to the nation’s critical infrastructure, whether they’re of cyber, communications or physical origin. 

from Cyber Security News https://ift.tt/30bXZrm

Thursday, 4 June 2020

NIST Seeks Participants for Digital Forensics Exercise

The National Institute of Standards and Technology (NIST) is looking for public and private sector experts to take part in an exercise that will evaluate the digital forensics community’s ability to conduct mobile- and computer-based investigations.



from Cyber Security News https://ift.tt/3dBGHI3

MetaCompliance Releases Playbook for Changing Cybersecurity Culture

Global Cybersecurity specialist MetaCompliance announced the publication of a new book, titled Cyber Security Awareness For Dummies.



from Cyber Security News https://ift.tt/2AFP06W

Recruiting the Future of Security: Finding Future CISOs

It is no secret that finding and recruiting strong Chief Information Security Officer (CISO) candidates is far from easy. Many CISOs typically stay in a role for a few years and subsequently are not able to dedicate adequate time to the development of junior leaders who could become the next wave of security leaders. Most organizations are forced to look externally for the experience they require. However, looking for outside hires also contributes to the shortage of potential internal leaders, as skilled professionals are often overlooked. For the security industry to thrive, this needs to change, and it starts with grooming the next generation of leaders.



from Cyber Security News https://ift.tt/307kMEv

Meeting 5G’s Extreme IoT Security Demands with Network-Based Solutions

According to a report from Cisco, 5G’s faster broadband (10 to 20 times faster than 4G) will enable 12 billion mobile-ready devices and IoT connections by 2022 compared to 9 billion in 2017. While this is great news for the rising number of smart device users globally, the increased connectivity can be taxing for IoT security. The combination of higher bandwidth and lower latency is a double-edged sword. While it enables new, exciting use cases like Vehicle-to-Vehicle and telemedicine, it is critical to not lose sight of the fact that it expands the scope of security threats, such as ransomware and botnets, among others.



from Cyber Security News https://ift.tt/2BzVWTF

Most Active Ransomware Strains Targeting Enterprise Networks

Although the ransomware plague took a nosedive in terms of the victim count years ago, it’s still alive and kicking. It used to home in on any computers indiscriminately, but at some point, the malicious actors realized they could squeeze a lot more profit out of the enterprise than out of individual users. This shift made businesses the most coveted target for ransomware operators.

from Cyber Security News https://ift.tt/308y7fL

Beware of Hurricane-Related Scams, Warns CISA

The Cybersecurity and Infrastructure Security Agency (CISA) warns users to remain on alert for malicious cyber activity targeting potential disaster victims and charitable donors following a hurricane.

from Cyber Security News https://ift.tt/3cC0cyB

US Maritime Critical Infrastructure Stakeholders Form Nonprofit to Promote Cybersecurity Information Sharing

The Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC) was formed as a nonprofit by a group of U.S.-based maritime critical infrastructure stakeholders to promote cybersecurity information sharing throughout the community.

from Cyber Security News https://ift.tt/3ePUcUw

Two Army Installations Selected for 5G Testing and Experimentation

The U.S. Army's National Training Center at Fort Irwin, California and Fort Hood, Texas were selected by DoD for their second round of 5G communications testing and experimentation.

from Cyber Security News https://ift.tt/2U8WcQ0

Nand Mulchandani Assumes Role as Acting Director of the Joint Artificial Intelligence Center

Nand Mulchandani has been named Acting Director of the U.S. Department of Defense Joint Artificial Intelligence Center.

from Cyber Security News https://ift.tt/30jU3VF

How Cybersecurity Habits at Home Threaten Corporate Network Security

A new survey from CyberArk found that work-from-home habits– including password re-use and letting family members use corporate devices – are putting critical business systems and sensitive data at risk.

from Cyber Security News https://ift.tt/2Xxyi2M

Legacy Technology and Lack of Skills Hindering Digital Transformation and IT Modernization

According to the latest industry data released today from Veeam® Software, almost half of global organizations are being hindered in their digital transformation journeys due to unreliable, legacy technologies with 44% citing lack of IT skills or expertise as another barrier to success.

from Cyber Security News https://ift.tt/372sfGh

Wednesday, 3 June 2020

The Need for Cybersecurity and Physical Security Convergence

Security leaders have been discussing the convergence of cybersecurity and physical security for years. But what does it mean?



from Cyber Security News https://ift.tt/2BpHKwk

Are Executives Ready to Respond to Today’s Flight to Remote Work?

With the flight to remote work happening so suddenly, senior decision makers at small and medium sized businesses simply haven’t come to reality with their cybersecurity capabilities, and in turn, vulnerabilities.



from Cyber Security News https://ift.tt/3gOpKfm

Adrian Butler Joins Casey's General Stores as Chief Information Officer

Restaurant and retail leader Adrian Butler has joined Casey's General Stores, Inc. as Chief Information Officer.

from Cyber Security News https://ift.tt/3gM0fvc

New Report on Doxxing Exposes Cybersecurity Threat Actors Trends

A new threat intelligence report on doxxing, researched by cybersecurity experts at Kivu, reveals that the majority of attacks occur in the U.S., with companies in the consumer sector being more likely to fall victim to such an attack.

from Cyber Security News https://ift.tt/3cs54X1

Tuesday, 2 June 2020

BRG Adds Former DHS Special Agent to Cyber Practice

Berkeley Research Group (BRG) announced that Jared Der-Yeghiayan has joined its Cyber Operations and Incident Response practice as a director in Washington, D.C.



from Cyber Security News https://ift.tt/2AtVGoF

New York City Cybersecurity Bootcamp Offers Free Introductory Training Courses

Fullstack Cyber Bootcamp, New York City's cybersecurity bootcamp partner, announced an initiative to offer free introductory courses to people nationwide, providing an opportunity for individuals to explore the cybersecurity industry as a potential career path.



from Cyber Security News https://ift.tt/3gPDfeU

Security and IT Veteran Myrna Soto Joins Forcepoint as Chief Strategy and Trust Officer

Myrna Soto has joined Forcepoint as Chief Strategy and Trust Officer. In this newly-created role, Soto will serve as a strategic business and technology driver of the company’s enterprise vision, strategy and programs to protect people, critical data and IP both within the company and for thousands of Forcepoint customers around the globe.

from Cyber Security News https://ift.tt/2MjGUUe

Identity and Access Management Trends for IT and Security Professionals

How are IT and security professionals across a variety of industries including finance, IT and media managing identity and access management (IAM) programs?

from Cyber Security News https://ift.tt/3eJVnoI

More than 30% of Employee Accounts Worldwide Compromised Since Starting Remote Work

OneLogin released added findings from a survey of 5,000 remote workers showing just how freely employees use corporate devices for non-work related activity, regardless of cybersecurity hazards.

from Cyber Security News https://ift.tt/2zL8rLJ

Capital One to Hand Over Mandiant's Forensic Data Breach Report

A judge in the U.S. District Court of the Eastern District of Virginia has ruled that Capital One must allow plaintiffs to review a cybersecurity firm’s forensic report related to the bank’s 2019 data breach. Capital One sought to keep the report private on the grounds that it is a protected legal document.

from Cyber Security News https://ift.tt/3dsdsHz

Joomla Discloses Data Breach Affecting 2,700 Users

Joomla, a free and open-source content management system for publishing web content, developed by Open Source Matters, Inc., has disclosed a data breach which affects 2,700 individuals. 

from Cyber Security News https://ift.tt/2zVs57x

Lookout Report: 37% Increase in Worldwide in Enterprise Mobile Phishing Attacks

Lookout, Inc. released its 2020 Mobile Phishing Spotlight Report that reveals there was a 37 percent increase worldwide in enterprise mobile phishing encounter rate between the fourth quarter of 2019 and the first quarter of 2020.



from Cyber Security News https://ift.tt/2z1ped2

Monday, 1 June 2020

Diversity In The Tech Workplace

Recently, engineer Isis Anchalee faced sexist comments when she posed for her company’s recruitment ad. In response, she started the “I look like an engineer” campaign, which quickly gained momentum among intelligent women who feel the sting of gender-shaming in their chosen careers. The campaign highlighted the continuing problems of sexism and racism in the science and technology fields. Compared to the number of Caucasian men in tech jobs, the percentages of women and minorities are tiny. Diversity is a growing issue for many companies, as they face criticism for their lack of color-blindness and gender-neutrality during the hiring process.

Breaking the Bias

Apple is leading the way in openly striving for diversity among its employees. In 2015, Apple’s CEO Tim Cook, released the diversity breakdown for the company. During the previous year, Apple hired over 2,200 black American employees, a 50% jump from the number of black hires the year before that. Apple also hired 11,000 women, a 65% increase over its female hires during the previous year.

It’s a massive step forward for the big tech company, but Cook acknowledges that even more change must happen. “We know there is a lot more work to be done,” he said. “Some people will read this page and see our progress. Others will recognize how much farther we have to go. We see both.” He emphasized Apple’s celebration of difference, of uniqueness, and of teamwork.

The Same, But Different

The fact remains that many tech companies have even further to go than Apple when it comes to diversity. It’s not that women aren’t interested in the fields of science, technology, engineering, and mechanics— or STEM, as those fields are commonly abbreviated. From their early years, girls are often prodded in other directions, even by well-intentioned teachers and parents. The women that do go on to complete degrees in STEM fields have a tough time getting hired; and when they are hired, they face bias in the workplace.

Emilio J. Castilla and Stephen Benard conducted a revealing study. They found that companies who tend toward the meritocracy mindset often give smaller bonuses to women and larger ones to men, even in cases where the women and men have equal performance reviews.

Minorities face similar issues. The Computing Research Association reported that its 2010 undergraduate class was composed of just 5.6% Hispanic students and 4.2% black students. Only 13.4% of all the students were women. These low numbers are worrisome for social experts, women, and minority groups.

Goodbye, Research— Hello, Action!

Enough with the studies, already. Everyone knows that a problem exists— so what can companies do to make a significant change? Like Apple, they can make a conscious effort to hire for diversity. If two candidates for a position have equal qualifications, the hiring manager needs to make sure that he does not choose based on a subconscious bias towards the white male.

Since the problems with sexism and racism begin early, tech companies should consider creating incentive and training programs that reach children in elementary school and middle school. By donating resources, time, and expertise, these companies offer girls and minority students the means and opportunity to pursue a STEM career. Who knows? Maybe some of those brilliant boys and girls will be the next Steve Jobs or Mark Zuckerberg— just with a different skin color or gender.



from We Hate Malware https://ift.tt/2U2jyXg

Indian e-Payments App Exposes More Than 7 Million Users in Massive Data Breach

Led by Noam Rotem and Ran Locar, vpnMentor’s research team discovered a massive amount of incredibly sensitive financial data connected to India’s mobile payment app Bharat Interface for Money (BHIM) that was exposed to the public.

from Cyber Security News https://ift.tt/2XOiJme

150,000s of e-Learning Students Exposed in 8Belts Data Breach

vpnMentor's research team, led by Noam Rotem and Ran Locar, discovered a data breach belonging to the Spanish e-learning platform 8Belts, affecting 150,000s of people across the globe. 

from Cyber Security News https://ift.tt/2XmQWdt

Australian Sports Fan Portal Leaks 70 Million Records

Bigfooty, an active Australian sports fan site with over 100,000 members, has leaked 70 million records of private data.

from Cyber Security News https://ift.tt/3dqZkOA

CISA Releases New Cybersecurity Essentials Toolkit

The Cybersecurity and Infrastructure Security Agency (CISA) released the first in a series of six Cyber Essentials Toolkits - a starting point for small businesses and government agencies to understand and address cybersecurity risk as they do other risks.



from Cyber Security News https://ift.tt/2ZVGETf