As the old adage goes, “Trust must be earned.” This proverb essentially means that trusting those who are not truly trustworthy can have harmful results. Interestingly, this wisdom is particularly applicable to cybersecurity. There are countless external (and internal) threat…
Tag: Cybersecurity Insiders
“Out-of-band Real-time API Security”
Cyber security is a complex topic where difficult problems mingle with tall claims. This week, we came across one such from a competitor – “out-of-band real-time security.” The post “Out-of-band Real-time API Security” appeared first on Cybersecurity Insiders. Advertise…
Bitglass: Deck the Cloud
With 2019 at its tail end, I can’t help but reminisce on how eventful the year has been for the Bitglass family. We started the year by securing yet another round of funding to fuel our growth and went on…
POSITIVELY IMPACTING THE NEXT GENERATION WITH CYBER SAFETY DAY
This post was originally published by (ISC)² Management. As use of the internet becomes more acceptable in schools and expected at younger ages, cyber safety education is a necessity. While tablets, computers and smart devices are the norm at home…
NO LIMITS, NO EXCUSES: COMMIT TO CERTIFICATION IN 2020
This post was originally published by (ISC)² Management. Why are goal-oriented individuals more likely to thrive professionally? Because they know where they want to go. But accomplishing anything meaningful takes drive and dedication. Most of all, it requires a clearly…
CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL EXAM UPDATES
This post was originally published by (ISC)² Management. Last week, IBM’s Security Intelligence blog reported on the highly-discussed cybersecurity skills shortage – and in particular, how some areas are lacking in talent more than others. “Software development is one of the areas…
Google trending Cyber Attack news headlines
Greenville Water Utility of South Carolina reportedly became a recent victim of a cyber attack where hackers were either trying to lock down the database through malware or were interested in transmitting the data and then selling the info on…
Cloud Security vulnerability detected on Microsoft Azure
Check Point security researchers seem to be taking their job seriously as every week a study made by them discloses to the world vulnerability or the detection of malware in the cyberspace. The latest flaw happens to be with…
Facebook to pay $550 million as Privacy Concerns settlement
As Facebook (FB) has failed to comply with the Illinois Biometric Information Privacy Act, it has agreed to pay $550 million as a penalty settlement over a lawsuit. This was disclosed by Facebook’s Chief Financial Officer who called it the…
Cloud Workload Security – Part 1: Introducing the Forrester Wave Report
An independent evaluation published by leading global research and advisory firm Forrester provides an excellent overview of the security challenges posed by the transition to cloud-based environments—and discusses the cloud workload security solutions best poised to address them. Why is…
Healthcare security: How can blockchain help?
This is part 2 of a blog on healthcare security. For more info, check out part 1. An independent guest blogger wrote this blog. When it comes to data security, there is no more important place than the healthcare industry. When…
Security pros hampered by burnout, lack of diversity – how do we fix this?
The cybersecurity profession is in a somewhat precarious state. Not only are cyber pros faced with increasing threats from insiders, but threats from external adversaries also continue to rise and are becoming more sophisticated. At the same time, companies are…
Ransomware Attack on US DOD Contractor
RYUK Ransomware is reported to have targeted the servers of a DOD Contractor last week and news is out that the contractor might take some to recover its data from this incident. The contractor in the discussion is Electronic Warfare…
Largest Airports in the world are vulnerable to Cyber Attacks
Almost all large airports in the world are said to be vulnerable to cyber attacks says research compiled by Web Security Company ImmuniWeb. It was discovered in the study that only three airports in the world were found without any…
Cyber Attack on UN offices in Geneva and Vienna
A statement released by United Nations yesterday says that its offices in Geneva and Vienna fell prey to a cyber attack which was caused in the middle of last year. Sources say that the hackers managed to access the database…
It is getting harder for us to prove who we are
I had an interesting experience the other day. I had to renew my driver’s license. In previous renewal cycles, this was no big deal. One could just visit the local Department of Motor Vehicles (with a bagged lunch since it…
Cyber attack headlines trending on Google
Finally what we did not expect is happening as a British court has ordered Bitfinex to freeze a Bitcoins payments as it was leading to the wallets of those distributing ransomware. Yes, you have read it right! As most…
Microsoft wants to curb the growing menace of Cyber Threats in the following way
Microsoft made it official on Tuesday that it has ways to curb the growing menace of cyber threats on government infrastructures across the world. The American tech giant says that the threats can be curbed by collaborating with governments, tech…
China could Cyber Attack UK without Huawei 5G
All these days we have heard from cyber experts that China could launch cyber attacks if in case 5G equipment from Huawei is used in their network upgrades. But now, experts suggest that Beijing could find easier ways to attack…
Top 10 AT&T Cybersecurity blogs of 2019
Happy New Year! What a year 2019 was in cybersecurity. It was a great year for informative and interesting blogs. Here were the top performing AT&T Cybersecurity blogs written in 2019: 1. The Great Cannon has been deployed again by Chris Doman…
Do you need certifications to get an InfoSec job?
I’ve seen Tweets and heard many discussions about certifications, like CISSP, CEH, OSCP and so on, in InfoSec. No doubt certifications have value – in many situations hiring managers are quickly going through resumes and certifications are symbolic of at…
Running an Eco-friendly IT business
(banner image green leaf key Adobe Stock ) As someone in the technology field I follow the steady stream of new and exciting products and gadgets that come out at least twice a year. I am constantly upgrading my…
Avast antivirus caught selling user data
According to a report published in Motherboard, a science & technology blog belonging to VICE, Anti-Virus software offering firm Avast software has been caught selling its users’ web browsing data and other sensitive information to those interested. However, the…
World Data Privacy Day on January 28
Every year, January 28th stands as International Data Privacy Day which is being celebrated as said since 2007. The objective of celebrating this day is to promote data protection practices across the world and to raise awareness related to it.…
No more Ransomware payments from Taxpayers funds says, New York
State Senators of New York have proposed two new bills that would disallow usage of taxpayers’ funds to pay ransom payments when government agencies fall prey to ransomware attacks. S7246 happens to be the first bill that was proposed by…
Journey to security: Data safety for travelers
Image source: Pixabay Note:This blog was written by an independent guest blogger. In today’s world, we enjoy incredible mobility that our ancestors could only dream of. In a matter of hours or, at most, days, we can go from one…
Citrix Server Vulnerability leads to Ransomware Attack
Citrix Server which allows centrally hosted applications to be delivered to mobile and desktop clients is found to be vulnerable to cyber-attacks which when exploited by hackers can lead to ransomware infections and bitcoins mining. Citrix has however released…
UK PM Boris Johnson phone hacked by Saudi Prince Salman
Just when the reports are emerging that Amazon founder Jeff Bezos phone was hacked by Saudi Ruler Mohammad Bin Salman in 2018 to access sensitive information, here comes a piece of information from a source from Daily Mail that the…
Deloitte acquires Cybersecurity consulting firm SecurePath
New York-based Professional Services firm Deloitte has made it official that it is going to acquire Malaysian Cybersecurity Consulting firm SecurePath. The objective is to strengthen the services of blockchain technology-based Deloitte’s Cyber Risk Services with SecurePath’s Risk Advisory practices…
Face/Off: Security challenges in the age of facial recognition
Facial recognition is rightfully held up as an accurate and secure method of safeguarding devices and ensuring more accurate identity proofing. It is, in essence, the new science of identity. But while facial recognition technology complements the need for ‘traditional’…
The evolution of smart cities: what provisions are vital for their success?
Cities are undergoing a wave of digital transformation. With rapid population growth and urbanization transforming the way we live, improving or even maintaining our current quality of life relies upon using resources more efficiently. To put this point into perspective,…
Facial recognition technology benefits: much more than unlocking smartphones
Thanks to developments in camera technology, mapping processes, and processing speeds, facial recognition has rapidly become an integral part of the authentication processes for a variety of hardware. The technology has garnered widespread awareness in the last 12 months as…
How to achieve out-of-the box global IoT connectivity
The IoT world is developing at a tremendous pace, but while Cisco estimates that there will be more than 50 billion connected devices by 2020 globally, at the end of 2019 we’re only at 9 billion. So, what’s causing this…
Thales’ Central Issuance award win underlines growing role of Fintech innovation in Chile
Thales has just been recognized by Santander in Chile for our EMV card issuance solution, which has allowed the bank to create an infrastructure that enables it to customize cards on a large scale, without having to rely on partner…
Ransomware payments and downtime grew in 2019
Ransomware which is a file-encrypting malware has been tagged as the most disruptive cyber-attack of 2019. And this was confirmed by a study carried out by Connecticut based Cybersecurity firm Coverware. In a recent Ransomware Marketplace report released by Coverware,…
MOST EMPLOYERS DON’T PAY FULL COST OF CERTIFICATIONS
This post was originally published by (ISC)² Management. One of the most common complaints cybersecurity professionals voice about their employers is that they have to pay for certifications out of their own pockets. It’s not a trivial issue, since workers…
SWITCHING FROM OTHER FIELDS TO CYBERSECURITY IS PROFITABLE
This post was originally published by (ISC)² Management. Here’s a bit of good news for anyone contemplating a career in cybersecurity: Cybersecurity workers who started their careers in other fields tend to get paid more than career-long cybersecurity professionals, according…
SO YOU HAVE DECIDED TO BECOME CYBER SECURITY CERTIFIED, NOW WHAT?
This post was originally published by (ISC)² Management. Toward the end of 2019, I met many aspiring women and men who approached me and said, “Tony, I want to become cyber security certified, how do I do it?” Read more…
Ransomware attack on Tampa Bay Times
Tampa Bay Times, which happens to be one of the renowned American newspapers has admitted formally that it has become a recent victim of a ransomware attack. However, the good news is that no data related to the publication was…
Albany County hit by second Cyber Attack in January 2020
News is out that Albany County of New York was hit by a second cyberattack in just three weeks of January 2020. However, officials are confident that they will recover from this attack as soon as possible and will put…
Five key takeaways from European Utility Week 2019
This year’s European Utility Week represented an exciting opportunity for manufacturers and service providers to showcase the latest developments in the utilities space. With so much of the world’s attention rightfully focused on the climate crisis, and especially on reducing the impact of household emissions on the environment, the most…
Sodinokibi Ransomware attack on GEDIA
German automobile spare parts maker GEDIA is in news for wrong reasons. A hacking group related to Sodinokibi is threatening to publish data which it procured after encrypting the database of Gedia with the file-encrypting malware. News is out…
FTCODE Ransomware steals credentials and passwords
A Ransomware strain named FTCODE which has been in prevalence since 2013 is now been reintroduced into the web world by hackers with some new features and tools. Security experts claim that this file-encrypting malware is now capable of stealing…
Saudi Prince hacks Amazon Jeff Bezos WhatsApp number
At a glittering Hollywood party in April 2018, Jeff Bezos who happens to be the world’s richest man exchanged his WhatsApp phone number with Saudi Arabia’s Billionaire Mohammed Bin Salman. The objective of the former was to set up data…
How to identify phishing emails and what to do
Note:This blog was written by an independent guest blogger. Phishing scams remain one of the most widespread cybercrimes. A phishing scam can be as simple as getting someone to click on a link, attachment, or a picture of cute kittens.…
Kroll acquires Cybersecurity firm RP Digital Security
New York-based Risk consulting firm Kroll Inc, said that it has acquired Singapore based forensic and digital security firm RP Digital Security. Thus, the founder Rob Phillips of the latter is said to join the payroll of the former by…
Boss of Cybersecurity Firm launches DDoS Cyber Attacks on other companies
A co-founder of a Cybersecurity firm is said to have admitted to committing a cybercrime of hiring hackers to carry out cyberattacks against other companies. The culprit in a discussion is Tucker Preston from Georgia who confessed before the legal…
FireEye acquires Cloud Security startup Cloudvisory
FireEye which offers AI-based cybersecurity intelligence has made it official that it has acquired Texas-based Cloud Security startup Cloudvisory. Financial details of the deal were not disclosed. However, FireEye confirmed that its latest technology acquisition will help its customers integrate…
Hacker leaks Telnet passwords of more than 500,000 devices
According to a report published in the technology-based website ZDNet, a hacker published Telnet passwords of more than 500,000 devices which includes Telnet servers, home routers, and Internet of Things(IoT). A source from ZDNET says that the passwords were…
It is getting harder for us to prove who we are
I had an interesting experience the other day. I had to renew my driver’s license. In previous renewal cycles, this was no big deal. One could just visit the local Department of Motor Vehicles (with a bagged lunch since it…
Worldwide Cyber Threats in 2020
A report disclosing details about Cyber Threats that will prevail across the world in 2020 was released by Cybersecurity Firm Check Point early today. And it highlights the attack vectors and techniques which will be employed by cyber crooks to…
Ransomware attack on New Orleans Ernest N.Morial Convention Center
Ernest N.Morial Convention Center which happens to be located in New Orleans, Louisiana, United States is in news for all wrong reasons. It is said that the convention center which has hosted several NBA and PFL Events was hit by…
Google CEO Sundar Pichai wants AI to be regulated
Google CEO Sundar Pichai has urged the US and the European Union to coordinate and offer tools that can regulate the use of Artificial Intelligence (AI) technology. Speaking at the technology conference in Brussels, the Alphabet Inc’s Chief Executive Officer…
How to Survive a Cybersecurity Audit
If you’re in a regulated industry or serve customers that are, sooner or later you will probably have auditors examine your cybersecurity setup. This may be on the behalf of clients, or for your own internal corporate governance. No matter…
Cyber Attack on Mitsubishi Electric and China held as a suspect
Mitsubishi Electric which happens to be Japan’s largest electronic equipment manufacturer and supplier to the world has released an official confirmation early today that it has become a victim of a cyber attack sometime in June last year. The…
Android vulnerability leads to malware scare
Kaspersky Lab has found a serious vulnerability in the Android operating system which can be used by hackers to launch malware attacks and steal information related to the smartphone user and transmit it to the servers of cybercriminals. Named as…
Tinder Cyber Attack exposes 70K female photos for Catfishing
According to research carried out by Cybersecurity firm White Ops, hackers launched a cyberattack at some time last year to access images of over 70,000 females from the dating app which can be used for fraudulent cyber scams like Catfishing.…
Top Cybersecurity trends & predictions for 2020
It is that time of year again where we look forward to what cyber goodies the New Year brings. 2019 brought new records in data breaches, a rash of ransomware attacks, and a rise in state-sponsored cyber-attacks. Below is a…
Security and digital payments – growth finally meeting demand
Note:This blog was written by an independent guest blogger. Digital payments are the future of commerce, but security concerns have created a major barrier to their popularity. A study of businesses conducted by the influential PCI Security Standards Council found…
Should cities pay a ransomware demand?
UPDATE: In a “ripped from the headlines” moment, we have real world confirmation of the growing risk discussed in this article. Breaking news over the weekend revealed that both the city of New Orleans and New Jersey’s largest hospital network are…
Healthcare cybersecurity for 2020 and beyond
An independent guest blogger wrote this blog. block These days, effective cybersecurity in healthcare is as critical as ever. Last year, more than 32 million patients had their personal and medical information stolen in data breaches across the United States.…
How to identify phishing emails and what to do
Note:This blog was written by an independent guest blogger. Phishing scams remain one of the most widespread cybercrimes. A phishing scam can be as simple as getting someone to click on a link, attachment, or a picture of cute kittens.…
Business disruption now considered as biggest Cyber Threat than data thefts
As per a research conducted by Crowdstrike, business disruption is now feared to be the biggest cyber threat than just data theft for businesses- as cybercriminals are seeing the former as their main attack objective than the latter. Security researchers…
Web Browser options for data privacy seekers
For those who think its time that their browser is scooping up a lot of personal information than required, here are some 3rd party tools that can help browse and search- keeping your privacy intact and that too at ‘zero’…
Emotet malware attack on Email users at the United Nations
Email Users at the United Nations were targeted with sophisticated phishing attacks by Emotet malware operators. Reports are in that the operators who developed Emotet have now devised a phishing email campaign in the name of the Permanent Mission of…
Which security certification is for you (if any)
It is hard to look at an information security job posting without seeing some certifications desired. Some make sense and others not so much. I have looked at junior helpdesk positions asking for CISSP, and some of the roles at…
Ransomware attacks can be blocked with these firewall best practices
As ransomware attacks are hitting the news headlines, CIOs and CTOs are in a lookout for a permanent solution to curb such attacks on their IT infrastructure respectively. So, security analysts are suggesting the following firewall best practices to prevent…
More than 67 percent of healthcare organizations in the UK hit by a cyberattack
A survey conducted by a data security provider named Clearswift in the UK suggests that more than 67% of healthcare organizations were hit by a cyberattack last year most of which includes malware attacks, virus infection propagation through USB sticks…
Apple acquires Artificial Intelligence startup Xnor
Seattle based startup XNOR.ai which is basically into Artificial Intelligence is now reported to be a part of American Technology giant Apple Inc. Yes, the announcement comes early this week when Apple made it official that it is going to…
Why MSPs Should Care About Cybersecurity
As a Managed Service Provider (MSP), there are many things you need to focus on to be successful in your business. You have to be a subject matter expert in your particular area in order to convince companies to outsource…
Donald Trump lashes out at User Privacy Policy of Apple Inc
US President Donald Trump has sarcastically lashed out Apple Inc’s Boss Tim Cook on Tuesday by claiming that the technology giant’s User Privacy Policy is blocking his vision of making ‘America Great’! Tweeting his mind on the same, the…
US Election 2020 might be influenced by Russian Cyber Attacks
All these days we have been talking a lot about US elections 2016 and their outcome influenced by Russian hackers. Now, the time has come to forget the past and look into the future as the 2020 Election Polls are…
UK will repent for handing over 5G network upgrade to Huawei
Edward Lucas, a Britain based security analyst has stated in its recent post that handing the 5G network upgrade to Huawei in Britain is like giving your main door keys to a stranger- where there is no guarantee of his/her…
Google trending news headlines related to Cybersecurity
Firstly, the news headlines which are trending on Google and related to Cybersecurity happens to be an agreement made between Estonia and the United States. According to sources, both countries have recently signed an agreement to share cyber threat intelligence…
What will happen to Windows 7 support after January 15, 2020
Microsoft has already issued a warning that after early January 2020 all its Windows 7 PC will lose support from its company and might become super vulnerable to cyber attacks such as malware infections like Ransomware and such. In…
Artificial Intelligence to fuel Cyber Warfare
The relationship between Iran and America had deteriorated to such an extent that other countries are speculating a cyberwar to erupt at any moment. Technically speaking, cyberwar is a digital attack were computer viruses, DDoS campaigns and hacks are expected…
Security and digital payments – growth finally meeting demand
Note:This blog was written by an independent guest blogger. Digital payments are the future of commerce, but security concerns have created a major barrier to their popularity. A study of businesses conducted by the influential PCI Security Standards Council found…
Top Cybersecurity trends & predictions for 2020
It is that time of year again where we look forward to what cyber goodies the New Year brings. 2019 brought new records in data breaches, a rash of ransomware attacks, and a rise in state-sponsored cyber-attacks. Below is a…
How to secure a router from Cyber Attacks
Hackers nowadays are seen using routers as botnets to launch cyber attacks on large companies and organizations. So, in such circumstances, here are some steps that will help secure a router from cyber attacks. Changing Passwords- It is better if…
Ransomware attack on Albany Airport on Christmas 2019
Christmas 2019 went sour for a few of the staff members of the Albany International Airport as a ransomware attack is reported to have encrypted the entire database of the airport forcing the authorities to pay a ransom to a…
Information Security grabs attention at CES 2020
At the Consumer Electronics Show (CES) 2020 Las Vegas, startups have shown a lot of interest in detailing the facts on how they secure their user data and how they protect it to the core when a consumer uses either…
2019’S TOP 10 WEBCASTS
This post was originally published by (ISC)² Management. Continuing education allows cybersecurity professionals to stay in tune to the constant changes in the industry. (ISC)² provides webcasts throughout the year on various security-related topics to help keep you informed, as…
Four innovations changing the face of the financial industry
Technological advances and changes in customer expectations over recent years have made a huge impact on the banking and financial services sectors. In many cases, the transformation has been dramatic, with digital technologies enabling new services and totally resetting consumer…
Face/Off: Security challenges in the age of facial recognition
Facial recognition is rightfully held up as an accurate and secure method of safeguarding devices and ensuring more accurate identity proofing. It is, in essence, the new science of identity. But while facial recognition technology complements the need for ‘traditional’…
Glass Class: Cloud Security Priorities 2020
This post was originally published by Juan Lugo. In 2020, organizations must focus on improving their cloud security posture in order to protect corporate data. There are many opportunities for employee missteps causing inadvertent or even malicious exposure. Additionally, without safeguards, hackers…
The Rise of Insider Threats in Verizon’s DBIR
This post was originally published by Jacob Serpa. Each year, Verizon releases its Data Breach Investigation Report (DBIR). These reports evaluate the state of security each year, providing detailed statistics around leading vulnerabilities, which industries face the most breaches, and…
The evolution of smart cities: what provisions are vital for their success?
Cities are undergoing a wave of digital transformation. With rapid population growth and urbanization transforming the way we live, improving or even maintaining our current quality of life relies upon using resources more efficiently. To put this point into perspective,…
Mobile Security alert for Android and iOS WhatsApp users
To all those who are using Whatsapp messaging app on Android and iOS loaded smartphones, here’s a news piece that might be of your interest. The Facebook-owned the phone and video sharing platform has officially declared that it is going…
Cyber Attack penalty of £500,000 on Dixons Carphone
Dixons Carphone, which became a victim of a cyber attack in between 2017-2018, has been fined an amount of £500,000 by the International Commissioner’s Office (ICO). Officials from the ICO said that the penalty was imposed as the electrical and…
Chinese Malware on phones issued by the US Government
Surprisingly, the phones issued by the US government to those working for State approved assistance programs and low-income people are coming preloaded with Chinese malware says a survey conducted by a security company. Yes, what you’ve read is right!…
How to achieve out-of-the box global IoT connectivity
The IoT world is developing at a tremendous pace, but while Cisco estimates that there will be more than 50 billion connected devices by 2020 globally, at the end of 2019 we’re only at 9 billion. So, what’s causing this…
Why CJIS mobile compliance might be easier than you think
Guest blog By Andrew King, AT&T Global Account Director, MobileIron Although we just wrapped up National Cybersecurity Awareness Month in October, security professionals never take a break — because cybercriminals don’t either. That’s especially true for folks who work in law…
Meet the Snake Ransomware which encrypts all connected devices
The trouble with ransomware seems to be never-ending for online users as new ransomware named ‘Snake’ has evolved into the cyber landscape which encrypts all connected devices along with the targeted system. Detected by the MalwareHunter Team, Snake Ransomware…
Tiktok App is filled with Vulnerabilities
This certainly will be a bad news to all those 1 billion active users of Tiktok and the news is as follows- A recent research carried out by Cybersecurity Company Checkpoint has discovered that the video-sharing app Tiktok had two…
Travelex Cyber Attack hackers demanding £4.6M for 5GB data
A Cyber Attack made on eve of the New Year 2020 on the database of Travelex Foreign Exchange is again hitting the news headlines – mainly due to the demands of hackers. Reports are in that the hackers who…
Which security certification is for you (if any)
It is hard to look at an information security job posting without seeing some certifications desired. Some make sense and others not so much. I have looked at junior helpdesk positions asking for CISSP, and some of the roles at…
All I want for Christmas is secure IoT gifts!
The holiday season is upon us once more, and in that last-minute scramble to find presents for your loved ones, you may be searching for some more slightly left field ideas. Well, fear not! Our Internet of Things (IoT) gift…
Texas and Las Vegas become victims to Iran Cyber Attacks
As the world is expecting a World War 3 by this month-end between Iran and North America, Garvin Bushell, Vice President of Cyber World Institute thinks that the war will happen not with guns and bullets, but only through cyberattacks…
Accenture to acquire Symantec Cyber Security Business
Accenture, the IT services provider from Ireland has fairly announced yesterday that it is all set to acquire Symantec’s Cyber Security Business from Broadcom Inc soon. However, the financial terms of the deal and when the deal will be closed…
Cloud Security giant Cloudflare to acquire Browser Security startup S2 Systems
Cloudflare, a cloud security offering platform know to protect over 22 million websites around the world has announced that it is going to acquire Browser security startup S2 Systems from Kirkland, Washington for an undisclosed amount. In general, the…