Cyber Security
Virginia Adopts Cybersecurity Framework To Get Everyone Speaking Same Language
Virginia Gov. Terry McAuliffe declared Thursday that Virginia is the first state to adopt the National Initiative for Cyber Security Education (NICE) Framework, developed by the National Institute of Standards and Technology, in an official capacity. The latest version of the framework —also known as NIST Special Publication 800-181— was published earlier this month with the intention of providing a “common, constant lexicon” for a fast-growing industry in which everyone seems to have a different name for the same thing.
White House Cybersecurity Coordinator Warns Against Using Kaspersky Lab Software
Rob Joyce, the Trump administration’s cybersecurity coordinator, said Tuesday the U.S. is lacking 300,000 cybersecurity experts needed to defend the country. He also had a warning for the public about using software from Kaspersky Lab. U.S. officials believe the company has ties to the Kremlin – and the federal government has vowed not to use its products. FBI agents have also interviewed Kaspersky employees working in the U.S.
HBO Hacked In Latest Cybersecurity Breach
HBO’s computer network struck by ransomware: hackers leak scripts from popular shows like “Game of Thrones” and demand up to $15 million in ransom. HBO reportedly responded with a $250,000 offer. Timothy Crosby, Senior Security Consultant for Spohn Security Solutions, says this newest hack evidences the growing risk that companies face with cyber intrusions. ?No company —large or small— is immune to being a target; the HBO saga makes it even more apparent that cyber security teams must remain vigilant to detect and prevent attacks before they happen,? stated Crosby.
Cyber Attacks Occurring More Frequently With Greater Sophistication According To NTT Security
The frequency and sophistication of cyber attacks continues to rise globally according to research data from the Global Threat Intelligence Center (GTIC) 2017 Q2 Threat Intelligence Report released by NTT Security, an NTT Group company. The report, based on events identified across the NTT Security global client base during the second quarter of 2017, identifies trending threats and enables the company to implement IT security assessment and incident response tactics to stay ahead of hackers, and maintain the best protection for their clientele.
Cloud Security, IT Security, Cybersecurity: How To Move IT To The Board Room
Innovations in cloud technology have begun to filter across industries, while cybersecurity remains a pressing and timely issue in this era of hacking. While the topic of cloud security may have a lower budget priority to I.T. organizations than overall IT security, the convergence of topics is here to stay. Since the overarching trend of outsourcing to Cloud Service Providers (CSPs) for specific applications, platform services, or infrastructure has become commonplace, the intersection of cloud security and organizational security has merged. I would argue that the intersection of cloud and enterprise/IT security has become a vital component of a company’s overall cybersecurity posture, and as such, requires careful monitoring.
Columbus State Awarded $174,000 From NSA To Develop Cybersecurity Tool
Further cementing its ambitions as a national powerhouse in cybersecurity education, Columbus State University announced Tuesday that it received a $174,000 grant from the National Security Agency to develop a new tool for rapid cybersecurity training and curriculum development. The tool will be internet-based, allowing it to be accessed anywhere in the world. Wang expects it will eventually be used by global Department of Defense installations and other private and public organizations.
Arrest Fraud: Prevent Workplace Theft With A Comprehensive Background Investigation Program
Organizations lose as much as 5% of their revenue each year to fraud. For a small to mid-size business earning $50 million annually, that?s a staggering $2.5 million – an amount no business can afford to forgo. A first step in preventing organizational fraud is screening employees and business partners. Whether you?re hiring a new employee, reviewing an employee for promotion to a greater position of trust or screening a potential new vendor or customer, the ability to conduct effective background research can reduce the risk of insider threats, fraud and improve productivity.
ClearSky And Trend Micro Track Politically Motivated Global Cyber Attacks
A new report on the group known as “CopyKittens” details its increased activity in support of its political ambitions. The report is co-authored by ClearSky, an Israeli cyber-intelligence company, and Trend Micro, a global leader in cybersecurity solutions.
SecuredTouch Frictionless HUMANOBOT Prevents Mobile Fraud In Devices
SecuredTouch behavioral biometrics-based HUMANOBOT seamlessly detects non-human behavior generated by bots, malware, and automated scripts and stops fraud-focused emulators within mobile applications. SecuredTouch behavioral biometrics technology was developed to analyze human interaction with their mobile devices, so its HUMANOBOT solution is fine-tuned to continuously discover non-human device activity, automatically detecting fraud.
Petya Variant Cripples European Businesses
In the wake of May?s WannaCry attack, which affected more than 230,000 computers in over 150 countries, a fast-moving malware outbreak was reported June 27 at targets in Spain, France, Ukraine, Russia, and other countries. The attack infected large banks, law firms, shipping companies, and even the Chernobyl nuclear facility in the Ukraine. As with WannaCry, hackers employed malicious software using the EternalBlue vulnerability in older Microsoft Windows systems to rapidly spread across an organization. The new malware is thought to be a variant of Petya, a wiper malware designed to destroy systems and data with no hope of recovery.
NTT Security Highlights Incident Response At Black Hat 2017
This year at Black Hat 2017, NTT Security is focusing on incident response readiness. One lucky show participant will win a thorough gap assessment from the NTT Security Incident Response team valued at approximately $15,000 based on 40 hours of professional services*. The promotion spotlights the importance for organizations to formulate a robust incident response program in order to minimize liability in the event their infrastructure is infiltrated.
Delaware Turns To High Schoolers To Bolster Cybersecurity Workforce
A new scholarship platform is designed to take advantage of a booming industry and boost the state’s cybersecurity talent pool. In a two-pronged approach to cultivate tech talent and create jobs, Delaware has launched a $650,000 cybersecurity training and scholarship program for high school and college students. Officials hope to use the initiative to capitalize on the surge of job growth for cybersecurity professionals by offering students 16 years or older a new education platform called CyberStart that teaches IT security and provides students opportunities to compete for state scholarships. This includes $500,000 for cybersecurity education at the college level and $150,000 for other types of cybersecurity education.
Cybersecurity Market Worth US$232 Billion By 2022
According to a new market research report “Cybersecurity Market by Solution (IAM, Encryption, DLP, UTM, Antivirus/Anti-Malware, Firewall, IDS/IPS, Disaster Recovery, DDOS Mitigation, SIEM), Service, Security Type, Deployment Mode, Organization Size, Vertical, and Region – Global Forecast to 2022”, published by MarketsandMarkets?, the Cybersecurity Market is expected to grow from USD 137.85 Billion in 2017 to USD 231.94 Billion by 2022, at a Compound Annual Growth Rate (CAGR) of 11.0%.
Genetec Takes Cybersecurity On The Road
In 2007, the physical security industry started a convergence of IP-cameras from analog surveillance cameras. And a number of security technicians had challenges picking up on the networking aspects of IP-based surveillance systems. Ten years later, we are seeing the convergence of physical security and cybersecurity. Now today’s technicians need to understand the cybersecurity issues of connecting their physical security devices to the company?s network. Genetec has become extremely active in highlighting the importance of cybersecurity issues and has developed Cybersecurity Roadshow events.
Farpointe Alerts Partners To Encrypt Wireless Access Control Systems
Farpointe Data, the access control industry’s trusted OEM partner for RFID solutions, alerted its access control manufacturer, distributor, integrator, dealer and specifier partners about the potential impact on their businesses of the settlement of Edenborough v. ADT LLC, (Case No. 3:16-cv-02233, in the U.S. District Court for the Northern District of California). Referred to as the ADT Hacking Vulnerability Class Action Lawsuit, ADT will pay $16 million to settle five hacking vulnerability class actions because of claims that ADT’s wireless security systems were vulnerable to hacking because ADT failed to include any encryption within them.
Hacking The Human: Preventing Social Engineering Fraud, The New Frontier In Data Breaches
Data hacking comes in just about every flavor these days – even the human variety. Social engineering fraud, or the psychological manipulation of people into performing actions or divulging confidential information, is the latest human-based fraud on the market. Learn more on how it works.
KomodoSec Offers Free Reports On Corporate Cyberattack Surface
Komodo Consulting, a leading cybersecurity consulting company, recently launched its newest service from its research arm, Peta.AI. Companies can receive free, customized reports that illustrate how individual organizations? cyberattack surfaces appear to hackers. The corporate cyberattack surface report reveals the client?s exposure to cyber threats based on several indicators —geolocation, IP addresses, open and sensitive ports, vulnerable apps, compromised hosts, and leaked accounts— compiled from Peta.AI?s Open Internet, Deep Web, and Dark Net research.
Farpointe Provides First Cybersecurity Vulnerability Checklist For Contactless Cards And Readers
Farpointe Data, the access control industry’s trusted global partner for RFID solutions, has just posted the first radio frequency identification(RFID) Cybersecurity Vulnerability Checklist for access control manufacturers, distributors, integrators, and end users to use to protect their access control systems from becoming hacker gateways to their facilities and IT systems. Knowing what to do is especially important now that government agencies, such as the United States Federal Trade Commission, have begun filing lawsuits against businesses that do not provide good cybersecurity practices.
Razberi And Cylance OEM Partnership Will Bring AI-Powered Cybersecurity To Video Surveillance Systems
Razberi Technologies and Cylance® Inc. have signed an original equipment manufacturer (OEM) agreement to embed CylancePROTECT® software in Razberi ServerSwitchIQ™ appliances. CylancePROTECT will be integral to the new Razberi CameraDefense™ solution that, combined with Razberi?s secure appliance architecture, provides comprehensive protection over the server, video management systems (VMS), and camera ecosystem.
10 Steps To Empower Your Employees To Become Your First Line Of Cyber Defense
Employees can be your best defense against a cyber attack, but also among the easiest targets for cyber criminals. Giving your employees proper cyber risk training can help limit the impact of an attack, and has been shown to reduce the cost of a data breach by $16 per compromised record, on average. Here are ten steps to help your employees become savvy cyber defenders.