The US government has banned federal agencies from using Kaspersky Lab security software, a Russian company, over concerns it may be tied to state-sponsored espionage. Acting Homeland Security Secretary Elaine Duke has issued a directive given at least six federal agencies a timeline to get rid of the software from government networks.
Virginia Gov. Terry McAuliffe declared Thursday that Virginia is the first state to adopt the National Initiative for Cyber Security Education (NICE) Framework, developed by the National Institute of Standards and Technology, in an official capacity. The latest version of the framework —also known as NIST Special Publication 800-181— was published earlier this month with the intention of providing a “common, constant lexicon” for a fast-growing industry in which everyone seems to have a different name for the same thing.
Rob Joyce, the Trump administration’s cybersecurity coordinator, said Tuesday the U.S. is lacking 300,000 cybersecurity experts needed to defend the country. He also had a warning for the public about using software from Kaspersky Lab. U.S. officials believe the company has ties to the Kremlin – and the federal government has vowed not to use its products. FBI agents have also interviewed Kaspersky employees working in the U.S.
HBO’s computer network struck by ransomware: hackers leak scripts from popular shows like “Game of Thrones” and demand up to $15 million in ransom. HBO reportedly responded with a $250,000 offer. Timothy Crosby, Senior Security Consultant for Spohn Security Solutions, says this newest hack evidences the growing risk that companies face with cyber intrusions. “No company —large or small— is immune to being a target; the HBO saga makes it even more apparent that cyber security teams must remain vigilant to detect and prevent attacks before they happen,” stated Crosby.
The frequency and sophistication of cyber attacks continues to rise globally according to research data from the Global Threat Intelligence Center (GTIC) 2017 Q2 Threat Intelligence Report released by NTT Security, an NTT Group company. The report, based on events identified across the NTT Security global client base during the second quarter of 2017, identifies trending threats and enables the company to implement IT security assessment and incident response tactics to stay ahead of hackers, and maintain the best protection for their clientele.
Innovations in cloud technology have begun to filter across industries, while cybersecurity remains a pressing and timely issue in this era of hacking. While the topic of cloud security may have a lower budget priority to I.T. organizations than overall IT security, the convergence of topics is here to stay. Since the overarching trend of outsourcing to Cloud Service Providers (CSPs) for specific applications, platform services, or infrastructure has become commonplace, the intersection of cloud security and organizational security has merged. I would argue that the intersection of cloud and enterprise/IT security has become a vital component of a company’s overall cybersecurity posture, and as such, requires careful monitoring.
Further cementing its ambitions as a national powerhouse in cybersecurity education, Columbus State University announced Tuesday that it received a $174,000 grant from the National Security Agency to develop a new tool for rapid cybersecurity training and curriculum development. The tool will be internet-based, allowing it to be accessed anywhere in the world. Wang expects it will eventually be used by global Department of Defense installations and other private and public organizations.
Organizations lose as much as 5% of their revenue each year to fraud. For a small to mid-size business earning $50 million annually, that’s a staggering $2.5 million – an amount no business can afford to forgo. A first step in preventing organizational fraud is screening employees and business partners. Whether you’re hiring a new employee, reviewing an employee for promotion to a greater position of trust or screening a potential new vendor or customer, the ability to conduct effective background research can reduce the risk of insider threats, fraud and improve productivity.
A new report on the group known as “CopyKittens” details its increased activity in support of its political ambitions. The report is co-authored by ClearSky, an Israeli cyber-intelligence company, and Trend Micro, a global leader in cybersecurity solutions.
SecuredTouch behavioral biometrics-based HUMANOBOT seamlessly detects non-human behavior generated by bots, malware, and automated scripts and stops fraud-focused emulators within mobile applications. SecuredTouch behavioral biometrics technology was developed to analyze human interaction with their mobile devices, so its HUMANOBOT solution is fine-tuned to continuously discover non-human device activity, automatically detecting fraud.