Balancing the Sharing of Information

CyberSecurity Journal

Subscribe to CyberSecurity Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get CyberSecurity Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Who is accountable for SSH-related, key-based access in your organization? In many enterprises, this is not clear, leading to assumptions that leave you vulnerable to attack and compliance violations as well. This article will address the challenge of SSH user key-based access from the perspective of compliance. It's all about access control. All the regulations, laws and frameworks exist to ensure, at a minimum, that protected data (PII, ePHI, credit card data, etc.) has authorized access. It doesn't matter whether that access is being requested by a machine, admin or business user. The fact is that: Oversight and control are sorely lacking in many organizations. They do not have visibility into SSH user key-based trusts or monitoring capabilities. They lack processes for provisioning ownership, revocation and rotation of keys. There is no ownership of the access b... (more)

[video] #IoT Security with @SecureChannels | @ThingsExpo #BigData #AI #M2M

"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Internet of @ThingsExpo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Download Show Prospectus ▸ Here The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researcher... (more)

Thwarting Ransomware Attacks | @CloudExpo #BigData #ML #Cybersecurity

Having an Actionable Disaster Recovery Plan Is Crucial in Thwarting Ransomware Attacks As we have seen over and over again, a new wave of ransomware attacks has been plaguing large parts of Europe over the last couple of weeks. While the affected individuals and organizations are struggling with the very tangible business impact of the loss of revenue and operations, it's critical to step back and review what else one could do to mitigate and minimize the damage from such attacks in the future. Not everyone seems to be agreeing on the exact name of the attack - however this particular strain is apparently from a family of attacks that uses EternalBlue, an exploit developed by NSA, along with an MS Office / WordPad vulnerability discovered earlier this year. While the previous ransomware attack was known as WannaCry, this latest attack goes by several names - Petya... (more)

Network Security Today | @CloudExpo #Cloud #AI #SDN #Security #Analytics

In its 2017 State of Malware Report, Malwarebytes Labs recorded a 267 percent increase in ransomware between January 2016 and November 2016, with over 400 different variants in total. The report noted that while malware authors mostly relied on ransomware to make the bulk of their revenues, there was an increase in ad fraud as well. Botnets and mobile malware also continue to expand and evolve. The report predicts that until IoT devices become secure out of the box, botnets will get even bigger and pose an even greater threat to the internet - and any company connected to it. Financial services organizations are facing a relentless and determined cyber assault. Many recent factors have converged to create greater complexity and threat opportunity in the network, undermining the effectiveness of security prevention solutions. Bring Your Own Device (BYOD) can act as a... (more)

Mistakes Retailers Make in Digital Transformation | @ThingsExpo #IoT #M2M #DigitalTransformation

A key challenge that retailers face today is the difficulty of accurately judging where they are on the digital maturity curve relative to their competitors. There appears to be little expertise in making this assessment; for example, 79% of digital leaders don't know they are ranked as leaders, and only 56% of retailers ranked as average in our study believe they are at this level. The other 44% in the average category mistakenly believe they are either leaders or laggards. The lack of competitive clarity makes it even more difficult to develop an effective competitive strategy. Our research suggests that retailers' plans reflect neither self-awareness nor a realistic idea of what it will take to catch up or leapfrog their competitors in this highly competitive space. Namely, factors such as online sales penetration, business performance, attitudes about digital, pl... (more)

[session] A Live Hack Simulation | @CloudExpo @VinnyTroia #AI #DX #Security

Know Your Adversary: A Live Hack Simulation Using NSA's Stolen Digital Weapons When NSA's digital armory was leaked, it was only a matter of time before the code was morphed into a ransom seeking worm. This talk, designed for C-level attendees, demonstrates a Live Hack of a virtual environment to show the ease in which any average user can leverage these tools and infiltrate their network environment. This session will include: An overview of the Shadbrokers NSA leak situation A review of the first iteration of the malware - lifecycle, how it was stopped, etc. A review of iterations of the malware Some states on machines still accessible (via Shodan stats) In his session at 20th Cloud Expo, Vinny Troia, CEO of NightLion Security, will also include a live hack simulation. This will be pre-recorded but he will walk the audience through what is happening. He will cov... (more)

Insource or Outsource the SOC | @CloudExpo #AI #SOC #Security #Analytics

These days attacks are becoming more sophisticated and more common. Mobile devices, cloud computing and the Internet of Things have increased the number of access points that must be secured. To complicate matters, CISOs are been directed to secure system without compromising the seamless experience that customers expect across channels, and if the organization is in a regulated industry, compliance issues likely increase the team's workload. To best detect threats and respond to incidents quickly, many organizations decide they need a security operations center to provide proper protection and continuous prevention. Then they must decide whether to build an internal Security Operations Center (SOC) or outsource. Advantages and Disadvantages of an Internal SOC The advantages of building an internal SOC include: A dedicated staff that knows the particular environment a... (more)

How to Turn Your Microwave into a Camera | @ThingsExpo #IoT #M2M #Security

You can turn a microwave into a camera and I’ll teach you how in a minute, but before I do, let me share this news item. In a recent interview with a reporter from the Bergen Record, Kellyanne Conway was asked about surveillance. She responded: “There are many ways to surveil each other now, unfortunately. There was an article this week that talked about how you can surveil someone through their phones, certainly through their television sets, any number of different ways. And microwaves that turn into cameras, etc. So we know that that is just a fact of modern life.” On its face, her statement about “microwaves that turn into cameras, et cetera” is ridiculous. It reminds me of the late Sen. Ted Stevens’ famous “Tubes” speech. I went right after “Uncle Ted” for his techno–faux pas, but even then, there were bigger issues to consider. It would be exceptionally easy ... (more)

Big Security for Small Businesses

In the world of information security, small businesses and the security needs of small businesses are often overlooked, particularly in the realm of application security. When looking at the investment required to build a robust application security program, it really doesn't make sense financially. For example, an "enterprise" scanning tool, combined with the required hosting infrastructure, salary for a security specialist, and for the sake of argument, tack on static analysis, the total cost will easily exceed $120,000/year, which is decidedly cost prohibitive for a lot of smaller companies. This presents a significant problem due to the fact that as an attacker, well, hacking the little guys is easy. Simply put, when it comes to handling attacks and incidents, small companies are at a significant disadvantage as they frequently lack a dedicated security team, le... (more)

Why Healthcare IT Teams Love Intelligent Deception | @CloudExpo #Cloud #Cybersecurity

The healthcare industry is not immune from today's relentless wave of cyberattacks. Cyber theft of protected health information (PHI) is on the rise, and health organizations understand that 100 percent prevention of attacks is not realistic. According to Ponemon Institute's Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data report, nearly 90 percent of all healthcare organizations have suffered at least one data breach in the last two years. According to another report, 88 percent of ransomware attacks in Q2 2016 were on healthcare entities. Traditional prevention and detection techniques are falling short, and healthcare IT professionals are scrambling for new approaches that can more effectively detect attacks and mitigate the growing risks and damage. Emerging on the scene, deception-based solutions offer a proven way to stop attackers in the... (more)

What Is Ransomware and How Cloud Security Mitigates It | @CloudExpo #Cloud #Security #MachineLearning

What Is Ransomware and How Cloud Security Mitigates It Ransomware attacks escalated dramatically in 2016. In fact, there was a 300 percent increase in ransomware attacks last year, according to the FBI, to an average of 4,000 attacks a day, up from 1,000 ransomware attacks a day in 2015. What's more, organizations are targeted more frequently than individuals because they generate a much bigger potential payoff. Ransomware has become a profitable criminal enterprise that continues to change and grow. Managed Service Providers often assist clients with data restoration to avoid the downtime that can be caused by a ransomware attack. They also work with clients to improve their security posture overall so they can avoid ransomware damage. Here's what your organization needs to know about ransomware and how cloud computing can help protect your organization. What is r... (more)