Value of Cyber Security Best Practices

//
Posted By
/
Comment0
/
The massive ransomware attack known as WannaCry, which spread across tens of thousands of computers worldwide on May 12, demonstrates yet again the value of an airtight cybersecurity policy. WannaCry, which crippled high profile targets like Britain’s National Health Service (NHS) and Spanish telecom Telefonica, includes a National Security Agency (NSA) exploit called EternalBlue, which...
Read More →

Wanna Cry – Lessons Learned For Next Attack

//
Posted By
/
Comment0
/
On Friday, some hospitals in the United Kingdom were struck with a peculiar attack: computers taken over, data inside encrypted and held ransom, all for the measly payment of just $300. The attack spread rapidly, hitting 150 countries and shutting down everything from telecoms in Spain to the Interior Ministry in Russia. And then, through a...
Read More →

Exec Order Directs Use Of NIST Framework To Manage Agency Cyber Risk

//
Posted By
/
Comment0
/
Risk Management (i)    Agency heads will be held accountable by the President for implementing risk management measures commensurate with the risk and magnitude of the harm that would result from unauthorized access, use, disclosure, disruption, modification, or destruction of IT and data.  They will also be held accountable by the President for ensuring that...
Read More →

Bitcoins Feeding Online Crime Wave

//
Posted By
/
Comment0
/
The availability of Bitcoin, the open-source virtual currency, has made crypto – ransomware’s business model viable and profitable, feeding an online crime wave that has seen new extortion-enabling malware families at least double each year since 2012. There was one known ransomware family variant in 2012, according to F-Secure’s State of Cyber Security 2017 report. By 2015, there...
Read More →

Protecting Corporate Fleets From Hackers

//
Posted By
/
Comment0
/
Yes, the enterprise should be concerned about criminal hackers attacking corporate fleets. Black hat hackers are attracted to vehicles as automotive systems use and share a growing wealth of personal and enterprise data. Cyber thugs will find many points of entry into connected cars and the sensitive internal systems, components, and information inside. To close those vulnerabilities, cybersecurity...
Read More →

Top 10 Security Audit Gaps & How To Avoid

//
Posted By
/
Comment0
/
When it comes to cybersecurity, the list of potential gaps is expansive ranging from technology to human. To help identify where your firm may be lacking, here is a list of the top 10 most commonly identified gaps found during an IT audit/risk assessment.  Top 10 IT Security Gaps   Risk Management and Governance IT...
Read More →

NSA Hacking Tool In Use Internet-Wide

//
Posted By
/
Comment0
/
If you’re on a red team or have been on the receiving end of a pen-test report from one, then you’ve almost certainly encountered reports of Windows servers vulnerable to Conficker (MS08-067), which has been in the wild now for nearly 10 years since the bug was patched. A little more than two weeks after...
Read More →

Fines Can Soar Into Multi-Millions

//
Posted By
/
Comment0
/
A record year of FINRA enforcement activity heralds heightened scrutiny on a bevy of issues including cybersecurity, anti-money laundering policies and protection for senior clients, legal and regulatory experts caution. Analyzing the regulator’s 2016 enforcement actions, New York law firm Eversheds Sutherland found that while the total number of cases the industry regulator brought last...
Read More →
1 2 3 7