Wednesday 31 May 2017

UK issues record data protection fines in the past year

The UK was one of the most active regions for regulatory enforcement action in Europe last year in terms of fines and enforcement notices issued over data protection

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419888/UK-issues-record-data-protection-fines-in-the-past-year


from Tumblr http://zoehamilton671.tumblr.com/post/161297583465
via Zoe Hamilton

Cisco and IBM are now partners in a historic cybersecurity move

Cisco and IBM join forces in historic cybersecurity partnership

Cisco and IBM announced a historic partnership today which is built on the foundation of fighting the war against cyber criminals. The two tech giants together have formed a wall that is instilling fear amongst criminals.

While the technology of the two giants will be combined together to form a stronger cyber security infrastructure, it will also bring with it a host of cyber security forces under one roof from both the companies. After all the two tech giants are two of the most powerful companies with almost 40 security acquisitions under their belt.

Both IBM and Cisco with their aggressive cyber security startup acquisitions have enabled a steady flow of high-end talent in the security industry. Now, this immense talent will be joining forces to fight back forces that helped release deadly attacks like the recent Wannacry ransomware.

Read more details 

The post Cisco and IBM are now partners in a historic cybersecurity move appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/cisco-ibm-now-partners-historic-cybersecurity-move/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/161290278930
via Zoe Hamilton

Silk Road Creator Ross Ulbricht Loses His Life Sentence Appeal

Silk Road Creator Ross Ulbricht Loses His Life Sentence Appeal
An appellate court puts the final seal on Ulbricht’s life sentence, rejecting arguments about corrupt investigators and the injustice of his harsh sentence. The post Silk Road Creator Ross Ulbricht Loses His Life Sentence Appeal appeared first on WIRED.

from WIRED https://www.wired.com/2017/05/silk-road-creator-ross-ulbricht-loses-life-sentence-appeal/
from Tumblr http://zoehamilton671.tumblr.com/post/161283917965
via Zoe Hamilton

WannaCry shows validity of risk-based security, says RSA head

WannaCry and other recent cyber attacks underline the importance of adopting a risk-based approach to security, says RSA president

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419870/WannaCry-shows-validity-of-risk-based-security-says-RSA-head


from Tumblr http://zoehamilton671.tumblr.com/post/161281931400
via Zoe Hamilton

Security Think Tank: Key things to consider to block malicious email attachments

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Key-things-to-consider-to-block-malicious-email-attachments


from Tumblr http://zoehamilton671.tumblr.com/post/161277418450
via Zoe Hamilton

Shadow Brokers prepares zero-day subscription service

Businesses may face an onslaught of zero-day attacks soon as the group that leaked the NSA exploits used in the WannaCry ransomware attacks prepares to release more stolen code

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419847/Shadow-Brokers-prepares-zero-day-subscription-service


from Tumblr http://zoehamilton671.tumblr.com/post/161274023925
via Zoe Hamilton

Tuesday 30 May 2017

Cybersecurity businesses are getting busy, guess why?

are cybersecurity businesses taking advantage of the wannacry ransomware attack?

If you haven’t heard already, last 2 weeks have been chaotic in the business world because of the Wannacry malware attack that took down as many as 200,000 machines in just a few days.

Now some cybersecurity companies are cashing on the attack by raising the prices of their services because right now the demand for cyber security is so high that it is almost impossible for businesses to not seek out help from professionals.

But do businesses really need to rely on cyber security companies or should they be more concerned about their own cybersecurity culture inside the business?

read more details

The post Cybersecurity businesses are getting busy, guess why? appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/cybersecurity-businesses-getting-busy-guess/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/161243949955
via Zoe Hamilton

Saturday 27 May 2017

Security News This Week: Bug Bounties Pay But Piracy Doesn’t

Security News This Week: Bug Bounties Pay But Piracy Doesn’t
Each weekend we round up the news stories that we didn’t break or cover in depth but that still deserve your attention. The post Security News This Week: Bug Bounties Pay But Piracy Doesn’t appeared first on WIRED.

from WIRED https://www.wired.com/2017/05/security-news-week-bug-bounties-pay-piracy-doesnt/
from Tumblr http://zoehamilton671.tumblr.com/post/161127498815
via Zoe Hamilton

Friday 26 May 2017

Understanding the economic value of your personal data

Your personal data is worthless – it’s only when it’s processed by the Facebooks or Googles of this world that it has business value

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Understanding-the-economic-value-of-your-personal-data


from Tumblr http://zoehamilton671.tumblr.com/post/161103876475
via Zoe Hamilton

Security Think Tank: Employees are one of the greatest defences

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Employees-are-one-of-the-greatest-defences


from Tumblr http://zoehamilton671.tumblr.com/post/161093662675
via Zoe Hamilton

People can be strongest link in cyber security, says NCSC

People are often seen as the weakest link when it comes to cyber security, but that must change, says the National Cyber Security Centre

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419646/People-can-be-strongest-link-in-cyber-security-says-NCSC


from Tumblr http://zoehamilton671.tumblr.com/post/161093662315
via Zoe Hamilton

EternalRocks author throws in the towel after media attention

Security researcher who discovered worm that could have bigger impact than WannaCry says the author seems to have given up

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419637/EternalRocks-author-throws-in-the-towel-after-media-attention


from Tumblr http://zoehamilton671.tumblr.com/post/161093662215
via Zoe Hamilton

Thursday 25 May 2017

Russian Hackers Are Using ‘Tainted’ Leaks To Sow Disinformation

Russian Hackers Are Using ‘Tainted’ Leaks To Sow Disinformation
A group of security researchers present the most systematic analysis yet showing Russian hackers mix fakes in with their hacked revelations. The post Russian Hackers Are Using ‘Tainted’ Leaks To Sow Disinformation appeared first on WIRED.

from WIRED https://www.wired.com/2017/05/russian-hackers-using-tainted-leaks-sow-disinformation/
from Tumblr http://zoehamilton671.tumblr.com/post/161061934050
via Zoe Hamilton

Cybersecurity Eccentric series ‘The Wolf’ Returns for season 2

Cybersecurity eccentric show ‘The Wolf’ returns for season 2

The popular cyber security eccentric series by HP ‘The Wolf’ is coming back for a second season. When the first season was released, everyone wondered if we have finally reached the zenith of entertainment that is scripted.

Christian Slater was chosen as the lead of the show in which he was called Mr.Robot who would hack operating systems using his phone. Now Slater is back and the teaser of the series show him sitting on boat messing with people’s health records. The show is all set to premiere at Cannes.

Read more details 

The post Cybersecurity Eccentric series ‘The Wolf’ Returns for season 2 appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/cybersecurity-eccentric-series-wolf-returns-season-2/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/161059909520
via Zoe Hamilton

Has Microsoft Bought Israeli Cybersecurity Firm Hexadite?

Microsoft has reportedly bought Israeli cybersecurity startup Hexadite

American computing giant Microsoft has reportedly purchased the Israeli cyber security startup Hexadite for a massive $100 million. The website Calcalist which is available in only Hebrew language reported the news today.

If the report is indeed true, then this will be the latest purchase of acquisitions of Israeli cyber-security companies that Microsoft has recently started showing significant interest in.

Hexadite was originally formed back in 2014 by Tel Aviv and now has a headquarter in Boston. They specialize in mitigating damage to systems by investigating cyberattacks

Read more details

The post Has Microsoft Bought Israeli Cybersecurity Firm Hexadite? appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/microsoft-bought-israeli-cybersecurity-firm-hexadite/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/161059908530
via Zoe Hamilton

Mobile users’ expectations are sky high, says Gemalto

Consumers have extremely high expectations for rapid mobile development in the coming years, according to a Gemalto report

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419567/Mobile-users-expectations-are-sky-high-says-Gemalto


from Tumblr http://zoehamilton671.tumblr.com/post/161059399795
via Zoe Hamilton

UK businesses urged to prepare for GDPR

With one year to the compliance deadline, the Information Commissioner’s Office has urged UK firms to seize the business benefits of being GDPR-ready

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419554/UK-businesses-urged-to-prepare-for-GDPR


from Tumblr http://zoehamilton671.tumblr.com/post/161059278900
via Zoe Hamilton

Security Think Tank: Minimise malware risks through education, process and technology

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Minimise-malware-risks-through-education-process-and-technology


from Tumblr http://zoehamilton671.tumblr.com/post/161057550170
via Zoe Hamilton

GDPR: One year to compliance and opportunity

With a year to go before all companies dealing with European Union citizens’ data have to comply with new EU data protection rules, the focus for many is on compliance, but some believe business should be the top priority

from ComputerWeekly: IT security http://www.computerweekly.com/feature/GDPR-One-year-to-compliance-and-opportunity


from Tumblr http://zoehamilton671.tumblr.com/post/161057550000
via Zoe Hamilton

Wednesday 24 May 2017

Finding customer data is big hurdle to meeting GDPR right to erasure

Global organisations do not know where customer data is stored and use unreliable data removal methods to erase content, a study shows

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419459/Finding-customer-data-is-big-hurdle-to-meeting-GDPR-right-to-erasure


from Tumblr http://zoehamilton671.tumblr.com/post/161047004605
via Zoe Hamilton

How get your workforce to take cybersecurity seriously

How to make sure your workforce takes cyber security threats seriously

Common sense is only limited and for you to make sure that things are taken seriously, you will have to go beyond the basics and make sure that best practices in cybersecurity are being taken seriously by your workforce.

When it involves cyber security, big IT security companies tend to make sure that at least 20 of their employees are well prepared to fight back security attacks. They tell them that it is a matter of life and death where winning means the company stays in business and continues to flourish.

Cyber criminals are especially targeting employees at companies that don’t take cyber security very seriously. Don’t forget that most malware attacks are successful thanks to the work force that never pays attention to what is scamming them. They just open links and let whatever there is fool them.

Cyber criminals are now also using social media to perform these scam attacks which employees never realize that they are dangerous. The results are that a malware attack spreads across your network.

So how do you prepare them to fight back? How do you make sure that the thousands you are spending on their training are actually making any sense to them and that they are actually taking things seriously?

Here are a couple of strategies you can use to make sure your cyber security message sticks with your employees.

  • Don’t use scare tactics, your goal should be to build a culture inside your company that promotes cyber security in all departments. You need to treat this like an inside campaign that should be persuaded.
  • Start with small and informative graphics and videos that your employees will actually enjoy watching while learning a thing or two about the threats. A message said in casual tone is often remembered for a long time.
  • Don’t try to send out large letters that are uninspiring and boring for the staff to read. Chances are that no one in your team will actually read.

Your aim should be to change the employee behavior and not force things upon them. If you successfully create a cybersecurity culture, your employees will be more vigilant than ever.

The post How get your workforce to take cybersecurity seriously appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/get-workforce-take-cybersecurity-seriously/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/161025381080
via Zoe Hamilton

Identity, authentication and authorisation becoming risk-led

Identity management, and authentication and authorisation governance are shifting away from being purely IT initiatives, according to RSA

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419437/Identity-authentication-and-authorisation-becoming-risk-led


from Tumblr http://zoehamilton671.tumblr.com/post/161024684735
via Zoe Hamilton

Twenty years of online banking has increased financial awareness

Online banking is helping people manage their finances better and reduce their debt as a result

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419428/Twenty-years-of-online-banking-has-increased-financial-awareness


from Tumblr http://zoehamilton671.tumblr.com/post/161024684415
via Zoe Hamilton

Security Think Tank: User education key to blocking email-borne malware

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-User-education-key-to-blocking-email-borne-malware


from Tumblr http://zoehamilton671.tumblr.com/post/161024684560
via Zoe Hamilton

Interview: Nick Bleech, head of information security, Travis Perkins

Last year Travis Perkins implemented Splunk to help it to respond more quickly to security threats. Now, the business is looking into machine learning and a single customer view

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419263/Interview-Nick-Bleech-head-of-information-security-Travis-Perkins


from Tumblr http://zoehamilton671.tumblr.com/post/161016878150
via Zoe Hamilton

US retailer Target agrees $18.5m data breach settlement

A breach settlement with 47 US states has taken the cost of the 2013 data breach at retailer Target to more than $220m

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419419/US-retailer-Target-agrees-185m-data-breach-settlement


from Tumblr http://zoehamilton671.tumblr.com/post/161016877985
via Zoe Hamilton

Tuesday 23 May 2017

Mobile C-level executives are major risk to business security

C-suite executives logging on to unsecured public Wi-Fi hotspots seem to present one of the biggest security risks to enterprise networks

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419372/Mobile-c-level-executives-are-major-risk-to-business-security


from Tumblr http://zoehamilton671.tumblr.com/post/160988240160
via Zoe Hamilton

Security Think Tank: 10 control areas to mitigate against malware attacks

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-10-control-areas-to-mitigate-against-malware-attacks


from Tumblr http://zoehamilton671.tumblr.com/post/160988111135
via Zoe Hamilton

Almost a quarter of UK and US firms likely to miss GDPR deadline

Some 24% of companies polled in the UK and US expect to miss the GDPR compliance deadline of 25 May 2018

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419346/Almost-a-quarter-of-UK-and-US-firms-likely-to-miss-GDPR-deadline


from Tumblr http://zoehamilton671.tumblr.com/post/160988111010
via Zoe Hamilton

The Silk Road Creator’s Life Sentence Actually Boosted Dark Web Drug Sales

The Silk Road Creator’s Life Sentence Actually Boosted Dark Web Drug Sales
A new study raises questions about the deterrence value of harsh sentencing for dark web crimes. The post The Silk Road Creator’s Life Sentence Actually Boosted Dark Web Drug Sales appeared first on WIRED.

from WIRED https://www.wired.com/2017/05/silk-road-creators-life-sentence-actually-boosted-dark-web-drug-sales/
from Tumblr http://zoehamilton671.tumblr.com/post/160986123810
via Zoe Hamilton

EternalRocks worm combines seven leaked NSA attack tools

Hard on the heels of the WannaCry ransomware attacks, a researcher has found a worm that combines four NSA exploits and associated attack tools, including EternalBlue used by WannaCry

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419337/EternalRocks-worm-combines-seven-leaked-NSA-attack-tools


from Tumblr http://zoehamilton671.tumblr.com/post/160980203930
via Zoe Hamilton

Monday 22 May 2017

Security Think Tank: Malware is sneaky

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Malware-is-sneaky


from Tumblr http://zoehamilton671.tumblr.com/post/160950973015
via Zoe Hamilton

Middle East largely unscathed after WannaCry cyber attack

The impact of WannaCry on the Middle East was reduced due to the attack falling on a weekend, but it is a stark warning

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419246/Middle-East-largely-unscathed-after-WannaCry-cyber-attack


from Tumblr http://zoehamilton671.tumblr.com/post/160950972680
via Zoe Hamilton

Windows 7 accounts for most WannaCry infections

Statistics show that computers running Windows 7 accounted for the biggest proportion of machines infected with the WannaCry ransomware, while NHS suppliers are blamed for hampering patching by NHS trusts

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419253/Windows-7-accounts-for-most-WannaCry-infections


from Tumblr http://zoehamilton671.tumblr.com/post/160950971550
via Zoe Hamilton

Is cybersecurity a threat to our interconnected future?

how can we protect ourselves using cybersecurity

With the latest and most devastated ransomware attack in history, ‘Wannacry’ security experts are saying that cybersecurity could be a threat to our interconnected future if not taken care of on time.

Wannacry took down more than 200,000 machines around the world and the next attack could be anywhere in the future. What’s even worst is that big organizations are not prepared to face another attack on such a large scale.

Wannacry ransomware is also capable of taking over things that are connected to the internet of things. This means that any appliance in your house connected to the internet can be taken over and locked by a cyber criminal.

For now protecting your systems is the first priority which can only be done by making yourself aware of cyber security and following the many guidelines it provides to prevent a future attack.

Read more details 

The post Is cybersecurity a threat to our interconnected future? appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/cybersecurity-threat-interconnected-future/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/160949460405
via Zoe Hamilton

Launceston will now support cyber security innovation

new innovations are coming to cybersecurity

Launceston is known for innovation and is now overseeing an establishment of a cyber security hub in the city. The lead discussion of the proposal took place on Monday during a council meeting.

Alderman Darren Alexander spoke to the council saying that they should be taking advantage of the cyber security growth network set by the federal government of Australia.

The establishment of a growth center is going to play a key role in the government’s $1.1 billion national innovation and science agenda recently announced.

The government will be allocating $31.9 million to fund the growth center till 2020.

Read more details 

The post Launceston will now support cyber security innovation appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/launceston-will-now-support-cyber-security-innovation/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/160949318815
via Zoe Hamilton

Friday 19 May 2017

McAfee researchers test WannaCry recovery method

Although there is evidence that some victims of the WannaCry ransomware attack on 12 May have paid the attackers, there is no evidence that they are getting their data back

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419177/McAfee-researchers-test-WannCry-recovery-method


from Tumblr http://zoehamilton671.tumblr.com/post/160844697320
via Zoe Hamilton

Command and control communications key to detecting threats

Malware command and control (C&C) communications are key to detecting advanced threats, according to a security researcher

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419162/Command-and-control-communications-key-to-detecting-threats


from Tumblr http://zoehamilton671.tumblr.com/post/160844697130
via Zoe Hamilton

Interview: Claude Moraes, MEP and EU Civil Liberties Committee chair

Claude Moraes, chair of the European Parliament’s Civil Liberties, Justice and Home Affairs Committee shares his views, concerns, reservations about EU-US data transfers, encryption and Brexit

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419147/Interview-Claude-Moraes-MEP-and-EU-Civil-Liberties-Committee-chair


from Tumblr http://zoehamilton671.tumblr.com/post/160844696935
via Zoe Hamilton

Hackers Are Trying to Reignite WannaCry With Non-Stop Botnet Attacks

Hackers Are Trying to Reignite WannaCry With Non-Stop Botnet Attacks
The “sinkhole” domain that’s held the ransomware in check is coming under repeated denial-of-service attacks. The post Hackers Are Trying to Reignite WannaCry With Non-Stop Botnet Attacks appeared first on WIRED.

from WIRED https://www.wired.com/2017/05/wannacry-ransomware-ddos-attack/
from Tumblr http://zoehamilton671.tumblr.com/post/160843917210
via Zoe Hamilton

Sweden Drops Assange’s Rape Case—But He’s Not Walking Free

Sweden Drops Assange’s Rape Case—But He’s Not Walking Free
The Swedish decision only brings into focus Assange’s core conflict with the US government. The post Sweden Drops Assange’s Rape Case—But He’s Not Walking Free appeared first on WIRED.

from WIRED https://www.wired.com/2017/05/sweden-drops-assanges-rape-case-hes-not-walking-free/
from Tumblr http://zoehamilton671.tumblr.com/post/160840794350
via Zoe Hamilton

Neustar launches international security council

Sharing information in the face of threats such as WannaCry is crucial for organisations to improve their cyber security capability, according to Neustar, which is making it easier to do

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419140/Neustar-launches-international-security-council


from Tumblr http://zoehamilton671.tumblr.com/post/160835899250
via Zoe Hamilton

Thursday 18 May 2017

A WannaCry Flaw Could Help Some Windows XP Victims Get Files Back

A WannaCry Flaw Could Help Some Windows XP Victims Get Files Back
A French researcher says he’s found a tool that could help some fraction of victims running that older Windows version. Just don’t reboot! The post A WannaCry Flaw Could Help Some Windows XP Victims Get Files Back appeared first on WIRED.

from WIRED https://www.wired.com/2017/05/wannacry-flaw-help-windows-xp-victims-get-files-back/
from Tumblr http://zoehamilton671.tumblr.com/post/160812542755
via Zoe Hamilton

Strong cyber security posture reduces impact of breaches

There is a direct correlation between data breaches and falls in stock prices, but the impact is lighter on companies with good cyber security, a study has revealed

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419072/Strong-cyber-security-posture-reduces-impact-of-breaches


from Tumblr http://zoehamilton671.tumblr.com/post/160806537035
via Zoe Hamilton

Life After WannaCry: Prevent Future Attacks With These Strategies

How to prevent attacks like WannaCry in the future

The ransomware attack that took place on Friday, the infamous WannaCry took over as many as 200,000 computers in 150 countries across the world. Although experts still don’t know the complete details of the attack, it is clear that some big organizations were victimized in the attack while some suffered severe losses.

After the attack, cyber security professionals are warning not to meet the demands of the Wannacry ransomware. They are also recommending that companies, businesses, and organizations start preparing to prevent future attacks by adding new strategies like IT risk management in general.

If you haven’t been victimized yet, you shouldn’t rest easy. The attacks are going to come back and they will not leave you alone if you are not prepared. Here are the strategies you can start implementing today to resist the attack.

Create a digital culture

Now it is more than ever necessary to look at your IT team and see if it lacks talent. You need to make sure that you create a good IT culture in your company where normal employees are also made aware of how dangerous these cyber crimes have become.

Set up parameters to detect intrusive behavior

Wannacry and other malware depend largely on human error. Employees often give away chunks of private info on the internet without thinking twice. Set up an effective risk management practice that teaches the employees about how to find out about scams over the internet and through email. If you make it hard for the hackers to obtain data, they’ll be helpless. Collaborate with IT professionals to set up defensive walls that detect scams before they even reach your employees.

Create a powerful IT infrastructure

To protect critical intellectual property, you must have a powerful IT infrastructure. Store all your data on high-end network devices which are generally created to prevent attacks from normal cyber criminals or malware. Make sure you also protect your data if you are sharing it with a third party.

The post Life After WannaCry: Prevent Future Attacks With These Strategies appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/life-wannacry-prevent-future-attacks-strategies/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/160804598095
via Zoe Hamilton

WannaCry biggest incident to date for National Cyber Security Centre

The WannaCry ransomware attack that started on 12 May 2017 is the biggest single incident that the new UK National Cyber Security Centre (NCSC) has faced

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419069/WannaCry-biggest-incident-to-date-for-National-Cyber-Security-Centre


from Tumblr http://zoehamilton671.tumblr.com/post/160798849795
via Zoe Hamilton

Wednesday 17 May 2017

Organised crime exploiting new technology

European law enforcement is to focus on collaborating with industry around cyber crime as organised crime groups increasingly exploit new technologies, according to a regional crime threat report

from ComputerWeekly: IT security http://www.computerweekly.com/feature/Organised-crime-exploiting-new-technology


from Tumblr http://zoehamilton671.tumblr.com/post/160781259775
via Zoe Hamilton

Business not taking cyber security seriously enough, says Dido Harding

Most businesses are still not taking cyber security seriously enough, according to the former CEO of TalkTalk, which suffered a major data breach in 2015

from ComputerWeekly: IT security http://www.computerweekly.com/news/450419002/Business-not-taking-cyber-security-seriously-enough-says-Dido-Harding


from Tumblr http://zoehamilton671.tumblr.com/post/160770869050
via Zoe Hamilton

Experts are warning businesses not to fulfill the demands of WannaCry

experts are warning businesses to not meet the demands of Wannacry

Cyber security professionals are warning businesses and organizations to not meet the demands of cyber criminals who unleashed the latest most deadly malware attack ‘WannaCry’ that took over hundreds and thousands of machines globally in mere hours.

If you’re not familiar with ransomware, it is a kind of malware that kidnaps your data and then asks money in return. Hackers will demand a set amount and will give you a time limit to pay the ransom. Failure to pay the ransom on time will result in complete deletion of data.

Ransomware is so strong that it cannot be decrypted. You will have to pay the amount or keep a backup.

Read more details

The post Experts are warning businesses not to fulfill the demands of WannaCry appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/experts-warning-businesses-not-fulfill-demands-wannacry/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/160770239395
via Zoe Hamilton

11 Year old boy hacked cyber security professionals Bluetooth devices to control teddy bear

11 year old boy took control of a robotic teddy bear

An 11-year-old boy shocked an audience consisting of cyber security experts by hacking into their devices with Bluetooth to control a robot teddy bear. With this, he proved that interconnected smart toys can easily be weaponized.

Reuben Paul is just in 6th grade in an Austin, Texas-based school and his toy teddy bear is the reason why so many people were wowed that day.

Whatever he did, it does confirm that whether it’s a plane or a car, anything that is connected to the internet of things can be manipulated and easily hacked to use against its owner.

Read more details 

The post 11 Year old boy hacked cyber security professionals Bluetooth devices to control teddy bear appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/11-year-old-boy-hacked-cyber-security-professionals-bluetooth-devices-control-teddy-bear/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/160770239100
via Zoe Hamilton

Tuesday 16 May 2017

Financial services CISOs prioritise GDPR – but their service providers might not have

Survey shows 52% of CISOs working in the finance sector have made compliance with the EU’s General Data Protection Regulation an investment priority

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418886/Financial-services-CISOs-prioritise-GDPR-but-their-service-providers-might-not-have


from Tumblr http://zoehamilton671.tumblr.com/post/160734813815
via Zoe Hamilton

Ransomware: Protect yourself with good backup and cloud policies

More ransomware attacks are likely. The best way to protect against them is to have up-to-date in-house backups and to ensure cloud backups are adequately protected and available

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418882/Ransomware-Protect-yourself-with-good-backup-and-cloud-policies


from Tumblr http://zoehamilton671.tumblr.com/post/160734813655
via Zoe Hamilton

What is the best investment you can make in cybersecurity today?

How to invest in cybersecurity with immediate results

The scale and complexity of cyber crimes are rising at an alarming rate but unfortunately, on the other side, the general lack of cyber security awareness is dropping in organizations even for those who are spending thousands on high-end technology. What investors fail to realize is that there is no such high-end technology that can help them defend against rising threats from cyber criminals.

So what is the best investment you can make in cyber security as a business?

Spending millions on technology will make you feel like you are doing the right thing and it will make you safe. But in reality, major cyber security threats aren’t prevented using high-end technology, they are prevented by leveraging the human brain, after all, these attacks are being constructed by humans.

Every organization has a number of employees who have no idea what cyber security is and which results in human error. Cyber criminals are targeting these people by scamming them into opening malicious software. So the best investment you can make today is indeed on cyber security awareness amongst your company’s employees.

For all kinds of cyber attacks, the first line of defense is none other than the leaders and employees themselves who are a part of an interconnected chain of a network. These are the people who if knew how to prevent an attack would never let one sneak by.

Yet organizations are failing to realize that this is indeed the biggest loophole in their cyber security defense strategy.

So as a company, you have to realize that spreading awareness is of number one priority. Before you set yourself to buy complex technology thinking that it will effectively and automatically defend against cyber attacks, look at your workforce and see if they even know how to best use that technology.

The post What is the best investment you can make in cybersecurity today? appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/best-investment-can-make-cybersecurity-today/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/160734289885
via Zoe Hamilton

Qatar’s Milaha Maritime and Logistics upgrades firewall to ensure global network performance

Middle East marine and logistics company has improved its firewall to support global expansion

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418775/Qatars-Milaha-Maritime-and-Logistics-upgrades-firewall-to-ensure-global-network-performance


from Tumblr http://zoehamilton671.tumblr.com/post/160727268360
via Zoe Hamilton

Five steps for business after WannaCry cyber attack

WannaCry reveals some important facts about our dependence on the internet and IT

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Five-steps-for-business-after-WannaCry-cyber-attack


from Tumblr http://zoehamilton671.tumblr.com/post/160727268245
via Zoe Hamilton

Monday 15 May 2017

Global ransomware attack could be long-awaited wake-up call

A failure by many organisations to take cyber security seriously has long been blamed on the lack of a single significant event to shake things up. Does WannaCry fit the bill?

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418816/Global-ransomware-attack-could-be-long-awaited-wake-up-call


from Tumblr http://zoehamilton671.tumblr.com/post/160710319920
via Zoe Hamilton

The WannaCry Ransomware Has a Link to Suspected North Korean Hackers

The WannaCry Ransomware Has a Link to Suspected North Korean Hackers
A Google researcher has identified a telltale chunk of code shared between the ransomware and malware used by suspected DPRK hackers. The post The WannaCry Ransomware Has a Link to Suspected North Korean Hackers appeared first on WIRED.

from WIRED https://www.wired.com/2017/05/wannacry-ransomware-link-suspected-north-korean-hackers/
from Tumblr http://zoehamilton671.tumblr.com/post/160710216450
via Zoe Hamilton

What Is Ransomware? A Guide to the Global Cyberattack’s Scary Method

What Is Ransomware? A Guide to the Global Cyberattack’s Scary Method
Ransomware is malware that locks your keyboard or computer to prevent you from accessing your data until you pay a ransom. The post What Is Ransomware? A Guide to the Global Cyberattack’s Scary Method appeared first on WIRED.

from WIRED https://www.wired.com/2017/05/hacker-lexicon-guide-ransomware-scary-hack-thats-rise/
from Tumblr http://zoehamilton671.tumblr.com/post/160710215945
via Zoe Hamilton

The WannaCry Ransomware Hackers Made Some Real Amateur Mistakes

The WannaCry Ransomware Hackers Made Some Real Amateur Mistakes
Researchers say the worst ransomware epidemic ever is also poorly run, shoddily coded, and barely profitable. The post The WannaCry Ransomware Hackers Made Some Real Amateur Mistakes appeared first on WIRED.

from WIRED https://www.wired.com/2017/05/wannacry-ransomware-hackers-made-real-amateur-mistakes/
from Tumblr http://zoehamilton671.tumblr.com/post/160704394900
via Zoe Hamilton

Stocks of Cybersecurity companies rise after global ransomware attack

A cyber attack on Monday took down 200,000 machines globally

A global ransomware attack that disrupted hospitals, factories, schools, and shops forced the investors on Monday to purchase stocks that would benefit cybersecurity funding by the government agencies and firms.

The attack started spreading across the world on Friday and by the end of Monday, it had locked many computers in about 150 different countries. Now the experts are warning that this attack could come back with a bigger force as more and more employees checked their emails.

According to reports collected by European Union police agency Europol, the attack affected as many as 200,000 machines.

read more details 

The post Stocks of Cybersecurity companies rise after global ransomware attack appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/stocks-cybersecurity-companies-rise-global-ransomware-attack/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/160698649705
via Zoe Hamilton

Cyber-security professionals are gearing up for a new computer virus attack

Cybersecurity professionals are preparing to ward of a new kind of cyber attack

The technique that hackers are using today to disseminate wannacry worm was originally developed by the US National Security Agency.

The wannacry computer virus attack that was witnessed over the weekend was developed by NSA and was never actually meant to be released to the public but several reports are indicating that it was stolen after it was leaked from the NSA by a group known as the Shadow Brokers.

Microsoft has warned businesses and organizations to stop using Windows XP which now does not receive any support from the company if they wish to defend against this new virus obtained by cyber criminals

Read more details 

The post Cyber-security professionals are gearing up for a new computer virus attack appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/cyber-security-professionals-gearing-new-computer-virus-attack/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/160698570905
via Zoe Hamilton

MPs and peers urged not to use personal email as WannaCry spreads

MPs and peers have been warned not to use personal emails on parliamentary Windows computers in the wake of WannaCry ransomware outbreak

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418787/MPs-and-peers-urged-not-to-use-personal-email-as-WannaCry-spreads


from Tumblr http://zoehamilton671.tumblr.com/post/160698332490
via Zoe Hamilton

Attackers have no need of zero-days, breach data shows

Cyber attackers do not have to use previously unseen or extremely sophisticated attacks to bypass defences, analysis of publicly reported breaches in the past year reveals

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418783/Attackers-have-no-need-of-zero-days-breach-data-shows


from Tumblr http://zoehamilton671.tumblr.com/post/160698332120
via Zoe Hamilton

Businesses urged to apply Windows patch to avert WannaCry attacks

Security advisers are urging organisations to patch their Windows systems to avert a possible second wave of an unprecedented, indiscriminate ransomware attack

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418770/Businesses-urged-to-apply-Windows-patch-to-avert-WannaCry-attacks


from Tumblr http://zoehamilton671.tumblr.com/post/160690536795
via Zoe Hamilton

GDPR: a quick start guide

We look at how UK organisations can prepare for the General Data Protection Regulation

from ComputerWeekly: IT security http://www.computerweekly.com/feature/GDPR-a-quick-start-guide


from Tumblr http://zoehamilton671.tumblr.com/post/160690536735
via Zoe Hamilton

Friday 12 May 2017

The most important questions business should be asking about cybersecurity

What are the important questions organizations should be asking about cybersecurity?

Technology that is powering work in big organizations is becoming powerful but they are not alone. Hackers and cyber criminals are also increasing their skills and learning how to work with new and improved technology. Thus businesses are at risk of becoming a victim of cyber crimes. While there are several processes that can help improve the businesses cybersecurity defense, all of their leaders should be thinking about security on a higher level.

There are a few important questions that businesses ask each other and try to find a solution. Some of these most important questions are listed below:

Should a business be concerned about who hacked them?

When businesses are hacked or become a victim of a major cybercrime, the first question comes to mind is who hacked them and who are they associated with. But is it really necessary for IT professionals in big businesses to ask this question?

The answer is absolutely yes. If a business cannot find out who or what attacked them, they cannot prevent the same attack in the future. They must learn at least about the dynamics of the attack and the intention of the hacker. What if they are being targetted by competition? What if hackers are after something very specific? Sometimes delving deeper into investigation can reveal a lot about the techniques that were used to hack your important data. Thus you a business may be able to better defend themselves by learning critical cyber security techniques.

To find out who hacked a business, the best solution is to track the malware. Track their authors and you’ll get a lot of information that points towards what could be coming next

What can be done about hackers who successfully penetrated a business’s defense against cyber attacks?

To begin, a business can use sophisticated tools to find out how strong their defense is. They can even hire cybersecurity professionals who can try to find vulnerabilities in their defense.

Whatever the method is, constantly testing your security is the perfect way to stay up to date with the technology that helps you defend against hackers. It also allows your cyber security professionals to learn new and advanced cyber methods that the hackers may be using to attack you.

The post The most important questions business should be asking about cybersecurity appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/important-questions-business-asking-cybersecurity/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/160590491380
via Zoe Hamilton

NHS hospitals hit by suspected ransomware attack

Hospitals across England are reporting problems with IT systems and some say it is affecting healthcare treatment

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418720/NHS-hospitals-hit-by-suspected-ransomware-attack


from Tumblr http://zoehamilton671.tumblr.com/post/160588223370
via Zoe Hamilton

Five cyber security imperatives for all companies

There are five things all companies should ensure they are doing in terms of cyber security

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418705/Five-cyber-security-imperatives-for-all-companies


from Tumblr http://zoehamilton671.tumblr.com/post/160588095690
via Zoe Hamilton

ICO reports record number of data breaches and fines

The UK privacy watchdog reports that it has dealt with more data breach reports and issued more fines in the past year than ever before

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418692/ICO-reports-record-number-of-data-breaches-and-fines


from Tumblr http://zoehamilton671.tumblr.com/post/160584085440
via Zoe Hamilton

Mixed reaction to Trump’s cyber security executive order

The latest US presidential executive order on cyber security has been met mainly with praise, but critics say there is nothing really new and takes no decisive action

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418684/Mixed-reaction-to-Trumps-cyber-security-executive-order


from Tumblr http://zoehamilton671.tumblr.com/post/160584085340
via Zoe Hamilton

Why smart cities need to become smarter about technology

Cities are experimenting with smarter ways to use technologies to improve the life of citizens, but their projects are fragmented. Is there a better approach?

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418668/Why-smart-cities-need-to-become-smarter-about-technology


from Tumblr http://zoehamilton671.tumblr.com/post/160584085175
via Zoe Hamilton

Thursday 11 May 2017

Allianz is working with car makers for cybersecurity

Allainz working with local manufacturers to improve car cyber security

Allianz Germany is now working with local car manufacturers to bring forward the different vulnerabilities in the systems of vehicles that are electronically powered and can easily be hacked by criminals.

As electronic systems become common in cars, they are becoming an easy target for cyber criminals to hack. According to chief information security officer at Allianz Germany, a research has already been started that will help protect these cars from cyber crimes.

The research was inspired by a public hacking of a jeep Cherokee by security researchers Chris Valasek and Charlie Miller in 2015. Now the company is working to improve the security features of the vehicles.

Read more details 

The post Allianz is working with car makers for cybersecurity appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/allianz-working-car-makers-cybersecurity/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/160555268760
via Zoe Hamilton

Why broadcasters should work together to prevent cyber crime

broadcasting companies need to work together to fight cybercrime

Cybercrime has been there all this time in one form or the other for decades, but the threat it poses today is unlike anything we have seen in the past.  With attackers now increasing in numbers and coming from different regions of the world with different intentions, organizations in the US and around the world are now at a huge risk of an attack with unbearable consequences.

Broadcasting companies may not have been targeted regularly, but that doesn’t mean they are safe from the threats. Actually, they depend a lot on technology to help them broadcast their stream on radio and TV. To avoid becoming a victim, broadcasting companies should come together to fight cyber crime.

Read more details 

The post Why broadcasters should work together to prevent cyber crime appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/broadcasters-work-together-prevent-cyber-crime/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/160555268605
via Zoe Hamilton

Allianz researchers working with car makers on cyber security

Allianz Germany is working with the local car manufacturing industry to highlight the vulnerabilities in the electronics systems of vehicles that can be exploited by criminals

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418602/Allianz-researchers-working-with-car-makers-on-cyber-security


from Tumblr http://zoehamilton671.tumblr.com/post/160545672570
via Zoe Hamilton

Wednesday 10 May 2017

Automation can turn tables on cyber attackers

Security defenders should use automation to turn the tables on attackers, according to the CTO of the US Department of Homeland Security

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418537/Automation-can-turn-tables-on-cyber-attackers


from Tumblr http://zoehamilton671.tumblr.com/post/160518052035
via Zoe Hamilton

Blockchain economy on the horizon

Blockchain technologies will enable many new and disruptive business models than the internet itself, an expert predicts

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418530/Blockchain-economy-on-the-horizon


from Tumblr http://zoehamilton671.tumblr.com/post/160510456105
via Zoe Hamilton

Tuesday 9 May 2017

Blockchain gains momentum in the Middle East

Blockchain is gathering pace in the Middle East, with the United Arab Emirates leading the way

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418470/Blockchain-gains-momentum-in-the-Middle-East


from Tumblr http://zoehamilton671.tumblr.com/post/160503570705
via Zoe Hamilton

The NSA Confirms It: Russia Hacked French Election ‘Infrastructure’

The NSA Confirms It: Russia Hacked French Election ‘Infrastructure’
NSA Director Michael Rogers provides the first US government confirmation that Russia successfully compromised elements of the French election. The post The NSA Confirms It: Russia Hacked French Election ‘Infrastructure’ appeared first on WIRED.

from WIRED https://www.wired.com/2017/05/nsa-director-confirms-russia-hacked-french-election-infrastructure/
from Tumblr http://zoehamilton671.tumblr.com/post/160484062665
via Zoe Hamilton

Experts Whey On How To Fill Up Talent Shortage In Cybersecurity

Have you got the right talent to join a cybersecurity position?

Big organizations and businesses who have been a victim of a cyber attack have a very common complaint that serious talent is lacking in cyber security. Their teams are virtually not prepared and they are blaming the lack of talent whereas if they look around, there is talent available. So where is the shortage coming from?

The need for adding new talent to cyber security teams is a very well documented need. It has been revealed time and time again in reports by industry experts that the global cyber security workforce is indeed lacking in good talent. According to many reports, as many as 1.5 million positions will be unfilled by the end of 2020.

There is a shortage of talent in cyber teams but the talent is there. The real problem is that businesses and organizations are targeting the wrong people for the job. They see traditional tech credentials and based on that fill their positions. For example, someone holding a degree in technology is not someone suitable for a cybersecurity position. This is why so many security certifications are there.

The true potential of a tech expert really shines when they start delving deeper into cybersecurity space by studying further in security based certifications. Their basic education is just a minor step in getting them ready for the world of cyber security out there.

To fill in the gaps in talents, organizations and businesses should start opening up their positions to individuals who have experience and hard cyber security certifications instead of someone holding a Master’s Degree in basic technology.

Cyber security is a vast field and not every IT expert feels comfortable working in the industry that revolves around security. By now everyone should be aware that this industry is vast and it has much different expertise which can only be learned by individuals who are taking specialized courses that teach about the cyber tech.

If ignored, these highly educated personnel who have mastered a field of cyber security can and may turn to the other side of the game.

The post Experts Whey On How To Fill Up Talent Shortage In Cybersecurity appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/experts-whey-fill-talent-shortage-cybersecurity/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/160483458780
via Zoe Hamilton

Cognitive security is the future, says Martin Kuppinger

Modern computing capabilities combined with cognitive technology has huge potential for tackling unknown attack patterns and addressing the security skills shortage, says Martin Kuppinger

from ComputerWeekly: IT security http://www.computerweekly.com/news/450418477/Cognitive-security-is-the-future-says-Martin-Kuppinger


from Tumblr http://zoehamilton671.tumblr.com/post/160482340155
via Zoe Hamilton

Monday 8 May 2017

Is AI The Future of cybersecurity

Artificial Intelligence is the future of cybersecurity

As AI becomes more capable and intelligent, it could become the future of cyber security by fighting back automated and sophisticated social engineered cyber attacks. The same could be said in reverse.

With AI becoming more powerful and accessible, even cyber criminals could use to create a wave of cyber attacks such as data hacks, thefts, and penetrations. So experts believe our best defense against such attacks would be to use AI.

Even today in some large corporations with big cybersecurity budgets are using AI to defend against sophisticated attacks. This points out to a viable future of AI in cyber security which isn’t too far behind now.

Read more details

The post Is AI The Future of cybersecurity appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/ai-future-cybersecurity/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/160454258425
via Zoe Hamilton

Is your common home appliance spying on you?

Is your coffee machine spying on you?

If you thought you’re safe when you shut down your computer or smartphone, then you really need a wake-up call. The latest cyber security defense and offense technology have already been tried and tested on things that may just be used to make a simple cup of coffee.

That’s right, there is a chance that even your coffee machine is spying on you provided that it is connected to the internet of things. If your home appliance can connect to other devices such as your phone or home PC, then it pretty much is open for anyone to use to collect data. You never know your coffee machine may even be recording your routine.

An appliance such as these is commonly seen in corporations because even big corporations need to defend themselves against employees who may turn to whistle blow.

Read more details 

The post Is your common home appliance spying on you? appeared first on Cyber Security Portal.



from Cyber Security Portal https://cybersecurityportal.com/common-home-appliance-spying/
via the Cyber Security Portal… The best place for all Cyber Security news & Updates.
Follow Us:
Twitter: https://twitter.com/JakeCiber
Youtube: https://www.youtube.com/channel/UCBWEkLXPXciwrLGSzCd0Nsw
Facebook: https://www.facebook.com/Cyber-Security-Portal-1541258179514076/
Google +: https://plus.google.com/108872497050256520329/about
from Tumblr http://zoehamilton671.tumblr.com/post/160454257175
via Zoe Hamilton