Cybersecurity
Columbus State Awarded $174,000 From NSA To Develop Cybersecurity Tool
Further cementing its ambitions as a national powerhouse in cybersecurity education, Columbus State University announced Tuesday that it received a $174,000 grant from the National Security Agency to develop a new tool for rapid cybersecurity training and curriculum development. The tool will be internet-based, allowing it to be accessed anywhere in the world. Wang expects it will eventually be used by global Department of Defense installations and other private and public organizations.
ClearSky And Trend Micro Track Politically Motivated Global Cyber Attacks
A new report on the group known as “CopyKittens” details its increased activity in support of its political ambitions. The report is co-authored by ClearSky, an Israeli cyber-intelligence company, and Trend Micro, a global leader in cybersecurity solutions.
SecuredTouch Frictionless HUMANOBOT Prevents Mobile Fraud In Devices
SecuredTouch behavioral biometrics-based HUMANOBOT seamlessly detects non-human behavior generated by bots, malware, and automated scripts and stops fraud-focused emulators within mobile applications. SecuredTouch behavioral biometrics technology was developed to analyze human interaction with their mobile devices, so its HUMANOBOT solution is fine-tuned to continuously discover non-human device activity, automatically detecting fraud.
Petya Variant Cripples European Businesses
In the wake of May?s WannaCry attack, which affected more than 230,000 computers in over 150 countries, a fast-moving malware outbreak was reported June 27 at targets in Spain, France, Ukraine, Russia, and other countries. The attack infected large banks, law firms, shipping companies, and even the Chernobyl nuclear facility in the Ukraine. As with WannaCry, hackers employed malicious software using the EternalBlue vulnerability in older Microsoft Windows systems to rapidly spread across an organization. The new malware is thought to be a variant of Petya, a wiper malware designed to destroy systems and data with no hope of recovery.
NTT Security Highlights Incident Response At Black Hat 2017
This year at Black Hat 2017, NTT Security is focusing on incident response readiness. One lucky show participant will win a thorough gap assessment from the NTT Security Incident Response team valued at approximately $15,000 based on 40 hours of professional services*. The promotion spotlights the importance for organizations to formulate a robust incident response program in order to minimize liability in the event their infrastructure is infiltrated.
Delaware Turns To High Schoolers To Bolster Cybersecurity Workforce
A new scholarship platform is designed to take advantage of a booming industry and boost the state’s cybersecurity talent pool. In a two-pronged approach to cultivate tech talent and create jobs, Delaware has launched a $650,000 cybersecurity training and scholarship program for high school and college students. Officials hope to use the initiative to capitalize on the surge of job growth for cybersecurity professionals by offering students 16 years or older a new education platform called CyberStart that teaches IT security and provides students opportunities to compete for state scholarships. This includes $500,000 for cybersecurity education at the college level and $150,000 for other types of cybersecurity education.
Cybersecurity Market Worth US$232 Billion By 2022
According to a new market research report “Cybersecurity Market by Solution (IAM, Encryption, DLP, UTM, Antivirus/Anti-Malware, Firewall, IDS/IPS, Disaster Recovery, DDOS Mitigation, SIEM), Service, Security Type, Deployment Mode, Organization Size, Vertical, and Region – Global Forecast to 2022”, published by MarketsandMarkets?, the Cybersecurity Market is expected to grow from USD 137.85 Billion in 2017 to USD 231.94 Billion by 2022, at a Compound Annual Growth Rate (CAGR) of 11.0%.
Genetec Takes Cybersecurity On The Road
In 2007, the physical security industry started a convergence of IP-cameras from analog surveillance cameras. And a number of security technicians had challenges picking up on the networking aspects of IP-based surveillance systems. Ten years later, we are seeing the convergence of physical security and cybersecurity. Now today’s technicians need to understand the cybersecurity issues of connecting their physical security devices to the company?s network. Genetec has become extremely active in highlighting the importance of cybersecurity issues and has developed Cybersecurity Roadshow events.
Farpointe Alerts Partners To Encrypt Wireless Access Control Systems
Farpointe Data, the access control industry’s trusted OEM partner for RFID solutions, alerted its access control manufacturer, distributor, integrator, dealer and specifier partners about the potential impact on their businesses of the settlement of Edenborough v. ADT LLC, (Case No. 3:16-cv-02233, in the U.S. District Court for the Northern District of California). Referred to as the ADT Hacking Vulnerability Class Action Lawsuit, ADT will pay $16 million to settle five hacking vulnerability class actions because of claims that ADT’s wireless security systems were vulnerable to hacking because ADT failed to include any encryption within them.
Hacking The Human: Preventing Social Engineering Fraud, The New Frontier In Data Breaches
Data hacking comes in just about every flavor these days – even the human variety. Social engineering fraud, or the psychological manipulation of people into performing actions or divulging confidential information, is the latest human-based fraud on the market. Learn more on how it works.
KomodoSec Offers Free Reports On Corporate Cyberattack Surface
Komodo Consulting, a leading cybersecurity consulting company, recently launched its newest service from its research arm, Peta.AI. Companies can receive free, customized reports that illustrate how individual organizations? cyberattack surfaces appear to hackers. The corporate cyberattack surface report reveals the client?s exposure to cyber threats based on several indicators —geolocation, IP addresses, open and sensitive ports, vulnerable apps, compromised hosts, and leaked accounts— compiled from Peta.AI?s Open Internet, Deep Web, and Dark Net research.
Razberi And Cylance OEM Partnership Will Bring AI-Powered Cybersecurity To Video Surveillance Systems
Razberi Technologies and Cylance® Inc. have signed an original equipment manufacturer (OEM) agreement to embed CylancePROTECT® software in Razberi ServerSwitchIQ™ appliances. CylancePROTECT will be integral to the new Razberi CameraDefense™ solution that, combined with Razberi?s secure appliance architecture, provides comprehensive protection over the server, video management systems (VMS), and camera ecosystem.
10 Steps To Empower Your Employees To Become Your First Line Of Cyber Defense
Employees can be your best defense against a cyber attack, but also among the easiest targets for cyber criminals. Giving your employees proper cyber risk training can help limit the impact of an attack, and has been shown to reduce the cost of a data breach by $16 per compromised record, on average. Here are ten steps to help your employees become savvy cyber defenders.
ComNet Enhances Cybersecurity At Edge
ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of transmission and communication networking equipment, has introduced a new Cybersecurity feature in its latest generation of self-managed switches. The ComNet Port Guardian feature has the capability to physically disconnect a port if unauthorized access is detected.
Dunbar Releases First Open Source Active Response Platform For Cybersecurity
To address the security risks caused by alert fatigue, and to extend enterprise-grade incident management capabilities to businesses of all sizes, Dunbar Security Solutions launched Cyphon, the industry?s first open source active response platform for collecting data, identifying cyber-attacks and tracking all subsequent work performed.
Ransomware Cyber-Attack A Wake-Up Call, Microsoft Warns
Cyber-attacks that have hit 150 countries since Friday should be treated by governments around the world as a “wake-up call,” Microsoft says. The computing giant said software vulnerabilities hoarded by governments have caused “widespread damage.” The latest virus exploits a flaw in Microsoft Windows first identified by US intelligence. There are fears of further “ransomware” […]
Computer Security Experts Fear Second Wave Of ?Biggest Ransomware Attack Ever?
The malicious ?ransomware? attacks that seized computers worldwide Friday and held those systems hostage are likely to worsen this week as millions of people return to work – forcing them to discover the hard way whether they have been affected, security analysts said. With much of the world still reeling from the digital breach that prevented people from receiving hospital care, a second wave of what European officials have called ?the biggest ransomware attack ever? could be devastating.
Biggest Cybersecurity Threat Facing Federal Agencies Is legacy IT
Improving our cyber posture is among the top priorities for the Trump administration. However, there are still many questions raised as to how they hope to achieve this goal. As we have seen over the past several years, high-profile hacks are practically the norm. Starting with the OPM data breach in 2015, which affected millions of current and former federal employees to Russia?s efforts to influence our election through hacking of our political parties, cyberattacks have become a constant source of news and frustration in our lives.
2017 Global Threat Intelligence Report: 77% Of All Ransomware Detected In Four Industries
NTT Security, the specialized security company of NTT Group, has launched its 2017 Global Threat Intelligence Report (GTIR), which analyzes global threat trends based on log, event, attack, incident and vulnerability data [1 October 2015 to 31 September 2016]. Analyzing content from NTT Group operating companies, including NTT Security, Dimension Data, NTT Communications, NTT Data, and data from the Global Threat Intelligence Center (formerly known as SERT), the report highlights the latest ransomware, phishing and DDoS attack trends and demonstrates the impact of today?s threats against global organizations.
Taking Cybersecurity A Step Further With Attribute-Based Access Control
Most organizations already have firewalls implemented, encrypted critical data assets, and monitor network activity as part of an overall cybersecurity plan, but there is another line of defense that can provide additional value: the use of attribute based access control (ABAC) to reduce the threat surface, thereby improving overall security as well as mitigating risks associated with breaches.