Monday, 31 August 2020

5 minutes with Daniel Wood

Why do organizations find it challenging to respond to social engineering incidents and how they can better defend against them? We talk to Daniel Wood, CISSP, GPEN, Associate Vice President of Consulting at Bishop Fox, to find out. 



from Cyber Security News https://ift.tt/3ly3VTz

Tesla and FBI thwart $1 million Russian Ransomware hack

A Russian national was charged with one count of conspiracy for his role in a conspiracy to recruit an employee of a company to introduce malicious software into Tesla's computer network, extract data from the network, and extort ransom money from the company. 



from Cyber Security News https://ift.tt/2QG4tJa

DNC warns campaign staffers about dating app security concerns

The Democratic National Committee (DNC) sent an alert to campaign staffers warning them to be vigilant against attempts by opposition groups to gain information on campaigns through dating apps. 

from Cyber Security News https://ift.tt/3jwhgu0

FIU launches bachelor’s degree in cybersecurity

Starting in the fall of 2020, FIU is offering a bachelor’s degree in cybersecurity that will prepare graduates for careers in a high-demand field.

from Cyber Security News https://ift.tt/3joA91M

Report shows $11.4M lost globally every minute to cybercrime

Cybercrime costs organizations $24.7 every minute, according to new research from RiskIQ.

from Cyber Security News https://ift.tt/3js4fl5

Sunday, 30 August 2020

Rise of ransomware: Why OT is a prime target for cybercriminals

While the burgeoning world of IoT has transformed the ways in which we live and work, the world of IoT has also caught the attention of cybercriminals. As IoT devices become increasingly more advanced, hackers have simultaneously become more sophisticated in their attacks, often targeting pre-existing security loopholes to gain access to company systems.

from Cyber Security News https://ift.tt/32IroJl

Strategies for endpoint security

In part 1 of this series, we covered why Distributed Internet of Things devices are attractive and vulnerable targets for cyber criminals and hackers. Now we turn our attention to strategies for protecting these devices, which in turn, helps to protect your entire network.

from Cyber Security News https://ift.tt/3jv3zvq

Endpoint management and security in a work-from-home world

Network administrators have long been stretched thin in their attempts to maintain global endpoint security settings, configurations and patching. Now that most, if not all, of their organization’s employees are connecting remotely, the job has become even more difficult.

from Cyber Security News https://ift.tt/31EsUNg

Friday, 28 August 2020

Facebook criticizes Apple's new iOS privacy policies

In June, Apple announced iOS 14 updates that, among other changes, would require apps to ask users for permission to collect and share data with developers. As a result, Facebook has just announced it would no longer collect the identifier for advertisers (IDFA) on their own apps on iPhones.

from Cyber Security News https://ift.tt/3lnwvqZ

Number of vulnerabilities disclosed in the first half of 2020 decreased by 8.2%

Risk Based Security's Q1 2020 Vulnerability report, for the first time in years, saw a decline in the quantity of vulnerabilities being reported. However, the latest trends indicate we may be back on track to see the same amount of vulnerabilities, or even more, than last year. Why might this be the case? One possible reason: the Vulnerability Fujiwhara Effect.

from Cyber Security News https://ift.tt/2Qy4vCG

200,000 patient records exposed by hardcoded credentials and improper access controls

A developer error caused the leak of 150,000 to 200,000 patient health records stored in productivity apps from Microsoft and Google that were recently found on GitHub.

from Cyber Security News https://ift.tt/2D7u2zz

Thursday, 27 August 2020

5 minutes with Richard Bird

We talk to Richard Bird, Ping Identity's Chief Customer Information Officer (CCIO), about how prepared the U.S. Government is for the 2020 Presidential Election.

from Cyber Security News https://ift.tt/2ExXb7H

The perfect storm: Finding new ways to navigate and mitigate the cybersecurity pandemic

Remote work is testing organizations, putting their IT departments under great stress. Like employees, many companies were unprepared for the many challenges of this seismic shift, one of which has been the dramatic changes in network and enterprise boundaries. Suddenly, securing endpoints became — and continues to be — a top concern.

from Cyber Security News https://ift.tt/2QwXZMp

How to prioritize security and avoid the top 10 IoT stress factors

The Internet of Things (IoT) is transforming our homes, businesses and public spaces – mostly for the better – but without proper precautions IoT devices can be an attractive target for malicious actors and cyberattacks. Security threats involving IoT devices often stem from the fact that many IoT devices usually have single-purpose designs and may lack broader capabilities to defend themselves in a hostile environment. For example, a door bell, a toaster or a washing machine frequently do not contain as much storage, memory and processing capability as a typical laptop computer.

from Cyber Security News https://ift.tt/3b1ONci

Center for Internet Security (CIS) releases new community defense model for cybersecurity

The Center for Internet Security, Inc. (CIS®) released its Community Defense Model (CDM). The model shows that the CIS Controls® (Controls) – a prioritized and prescriptive set of safeguards that mitigate the most common cyberattacks against systems and networks – mitigate approximately 83 percent of all attack techniques found in the MITRE ATT&CK Framework.

from Cyber Security News https://ift.tt/32zXUNw

Miami Dade College launches Cybersecurity Center of the Americas

Miami Dade College has launched its new, state-of-the-art Cybersecurity Center of the Americas, a facility designed to mimic what a Security Operations Center (SOC) looks and feels like. 

from Cyber Security News https://ift.tt/31vu1Ph

Digital Shadows report: Which cybercriminal forum is on top?

New Digital Shadows research provides a breakdown of the traffic data behind the top cybercriminal forums and how they square up against each other. The research was inspired by a June 2020 post on the English-language cybercriminal carding forum Altenen announcing a “big victory” for the site in terms of its website traffic rank statistics. This piqued the interest of the Digital Shadows research team who compared how the statistics aligned with their pre-existing perceptions of these sites, whether they show any trends they were previously unaware of, and if there was anything that would indicate deceptive tactics behind these numbers.  

from Cyber Security News https://ift.tt/2D9ata8

Wednesday, 26 August 2020

CISA, FBI, Treasury Department & CYBERCOM warn of North Korean malware

 The Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury (Treasury), the Federal Bureau of Investigation (FBI) and U.S. Cyber Command (USCYBERCOM) are issuing a joint technical alert about an ongoing automated teller machine (ATM) cash-out scheme by North Korean government cyber actors – referred to by the U.S. government as “FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks.”  

from Cyber Security News https://ift.tt/2YFMh6y

What IT leaders can learn from the internet’s surprising resilience during COVID-19

The unfolding COVID-19 crisis has been the most significant test of the world’s internet infrastructure to date. With employers and schools moving to remote environments, the expectation was that the expanded use of Software-as-a-Service (SaaS) tools like video conferencing would lead to crippling levels of web traffic. On top of that, experts anticipated the increase in internet use would prompt a corresponding rise in network attacks from cybercriminals. Many in the industry were concerned that the internet would not be able to sustain these unseen levels of duress.

from Cyber Security News https://ift.tt/2EICKo7

3 simple steps to protect data from human error

While cyber threats continue to be a massive drain on business productivity, there is another, less obvious vulnerability: unintentional employee error. Indeed, a majority of businesses say that simple human error is their leading cause of data loss.

from Cyber Security News https://ift.tt/2YA8WkD

5 Minutes with Mohit Tiwari

Here, we talk to Mohit Tiwari, CEO and co-founder of Symmetry Systems, about the current threat landscape, the role of CISOs and the unique challenges COVID-19 and work-from-home (WFH) pose to CISOs and security teams.

from Cyber Security News https://ift.tt/34B2OMV

Handling customer data? Plan for security first

Regardless of industry, no company can escape the widespread reach and impact of data.  Whether a company is collecting account information from customers or aggregating platform usage data, handling large amounts of data has become the norm. While this creates boundless new opportunities for businesses in analytics and real-time decisioning, it also introduces new risks that organizations need to consider and prevent where possible.

from Cyber Security News https://ift.tt/3jgimd3

New research finds that the IT security skills gap is getting bigger

The shortage of skilled information security practitioners continues to grow around the globe. Based on 200 IT executives and contributors who primarily serve in information or IT security roles, this new research found that in the United States, for organizations with at least 500 employees, the average number of open positions enterprises are trying to fill is 1,324. For the largest percentage of respondents in this survey, that number increased between 1 percent and 25 percent over the last year, although that increase is higher for large enterprises.

from Cyber Security News https://ift.tt/3gtKg3x

Tuesday, 25 August 2020

Study finds Security Analysts among highest median salary for workers with bachelor’s degrees

In a new study published by AdvisorSmith, it found that among the top 25 highest paying jobs for bachelor degree holders, number 18 on the list was Security Analysts. The study also found that information security analysts earned an annual median salary of $99,730.



from Cyber Security News https://ift.tt/3gsTddm

CISA releases 5G strategy for secure and resilient critical infrastructure

The Cybersecurity and Infrastructure Security Agency (CISA) released its strategy to ensure the security and resilience of fifth generation (5G) technology in the U.S.

from Cyber Security News https://ift.tt/3jiIKmR

Brian Harrell, CISA infrastructure security official, steps down

Brian Harrell, appointed by the President of the United States in December 2018 to serve as the Department of Homeland Security’s Assistant Secretary for Infrastructure Protection, resigned his post last week and is headed to the private sector. 

from Cyber Security News https://ift.tt/2YOKxs3

Monday, 24 August 2020

235 million TikTok, Instragram and YouTube accounts exposed in database breach

A database breach has exposed profile data for nearly 235 million users of TikTok, Instagram, and YouTube.

from Cyber Security News https://ift.tt/2FIWqZB

Study reveals shift in attack methods with an exponential increase of botnet and exploit activity

A new study by Nuspire outlines new cybercriminal activity and tactics, techniques and procedures (TTPs).



from Cyber Security News https://ift.tt/32jXGdn

Sunday, 23 August 2020

So, what is the safest password policy? It’s complicated

Let’s face it, passwords are a pain. As we’ve been pushed towards using longer and ever more complex passwords, and told to update them with increasing frequency, password management has become something of a headache. We’ve gone from simple, easy to remember passwords to 12- or 16-character passwords that must contain a mixture of upper and lowercase letters, numbers and symbols.

from Cyber Security News https://ift.tt/31nb15v

IoT: The Internet of Threats and how users can defend themselves

According to IDC, by 2025 there will be 41.6 billion Internet of Things (IoT) devices, generating a massive 79 zettabytes (ZB) of data. To put that into perspective, in 2006, IDC estimated that the total amount of electronic data created and stored was a mere 0.18 ZB. This growing amount of data represents a vast and exponentially increasing attack surface, which poses a huge opportunity for cybercriminals and a seemingly insurmountable task for those responsible for protecting and securing it. This task is only made more difficult by the lack of regulation and security measures being built into IoT devices at present. As IoT looks to become a foundational aspect of our everyday lives, it’s vital we, as consumers, understand the threats posed to our devices and the data they store.

from Cyber Security News https://ift.tt/3ljW9wP

Friday, 21 August 2020

GAO: DHS and selected agencies need to address cybersecurity shortcomings

The US Government Accountability Office (GAO) reviewed how 3 agencies—the Federal Aviation Administration, Indian Health Service, and the Small Business Administration—used cybersecurity tools that identify the hardware and software on their networks and check for vulnerabilities and insecure configurations.

from Cyber Security News https://ift.tt/2QfRLAC

IBM settles lawsuit over data privacy of Weather Channel app

IBM, the owner of the Weather Channel mobile app, has reached a settlement with the Los Angeles city attorney’s office after a 2019 lawsuit alleged that the app was deceiving its users in how it was using their geolocation data.

from Cyber Security News https://ift.tt/3aOvm6W

Election Infrastructure Government Coordinating Council (GCC) holds summer meeting virtually

The Election Infrastructure Government Coordinating Council (GCC) held its summer meeting virtually to discuss Election Day preparations and other areas of coordination between the federal government and state and local election officials.

from Cyber Security News https://ift.tt/3l5DsfU

CyVision Technologies appoints Paul Goldenberg and John "Jack" Donohue to board of advisors

CyVision Technologies, Inc. announced that Paul Goldenberg, chairman and president of Cardinal Point Strategies, and  John “Jack” Donohue, Cardinal Point’s senior advisor–national security, have been appointed to serve on its board of advisors. In their advisory role these two renown cyber and homeland security experts will offer strategic and tactical guidance in understanding and navigating critical cybersecurity issues facing the public sector organizations, institutions and private sector businesses.

from Cyber Security News https://ift.tt/34pgGtB

Thursday, 20 August 2020

Cybersecurity issues for returning to the office

As many employees transfer back to a more traditional business setting from remote work environments, adjustments to cybersecurity protocols are going to be necessary. Organizations will need to evaluate any temporary provisions that were put into place during the COVID-19 pandemic, including any shortcuts that were taken and processes that were circumvented, and whether such protocols should be reversed or enhanced.

from Cyber Security News https://ift.tt/3aQnEJl

5 Minutes with Saad Gul on LifeSpan's data breach

We speak to Saad Gul, Co-Chair of the Poyner Spruill, LLP, privacy and cybersecurity team, and learn about the Lifespan HHS investigation, what it means for data security professionals and why the HSS ruling should be a warning to all companies with HIPPA information. 



from Cyber Security News https://ift.tt/3l6Fblp

Rewards for Justice offers $10 million for information on foreign interference in U.S. elections

The U.S. Department of State’s Rewards for Justice (RFJ) program, which is administered by the Diplomatic Security Service, is offering a reward of up to $10 million for information leading to the identification or location of any person who works with or for a foreign government for the purpose of interfering with U.S. elections through certain illegal cyber activities.



from Cyber Security News https://ift.tt/3iYq3EG

Department of Energy announces $37 million for AI and ML at DOE scientific user facilities

The U.S. Department of Energy (DOE) announced $37 million in funding for research and development in artificial intelligence and machine learning methods to handle data and operations at DOE scientific user facilities. 

from Cyber Security News https://ift.tt/3hip7dR

Google to start warning users about insecure forms

Beginning in M86, Chrome will warn users when they try to complete forms on secure (HTTPS) pages that are submitted insecurely. These “mixed forms” (forms on HTTPS sites that do not submit on HTTPS) are a risk to users’ security and privacy. Information submitted on these forms can be visible to eavesdroppers, allowing malicious parties to read or change sensitive form data, says Google. 

from Cyber Security News https://ift.tt/34lGpDd

Large-scale scam targets Santander Bank ATMs

The FBI and local police have made tens of arrests across the tri-state area this week as part of a crackdown against multiple criminal gangs who exploited a glitch in the software of Santander ATMs to cash-out more money than was stored on cards, according to ZDNet.

from Cyber Security News https://ift.tt/3j1hzwK

Wednesday, 19 August 2020

Digital Risk Protection Services – Understanding their value and how to select the right solution

Attackers are looking beyond network systems and devices to target organizations via public-facing platforms and SaaS resources. An effective DRP service will identify threats across an organization’s digital footprint, analyze the credibility of these threats and remediate malicious activity on third-party platforms to minimize system and reputational damage.

from Cyber Security News https://ift.tt/2Yjs5Hx

Glen Distefano named CISO at Sunz Insurance

Sunz Insurance has promoted Glen Distefano to chief information security officer.

from Cyber Security News https://ift.tt/3aH0qoV

NIST unveils Zero Trust Architecture

NIST unveiled the final version of its Zero Trust Architecture publication, which gives private sector organizations a road map for deploying the cybersecurity concept across the organization.



from Cyber Security News https://ift.tt/3aGlZWz

CISA releases updated guidance on essential critical infrastructure workers

The Cybersecurity and Infrastructure Security Agency (CISA) released an update to its Essential Critical Infrastructure Workers Guidance. Version 4.0 provides guidance on how jurisdictions and critical infrastructure owners can use the list to assist in prioritizing the ability of essential workers to work safely while supporting ongoing infrastructure operations across the nation.    

from Cyber Security News https://ift.tt/34d93Gx

Acting Secretary Chad Wolf announces new Homeland Security Advisory Council members

Acting Secretary of Homeland Security, Chad F. Wolf, introduced three new members to the Homeland Security Advisory Council (HSAC): John Clark, Dr. Sharon Cooper, and Daniel Kaniewski. 

from Cyber Security News https://ift.tt/31bPVqo

Tuesday, 18 August 2020

Supply chain chaos is ramping up cyber risk

Until March, there was a consistent narrative about supply chains and technology. Digitization had, gradually, come some way in the world of logistics. Manufacturers, shipping companies, and retailers — and the many other firms with solutions that represent the connective tissue between them — had been steadily integrating hardware and software technologies that leverage the internet (both “of things” and not). 



from Cyber Security News https://ift.tt/3aANT6m

Eliminating vulnerabilities early in the SDLC for Société Française du Radiotelephone

Altice Europe, a leading player in the convergence between telecom and media in France, services 23 million customers through its SFR division—Société française du radiotelephone—providing voice, video, data, internet telecommunications and professional services to consumers and businesses. The business-to-consumer (B2C) IT division of SFR deploys dozens of major projects each year, including web, front-end, and office applications. The B2C IT Division wanted to increase its cybersecurity strategy and to complete its tools with a dynamic scanner capable of dealing with security in a dynamic mode, meaning within the framework of code execution and dialogue between several applications or between a front- or back-end, in order to ensure code security at the early stage of development.

from Cyber Security News https://ift.tt/322OPMZ

Alan Cunningham named Nevada's Chief Information Officer

Nevada Governor Steve Sisolak announced the appointment of Alan Cunningham as the State Chief Information Officer.



from Cyber Security News https://ift.tt/2YekZnT

Carnival Corporation hit by ransomware

Cruise line operator Carnival Corporation has disclosed that one of their brands suffered a ransomware attack over the past weekend.

from Cyber Security News https://ift.tt/3azr5E8

Thousands of Canadian Government accounts hacked

Thousands of user accounts for online government services in Canada were recently hacked during cyberattacks, Canadian authorities have announced.

from Cyber Security News https://ift.tt/3kSQ1uZ

Monday, 17 August 2020

CCPA update: Analyzing the changes to the final CCPA Regulations

On Friday, August 14, 2020, the California Office of Administrative Law (OAL) approved the California Office of the Attorney General’s (OAG) final CCPA regulations and filed them with the California Secretary of State (SOS). The regulations were immediately effective. Notably, the final text of the regulations submitted to the SOS was modified from the one filed with the OAL. The OAG published an Addendum to the Final Statement of Reasons setting forth the changes. Many of the changes are stylistic and grammatical. However, some of the changes are substantive and will impact compliance efforts. The most notable changes are discussed below.



from Cyber Security News https://ift.tt/3h6Tdkh

Prepare to defend: Why combating phishing attacks requires a proactive approach

Whether you are a small enterprise, a large corporation, or something in between, phishing is one of the most damaging and vicious threats that you have to prepare for. It is so serious that security analysts predict it will be their topmost concern. As per Verizon 2019 DBIR, phishing has emerged as the leading cause of data breaches across companies, and there is a worrying rise in the number of phishing attacks. This is all the more reason for companies to step up their security to identify how to prevent phishing.



from Cyber Security News https://ift.tt/2Y7CKov

Private PKI: Deployment, automation and management

With a Private CA (or “Private PKI”) solution, you can brand the certificates for your servers, devices, and users. Since the purpose of this CA is to serve your organization only, it will provide a tighter control when its Public Key Infrastructure (PKI) is used for internal user authentication. For this reason, Private PKI is immensely popular for deployment in enterprise IT, as well as cloud-native DevOps and Internet of Things (IoT) environments.

from Cyber Security News https://ift.tt/3iMSUf9

CISA hosts Cyber Storm 2020 with government, industry and international partners

The Cybersecurity and Infrastructure Security Agency (CISA) was joined by government, industry and international partners for Cyber Storm 2020, a national cyber exercise designed to simulate response to a cyber crisis impacting the nation’s critical infrastructure.

from Cyber Security News https://ift.tt/2PZ1VW9

CACI names Todd Probert President of National Security and Innovative Solutions

CACI International Inc has named Todd Probert President of CACI’s National Security and Innovative Solutions (NSIS) sector, responsible for advancing the company’s mission expertise and technology that supports the nation’s defense, intelligence, and federal civilian government` customers’ missions.



from Cyber Security News https://ift.tt/3kRFGiV

Purdue University Global earns National Center of Academic Excellence in Cyber Defense Education designation

Purdue University Global has been designated as a National Center of Academic Excellence in Cyber Defense Education through academic year 2025 for its Bachelor of Science degree in cybersecurity.



from Cyber Security News https://ift.tt/2Fsp0OM

US further restricts Huawei access to US technology

The Trump administration has enacted several measures to protect U.S. national security, citizens’ privacy, and the integrity of  5G infrastructure from "Beijing’s malign influence," announced US Secretary of State Michael R. Pompeo. 

from Cyber Security News https://ift.tt/3iPFdMA

Data breach reports down 52% in the first half of 2020; Number of records exposed increase to 27 billion

Risk Based Security released their 2020 Mid Year Data Breach QuickView Report, revealing that although the number of publicly reported data breaches stands at its lowest in five years, the number of records exposed is more than four times higher than any previously reported time period.

from Cyber Security News https://ift.tt/3avASeg

Sunday, 16 August 2020

Proofpoint appoints Andrew Rose as Resident CISO for EMEA region

Proofpoint, a cybersecurity and compliance company, has appointed Andrew Rose as its Resident CISO for the EMEA region.



from Cyber Security News https://ift.tt/2Y7ZHs2

Friday, 14 August 2020

NSA and FBI expose Russian previously undisclosed malware “Drovorub”

The National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) released a new Cybersecurity Advisory about previously undisclosed Russian malware.

from Cyber Security News https://ift.tt/3kIQyQf

Mekotio banking trojan fakes security update, steals bitcoins, exfiltrates Google credentials

ESET researchers explored Mekotio, a banking trojan targeting Spanish- and Portuguese-speaking countries: mainly Brazil, Chile, Mexico, Spain, Peru and Portugal. Mekotio boasts several typical backdoor activities, including taking screenshots, restarting affected machines, restricting access to legitimate banking websites, and, in some variants, even stealing bitcoins and exfiltrating credentials stored by the Google Chrome browser.



from Cyber Security News https://ift.tt/3kM60eg

Thursday, 13 August 2020

The future of hacking: COVID-19 shifting the way hackers work and who they target

Over the past few months, millions of workers have turned their homes into their new, remote office, including state government employees, which brought a host of risks through use of unsecured Wi-Fi and poor access controls. This shift toward home as well as the underlying panic brought on by COVID-19 altered hackers’ focus and targets aimed at the remote worker. Chief Information Security Officers (CISO) preparing their companies for this change require time, training for employees and the right technology, as well as increased cooperation between the security teams and IT/network operations groups.

from Cyber Security News https://ift.tt/2FkDa4t

Persistent data exposure is a much riskier problem in today’s remote world

In her “Top Breaches of 2019”, a security journalist asked if last year would “…be the worst on record?” It looks like 2020 could surpass last year’s breaches, but it’s not entirely due to consequences of the global pandemic. For sure, unprecedented levels of remote working has emboldened hackers to exploit new vulnerabilities, but there’s one very insidious risk that shows up year after year: the silent and unwitting exposure of sensitive data that no one notices… until it’s too late.

from Cyber Security News https://ift.tt/31Pbexp

Free Iran Virtual Summit shows positive power of cyberspace

The internet has become a powerful force for global interconnectivity and democratization. What’s more, the internet has introduced new methods for collective mobilization, such as “e-rebellions” and virtual protests. The global pandemic has accelerated the use of cyberspace as a powerful venue for individuals, groups, and nations to share ideas, engage, mobilize, and challenge authoritarian states in an impactful way.

from Cyber Security News https://ift.tt/2PQu3dN

(ISC)² announces 2020 Global Achievement Awards Honorees

(ISC)² announced the list of honorees for its 2020 (ISC)² Global Achievement Awards, which recognize and celebrate the most outstanding annual and lifetime achievements in the field of cybersecurity.

from Cyber Security News https://ift.tt/3amBOBI

Devon Bryan named CISO for MUFG Union Bank

MUFG Union Bank announced that Devon Bryan has joined as Chief Information Security Officer (CISO).


from Cyber Security News https://ift.tt/3kKURKX

Germany launches cybersecurity agency

Germany announced it had launched a federal agency to combat cyberattacks and strengthen its digital security. 

from Cyber Security News https://ift.tt/2FlXP8p

Survey reveals nearly 50% of organizations knowingly push vulnerable software

New research finds nearly half of organizations regularly and knowingly ship vulnerable code despite using application security tools. Among the top reasons cited for pushing vulnerable code were pressure to meet release deadlines (54 percent) and finding vulnerabilities too late in the software development lifecycle (45 percent), according to the Veracode and Enterprise Strategy Group (ESG) research.

from Cyber Security News https://ift.tt/3gUN5Ma

Congressman Barr introduces NIST COVID-19 Cybersecurity Act

Congressman Andy Barr (KY-06) introduced the NIST COVID-19 Cyber-Security Act, which instructs the Director of the National Institute of Standards and Technology (NIST) to produce standards for mitigating and protecting against cyberattacks to American universities researching COVID-19. 

from Cyber Security News https://ift.tt/30RUcPE

SANS Institute suffers data breach due to phishing attack

SANS Institute, a provider of cybersecurity training and certification services, lost approximately 28,000 items of personally identifiable information (PII) in a data breach that occurred after a single staff member fell victim to a phishing attack.

from Cyber Security News https://ift.tt/3kJuF32

Wednesday, 12 August 2020

Four technologies that promote secure exchange of health data

Regardless of the exact wording of The CMS Interoperability and Patient Access final rule, it’s clear that healthcare executives will be spending considerable time this year thinking about, planning for, and implementing technologies that support healthcare data exchange.

from Cyber Security News https://ift.tt/30PrDm0

Why partnerships between the CDO and CISO strengthen your brand

The offices of the Chief Information Security Officer and the Chief Digital Officer have the biggest part to play in protecting consumers perception of a brand, but they couldn’t be more opposite in their objectives and operations. CISO’s are tasked with keeping the unknown users out. Their primary focus has been making sure internal users such as employees, contractors and vendors are properly vetted and authenticated. CDO’s are seeking to invite as many unknown users (prospects) in as they represent new business. Having said that, what would happen if the CISO and CDO partnered more closely to protect those unknown users (prospects) and improve their online experience?

from Cyber Security News https://ift.tt/33Wnqz4

Ransomware vicitim Travelex forced into bankruptcy

Ransomware victim Travelex has been forced into administration, with more than 1,000 jobs set to go. 

from Cyber Security News https://ift.tt/3amFVxQ

Business leaders investing in digital security to manage a permanent remote workforce

When it comes to PKI, leaders have two options: build it or move it to the cloud. PKI as-a-Service (PKIaaS) platforms are becoming a popular investment choice that provide all the benefits of a privately rooted PKI, but without the cost and complexity of running it in-house. PKIaaS providers can deliver a much more effective, and ultimately more secure, PKI than most enterprises can achieve on their own. Regardless of whether the choice is to build or buy, teams must consider six key requirements to ensure in-house or out-sourced PKI success – and digital identity security.



from Cyber Security News https://ift.tt/2XT5y3Y

State Department offers up to $10 million for info on foreign election hackers

The U.S. Department of State’s Rewards for Justice (RFJ) program is offering a reward of up to $10 million for information leading to the identification or location of any person who works with or for a foreign government for the purpose of interfering with U.S. elections through certain illegal cyber activities.



from Cyber Security News https://ift.tt/2XRntIk

Wake Tech named National Center of Academic Excellence in Cyber Defense Education

The National Security Agency and the Department of Homeland Security designated Wake Tech as a National Center of Academic Excellence in Cyber Defense Education through 2025.

from Cyber Security News https://ift.tt/30OBlF7

DefenTec deploys KeeperMSP to defend from cyberattacks

DefenTec began as a managed services provider (MSP) before transitioning into a managed security services provider (MSSP). Now, in addition to optimizing their clients’ data environments through managed services, IT support and consulting, and cloud computing, DefenTec also fortifies them through a full range of managed security services, including secure Wi-Fidesign, network audits, and of course, password management. How does DefenTec use KeeperMSP to further guard their clients from cyberattacks?



from Cyber Security News https://ift.tt/2CjJbgD

Tuesday, 11 August 2020

Spreedly names new Chief Information Security Officer

Software company Spreedly has named Christopher Hudel  as its chief information security officer (CISO).



from Cyber Security News https://ift.tt/2XPIWSg

The enterprise imperative of cyber resiliency post-COVID-19

The COVID-19 driven shift to remote working coupled with accelerated digital transformation poses significant challenges to enterprise cybersecurity operations, widening the threat landscape and exposing enterprise networks, devices and data to increasing cybersecurity risk. Unmanaged devices, shadow IT and rapidly deployed remote access networks have all introduced emerging vulnerabilities that are being exploited by cybercriminals, making securing the enterprise even more difficult for CSOs and their teams.



from Cyber Security News https://ift.tt/2PH3cAL

Security officers now require a more comprehensive insider threat solution

COVID-19 has initiated a whole new host of cybersecurity threats. Twitter was one of the latest victims, its employees allegedly being targeted so that hackers should take over the accounts of certain verified users. And just before that, a June 25 story in The New York Times detailed the way in which a foreign entity is attempting to infiltrate American business by taking advantage of remote employees whose organizations – more than 400 million worldwide – use virtual private networks (VPNs).

from Cyber Security News https://ift.tt/31BYZ7a

Digital Shadows research: Escrow systems on cybercriminal forums

A new Digital Shadows report focuses on the escrow systems used on cybercriminal forums. These systems are deeply sophisticated, relying not just on similar technological mechanisms as traditional ecommerce, but on social, community oriented mechanisms as well, such as arbitration.

from Cyber Security News https://ift.tt/33MeNa8

Google admits its Home speakers recorded at all times

Google has admitted that its Home speakers recorded users at all times, even when they hadn't said "wake words" such as "OK Google," due to a security error earlier this year. 

from Cyber Security News https://ift.tt/3fJYUTT

COVID-19 five times more disruptive to supply chains than cyberattacks

According to the Supply Chain Resilience Report 2020 from 3D Hubs, cybersecurity issues have affected less than 10% of firms over the past 10 years, compared to 60% that have suffered directly as a result of COVID-19 disruption.

from Cyber Security News https://ift.tt/30K852k

Massachusetts Gov. Charlie Baker signs $1.8 billion bond bill to improve IT and public safety

Massachusetts Governor Charlie Baker signed an act which authorizes up to $1.8 billion in capital funding for key investments in public safety, food security, and information technology.



from Cyber Security News https://ift.tt/2DFg3kA

Monday, 10 August 2020

Iranian hacking group known as Fox Kitten (or Parisite) attacking F5 networking devices

A group of Iranian hackers have been attacking the  the US private and government sector, according to a security alert sent by the FBI last week.

from Cyber Security News https://ift.tt/3isKEAJ

93% of security professionals lack the necessary tools to detect security threats

A new study reveals that 93 percent of security professionals lack the tools to detect known security threats, and 92 percent state they are still in need of the appropriate preventative solutions to close current security gaps.



from Cyber Security News https://ift.tt/2DGzNED

5.5 million files leaked affecting cybersecurity firms, insurance companies, universities and more

The vpnMentor cybersecurity research team, led by Noam Rotem and Ran Locar, have uncovered an unsecured AWS S3 bucket with over 5.5 million files and more than 343GB in size that remains unclaimed.

from Cyber Security News https://ift.tt/3gNueCK

Sunday, 9 August 2020

TikTok to open a European data center in Ireland

Video app TikTok said it will set up its first European data center in Ireland.

 


from Cyber Security News https://ift.tt/3aal7cF

Four healthcare security lessons learned during the initial COVID-19 surge

By looking at hospitals – and the resulting mad scramble and actions they took to protect their patients – there are four lessons that can be distilled to help those in the thick of a spike or for those planning for the next surge.

from Cyber Security News https://ift.tt/3kt2VQf

Friday, 7 August 2020

Twitter finds security vulnerability in Android app

Twitter has announced that it has found a security vulnerability in its Android app.

from Cyber Security News https://ift.tt/3gEuZO7

NSA releases guidance on limiting location data exposure

The National Security Agency released a Limiting Location Data Exposure Cybersecurity Information Sheet (CSI) to guide National Security System (NSS) and Department of Defense (DoD) mobile device users on how they might reduce risk associated with sharing sensitive location data.

from Cyber Security News https://ift.tt/2CcsLqw

CISA releases new cybersecurity career pathways tool

The Cybersecurity and Infrastructure Security Agency (CISA) released the Cyber Career Pathways Tool, an interactive approach for current and future cybersecurity professionals to envision their career and navigate next steps within the NICE Cybersecurity Workforce Framework. 

from Cyber Security News https://ift.tt/30C6HyJ

Thursday, 6 August 2020

We are all Jeff Bezos

As much of the world continues to hunker down at home in response to COVID-19, threat actors continue to find ways of exploiting the crisis to gather sensitive and valuable information from individuals. But while we’re busy making sure that our primary computers and cloud-based accounts are locked down, it’s often the devices we least suspect – our smartphones – that provide the opening that hackers need. The 2018 hacking of Jeff Bezos’s iPhone X, perhaps the most famous example of smartphone hacking, provides an important reminder that these most personal of devices should be used with appropriate caution, especially in this time of upheaval.

from Cyber Security News https://ift.tt/31psyc5

How to lead an economical and efficient infosec program

Today's challenging reality presents an opportunity for CISO’s to reevaluate the economics and efficiencies of their current infosec program. To do so, CISO’s must narrow their focus on maximizing their return on investments and shift to a risk-based prioritization strategy. No matter the situation, CISO’s are always expected to meet goals and drive results. Even though security professionals cannot reduce risk to zero, they can reduce risk significantly by first eliminating the most impactful risks facing their organization.  Below, I discuss the four critical steps of leading an economical and efficient information security program while following a risk-based approach.



from Cyber Security News https://ift.tt/2Pyt2qB

The good, the bad and the ugly: Standard contractual clauses after Schrems II

Countless businesses export data from the European Union to the United States. Does your human resources office have information on European employees? The sales department information on European clients? That is personal data. The question is if data exports can continue in the wake of the Court of Justice of the European Union’s (CJEU) ruling in the “Schrems II” case.

from Cyber Security News https://ift.tt/2DsE7XV

Hiring a CISO: The evolving role of your security executive

Before COVID, cybersecurity was a concern for businesses everywhere. In fact, in Microsoft’s 2019 Global Risk Perception Survey, 57 percent of companies ranked cybersecurity as a higher risk than economic uncertainty and brand reputation or damage. Looking ahead, what does all of this mean for the role of the Chief Information Security Officer (CISO)? Not only is it more important than ever before, but the role has shifted since the start of COVID.



from Cyber Security News https://ift.tt/33xtE87

Authentication vs. authorization | Why we need authorization standards and what it means for enterprise cybersecurity

Twenty years ago, almost everything in the IT world was on-premises: hardware and software, including the tools you used to verify who your users were and what they could do in your systems. In today’s cloud-native world, almost nothing is on-prem, and because of the explosion of apps, remote users and devices, it has become a considerably more complicated task, by orders of magnitude, to verify the identity of a user — or a service — and determine policies that say what they are and aren’t allowed to do.

from Cyber Security News https://ift.tt/30Bahtc

Making the business case for security by design

Organizations need to evolve their thinking around cybersecurity to stay ahead of these changing threats. A holistic approach that effectively builds security into all infrastructure and processes from the ground up is cost-effective and necessary to safeguard valuable employee and customer data. This requires an overall shift in philosophy – and adopting the concept of security by design is a key first step. 

from Cyber Security News https://ift.tt/3kk6pVi

94% of organizations experienced at least one business-impacting cyberattack in the past year

The vast majority of organizations (94 percent) have experienced a business-impacting cyberattack in the past 12 months, according to both business and security executives.

from Cyber Security News https://ift.tt/3gLeXC4

1.1 billion fraud attacks detected since the beginning of 2020

A new Arkose Labs study revealed that in the first half of 2020, there were more than 1.1 billion online fraud attacks, double the attack volume compared to the second half of 2019 and a 25 percent attack rate increase across all transactions. 

from Cyber Security News https://ift.tt/31t9wRR

​Canon suffers ransomware attack that impacts numerous services

​Canon has suffered a ransomware attack that impacts numerous services, including Canon's email, Microsoft Teams, USA website, and other internal applications.

from Cyber Security News https://ift.tt/30y75yp

CISA releases Trusted Internet Connections 3.0 core guidance documentation

The Cybersecurity and Infrastructure Security Agency (CISA) released core guidance documentation for the Trusted Internet Connections (TIC) program, developed to assist agencies in protecting modern information technology architectures and services.

from Cyber Security News https://ift.tt/3a0uRWQ

Wednesday, 5 August 2020

Security of TikTok: How does a Microsoft acquisition change things?

Security fears linger around the wildly popular, Chinese-owned social media platform TikTok, and discussions are in the works for the platform to potentially be acquired by Microsoft. Should users be concerned in the interim? Will a change of ownership to a U.S.-based company allay security and privacy fears?

from Cyber Security News https://ift.tt/3i5obJU

More than $103 billion in economic losses due to natural disasters in 2019

In 2019, 396 natural disasters were recorded in EM-DAT with 11,755 deaths, 95 million people affected and $103 billion in economic losses across the world, according to Natural Disasters 2019, a new report by the Centre for Research on the Epidemiology of Disasters, The Université Catholique de Louvain  and the U.S. Agency for International Development (USAID). 

from Cyber Security News https://ift.tt/2Dq7FoW

CISA releases guide to vulnerability reporting for America’s election administrators

The Cybersecurity and Infrastructure Security Agency (CISA) released the Guide to Vulnerability Reporting for America’s Election Administrators. The guide walks election officials through the steps of establishing a vulnerability disclosure program.

from Cyber Security News https://ift.tt/31oAolY

The fall of BitBazaar and the rise of Neptune: new dark web marketplaces research

The Photon Research Team of Digital Shadows has published new research highlighting a popular dark web marketplace called BitBazaar that got called out for attempted manipulation of subscriber numbers on the popular dark web platform, Dread. 

from Cyber Security News https://ift.tt/31n7dzL

80% of internal auditors face barriers while getting involved in fraud risks management

The vast majority (80 percent) of internal auditors are facing barriers to being involved in managing fraud risk, despite almost two thirds (62 percent) saying they had seen an increase in fraud incidents over the past five years, according to a new report by Kroll, The Institute of Internal Auditors (IIA) and Internal Audit Foundation.

from Cyber Security News https://ift.tt/3ke9shs

Eric Holmquist named Executive Vice President, Chief Risk Officer at Customers Bank

Eric Holmquist joined Customers Bank as Executive Vice President and Chief Risk Officer. Holmquist has more than thirty-five years of financial industry expertise, spanning enterprise risk management, executive reporting, information management programs, and is skilled in creating operational efficiency and risk alignment.

from Cyber Security News https://ift.tt/3kc7a2t

20% of workers don’t follow company security policies all the time

IT personnel burn a full month of work (21 days) managing Identity and Access Management (IAM) each year on mundane tasks such as resetting passwords and tracking app usage, according to a new survey from 1Password.

from Cyber Security News https://ift.tt/3gwG5F4

Tuesday, 4 August 2020

Georgia Tech announces new VP for Information Technology

The Georgia Institute of Technology has selected Daren Hubbard as its new chief information officer and vice president for Information Technology. 



from Cyber Security News https://ift.tt/3a8mCZ3

US Carlson Wagonlit Travel pays a $4.5m ransom to get its data back

US corporate travel management firm Carlson Wagonlit Travel has suffered an intrusion, and it is believed the company paid a $4.5m ransom to get its data back.

from Cyber Security News https://ift.tt/3kaDrqK

Microsoft to continue discussions on potential TikTok purchase in the US

Days after US President Donald Trump said he would ban TikTok from operating in the United States, Microsoft has announced it might purchase the popular short-form video app. 

from Cyber Security News https://ift.tt/2D9v523

CISA, FBI and DoD issue alert on TAIDOOR, new Chinese malware variant

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD) have identified a malware variant—referred as TAIDOOR—used by the Chinese government.

from Cyber Security News https://ift.tt/2XmgneT

Monday, 3 August 2020

FBI sees rise in online shopping scams

The FBI says that an increasing number of victims are being directed to fraudulent websites via social media platforms and popular online search engines.



from Cyber Security News https://ift.tt/3fq4HOg

Phone spear phishing allowed hackers to gain Twitter employee credentials

Twitter has released additional information on their investigation into the compromise that occurred on July 15, 2020.  The attack, says the company, started with a spear phishing attack on a select group of employees that "relied on a significant and concerted attempt to mislead certain employees and exploit human vulnerabilities to gain access to [Twitter's] internal systems." 

from Cyber Security News https://ift.tt/31cTED3

John "JT" Mendoza joins CGI as Director of Global Security

Congrats to John "JT" Mendoza, one of our 2019 Most Influential People in Security awardees, who is retiring from federal government service after 22 years. He will be joining CGI as Director of Global Security, primarily responsible for establishing a global insider risk management program.

from Cyber Security News https://ift.tt/30nKPXN

Sunday, 2 August 2020

NSF grant funds cybersecurity training and mentorship program at Georgia State University

The National Science Foundation has awarded Georgia State’s Evidence-Based Cybersecurity Research Group (EBCS) nearly $300,000 for a pilot program to teach students advanced cybersecurity research skills and match them with CISOs, with whom they will test tools to improve organizations’ security.



from Cyber Security News https://ift.tt/31ffh5x

Cyber skills in traditional security management careers

When I speak with candidates who are either leaving government roles or actively looking for a new role, I am often asked what programs or courses related to cybersecurity they could take to improve their marketability.

from Cyber Security News https://ift.tt/2ED3xlL

Saturday, 1 August 2020

Securing Our Democracy: The Case for Robust Campaign Cybersecurity

Sun Tzu famously said, “all warfare is based on deception.” He could hardly have anticipated how his words would ultimately be substantiated—particularly in the tactics of today’s cybercriminals.

from Cyber Security News https://ift.tt/3flLYDF