Balancing the Sharing of Information

CyberSecurity Journal

Subscribe to CyberSecurity Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get CyberSecurity Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

You can turn a microwave into a camera and I’ll teach you how in a minute, but before I do, let me share this news item. In a recent interview with a reporter from the Bergen Record, Kellyanne Conway was asked about surveillance. She responded: “There are many ways to surveil each other now, unfortunately. There was an article this week that talked about how you can surveil someone through their phones, certainly through their television sets, any number of different ways. And microwaves that turn into cameras, etc. So we know that that is just a fact of modern life.” On its face, her statement about “microwaves that turn into cameras, et cetera” is ridiculous. It reminds me of the late Sen. Ted Stevens’ famous “Tubes” speech. I went right after “Uncle Ted” for his techno–faux pas, but even then, there were bigger issues to consider. It would be exceptionally easy ... (more)

What Is Ransomware and How Cloud Security Mitigates It | @CloudExpo #Cloud #Security #MachineLearning

What Is Ransomware and How Cloud Security Mitigates It Ransomware attacks escalated dramatically in 2016. In fact, there was a 300 percent increase in ransomware attacks last year, according to the FBI, to an average of 4,000 attacks a day, up from 1,000 ransomware attacks a day in 2015. What's more, organizations are targeted more frequently than individuals because they generate a much bigger potential payoff. Ransomware has become a profitable criminal enterprise that continues to change and grow. Managed Service Providers often assist clients with data restoration to avoid the downtime that can be caused by a ransomware attack. They also work with clients to improve their security posture overall so they can avoid ransomware damage. Here's what your organization needs to know about ransomware and how cloud computing can help protect your organization. What is r... (more)

[video] #IoT Security with @SecureChannels | @ThingsExpo #BigData #AI #M2M

"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The World's Largest "Cloud Digital Transformation" Event @CloudExpo / @ThingsExpo 2017 New York (June 6-8, 2017, Javits Center, Manhattan) @CloudExpo / @ThingsExpo 2017 Silicon Valley (Oct. 31 - Nov. 2, 2017, Santa Clara Convention Center, CA) Full Conference Registration Gold Pass and Exhibit Hall ▸ Here Register For @CloudExpo ▸ Here via EventBrite Register For @ThingsExpo ▸ Here via EventBrite Register For @DevOpsSummit ▸ Here via EventBrite Sponsorship Opportunities Sponsors of... (more)

Should You Fear #ArtificialIntelligence | @CloudExpo #BigData #IoT #AI #ML

Opining about the future of AI at the recent Brilliant Minds event at Symposium Stockholm, Google Executive Chairman Eric Schmidt rejected warnings from Elon Musk and Stephen Hawking about the dangers of AI, saying, “In the case of Stephen Hawking, although a brilliant man, he’s not a computer scientist. Elon is also a brilliant man, though he too is a physicist, not a computer scientist.” This absurd dismissal of Musk and Hawking was in response to an absurd question about “the possibility of an artificial superintelligence trying to destroy mankind in the near future.” Schmidt went on to say, “It’s a movie. The state of the earth currently does not support any of these scenarios.” If You Ask the Wrong Question … Hal 9000 (2001: A Space Odyssey), WOPR (War Games) and Colossus (The Forbin Project – it’s a 70’s B-budget disaster/thriller; look it up) are all pure ... (more)

DDoS Mitigation | @CloudExpo @WebairInc #IoT #Cybersecurity #DataCenter

Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Multi-Layer DDoS Mitigation Strategies As DDoS attacks evolve to become more sophisticated and complex, they have also become much more difficult to combat and block. To protect customer applications from these damaging and costly incursions and safeguard mission-critical services, a multi-layer mitigation strategy should be employed. This strategy offers protection in several different ways: mitigating attacks from the server level to the application level as well as securing both the Linux OS and firewall layers. Using open source software also provides protection over and above the server stack, while third-party systems can be effectively utilized to provide an even larger-scale cloud mitigation solution. Download Slide Deck: ▸ Here In their session at 18th Cloud Expo, Sagi Brody, Chief Technology Office... (more)

Part 2: What ‘Mr. Robot’ Can Teach Us About Incident Response | @CloudExpo #IoT #Cloud #Security

We continue with the second part of our two-part series. If you missed the first part, we are discussing what security professionals can learn from the hit series, "Mr. Robot." The series explores the world of organized hacking as well as the security measures being used to stop the hackers. Vulnerabilities Abound in the Internet of Things During the two seasons that the show has aired, viewers have seen examples of how hackers can exploit connected devices. One of the most extreme examples was when hackers took over the attorney's smart home, generating a nightmare of constantly changing sounds and lights and leading the attorney to run from her own home. Another example touching on IoT security was Dominique's use of a digital assistant to discuss topics of an intimate nature. Should a hacker manage to gain access to the records, the possibilities for blackmail or ... (more)

2017 #IoT Vulnerabilities | @ThingsExpo #M2M #DevOps #AI #CyberSecurity

2017 Security Predictions - Stay Vigilant, We're in for a Wild Ride 2016 brought about more cyberattacks than we thought possible, especially involving ransomware, and we definitely won't see that trend breaking stride in 2017. By next year, we expect every single adult in the U.S. will know a blood relative that has had their identity stolen - the Internal Revenue Service reported that 2.7 million people had their identities stolen in 2014 and according to TransUnion, 19 people fall victim to identity theft every minute. Here's a quick tip: When you elect to use credit cards, stick to the ‘chip and pin' cards - no swiping. Online, use your credit card issuers ‘one-time-numbers' for purchases. Get a shredder and use it. Think of it as ‘safe recycling'. Now I'm no fortune teller, but there are a few predictions I can make for the coming year - that I think most of ... (more)

Venafi to Exhibit at @DevOpsSummit | @Venafi #DevOps #IoT #CyberSecurity

SYS-CON Events announced today that Venafi, the Immune System for the InternetTM and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the InternetTM that protects the foundation of all cybersecurity - cryptographic keys and digital certificates - so they can't be misused by bad guys in attacks. In today's connected world, cybercriminals want to gain trusted status and remain undetected, which makes keys and certificates a prime target. Unfortunately, most security systems blindly trust keys and certificates, allowing bad guys to use them to hide in encrypted traffic, spoof websites, deploy malware, and steal data. As the Immune System for the Internet, Venafi pa... (more)

[session] Be Smarter Than the Hacker | @CloudExpo #SSL #IoT #Cybersecurity

As Our Partner You Don't Have to Be Smarter Than the Hacker: How Not to Get Robbed on the Internet In the 21st century, security on the Internet has become one of the most important issues. We hear more and more about cyber-attacks on the websites of large corporations, banks and even small businesses. When online we're concerned not only for our own safety but also our privacy. We have to know that hackers usually start their preparation by investigating the private information of admins - the habits, interests, visited websites and so on. On the other hand, our own security is in danger because privacy online must go hand-in-hand with safety. With so many different SSL certificates and vendors available we are concerned about the level of security and reliability. In his session at 19th Cloud Expo, Ark Szczurowski, founder and CEO of SSLGURU.com, will discuss how... (more)

Coalfire to Exhibit at @CloudExpo | @CoalfireSys #FedRAMP #Cybersecurity

SYS-CON Events announced today that Coalfire will exhibit at the 19th International Cloud Expo, which will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, healthcare, retail, payments, and financial industries. Coalfire's approach addresses each businesses' specific vulnerability challenges, developing a long-term strategy to prevent security breaches and data theft. Coalfire has offices throughout the United States and Europe. For more information, visit https://www.coalfire.com. @ThingsExpo - The World's Largest 'Internet of Things... (more)

Cloud Is Now Seen as a Way to Better Security | @CloudExpo #Cloud #Security #DigitalTransformation

The next BriefingsDirect cybersecurity innovation and transformation panel discussion explores how cloud security is rapidly advancing, and how enterprises can begin to innovate and prevail over digital disruption by increasingly using cloud-defined security. We'll examine how a secure content collaboration services provider removes the notion of organizational boundaries so that businesses can better extend processes. And we'll hear how less boundaries and cloud-based security together support transformative business benefits. To share how security technology leads to business innovations, we're joined by Daren Glenister, Chief Technology Officer at Intralinks in Houston, and Chris Steffen, Chief Evangelist for Cloud Security at HPE. The discussion is moderated by BriefingsDirect's Dana Gardner, Principal Analyst at Interarbor Solutions. Here are some excerpts: G... (more)