INFOSECURITY NEWSLETTER

April 11, 2018

[White Paper] Understanding The Challenges of Cloud Monitoring and Security

While cloud providers offer many security measures, organizations are ultimately responsible for securing their own data, their own applications, and their own services in the cloud. We discuss how companies are adapting to new cloud security challenges and the important considerations they need to make before choosing a cloud monitoring solution.

Download My Copy

[New White Papers] Law Firms Face Cyber Security Challenges Around Client Confidentiality and Due Diligence

Devesh Panchwagh, deltarisk.com, April 9, 2018

Law firms and law departments have a fiduciary duty to protect client data. However, their mission to maintain the confidentiality of this sensitive information is challenged every day by emerging cyber threats. Law firms are an attractive target for cyber criminals because their client data is a treasure trove for personal healthcare information, financial information, business information (like mergers and acquisitions), patent and trade secrets, litigation plans, and all confidential information between clients and attorneys.

Read More


20 Ways to Increase the Efficiency of the Incident Response Workflow

Joshua Goldfarb, darkreading.com, April 10, 2018

I am a big fan of efficiency. Why do I love efficiency? Mainly because introducing efficiencies into processes saves time and money. There are other benefits as well, such as decreased chance for human error, improved accuracy, and increased productivity. Unfortunately, in the incident response world, the overall state of inefficiency still reigns supreme.

Read More

How Many Can Detect a Major Cybersecurity Incident Within an Hour?

Help Net Security Staff, helpnetsecurity.com, April 11, 2018

Less than half of all organizations were able to detect a major cybersecurity incident within one hour. Even more concerning, less than one-third said that even if they detected a major incident, they would be unable to contain it within an hour, according to LogRhythm. The study, conducted by Widmeyer, which surveyed 751 IT decision makers from the U.S., U.K. and Asia-Pacific, also revealed that a majority of organizations are only moderately confident in their ability to protect their companies against hackers.

Read More


Verizon Report: Ransomware Top Malware Threat of 2017, Moving Into Critical Systems

Maria Karolov, csoonline.com, April 10, 2018

Verizon released its Data Breach Investigations Report (DBIR) this morning, the massive, in-depth analysis of last year’s security breaches, based on 53,000 security incidents from 67 contributing organizations around the world, including security researchers and law enforcement agencies. The most common types of attacks that resulted in breaches involved the use of stolen credentials, followed by RAM scraper malware, then phishing, and then privilege abuse.

Read More

8 Ways a Supply Chain Raises Cyber Security Risks

Health Data Management Staff, healthdatamanagement.com, April 10, 2018

A new report from healthcare data security firms Trend Micro and HITRUST examines the supply chain, which the organizations believe is an overlooked part of hospital and clinic operations that hackers can use to establish a foothold in the organization. “We strongly recommend a blend of security technology and employee/partner awareness and education, including a threat response protocol,” they caution.

Read More

National Guard Using Cybersecurity Skills To Protect Integrity Of Midterm Elections

Dave Mistich, npr.org, April 9, 2018

Election officials concerned about malign forces hacking voting-related systems have an unexpected resource to draw upon: the National Guard. Guard soldiers in several states are using their cybersecurity skills to protect the 2018 elections. Cybersecurity has taken center stage in American elections. In the past, the job of an election official meant making sure there are enough ballots and keeping lines of voters moving along at polling places.

Read More

Cyberinsurance Tries to Tackle The Unpredictable World Of Hacks

Josephine Wolf, wired.com, April 6, 2018

In the aftermath of the Equifax data breach last year that exposed personal information of more than 145 million people, analysis firm Property Claim Services estimated that cyberinsurance would cover roughly $125 million of Equifax’s losses from the incident. It’s uncertain whether Equifax will actually receive that much money; insurance claims can take a long time to investigate, process, and pay out.

Read More


Ransomware Puts Pressure on Incident Response

Warwick Ashford, computerweekly.com, April 4, 2018

Cyber attackers switched focus to ransomware attacks in 2017 putting pressure on incident response, while human error was responsible for two-thirds of compromised records, a study shows the number of records breached dropped nearly 25% in 2017 as cyber criminals shifted focus to launching ransomware attacks, a study has revealed. Although more than 2.9 billion records were compromised, this figure is down 1.1 billion compared with 2016, with ransomware the dominant attack type, including pseudo-ransomware that is essentially designed to be destructive, according to the 2018 IBM X-Force Threat intelligence index report.

Read More

[Opinion] What Hackers Do: Their Motivations and Their Malware

Roger A. Grimes, csoonline.com, April 5, 2018

Whatever the threat, it is arriving to your computer in one of two ways: human adversary or malware. Human attackers can use any of the hundreds of thousands of known computer exploits and attack methodologies to compromise a computer or device. People are supposed to run patching routines, and many devices and software programs try their best to automatically update themselves, yet many computers and devices are left vulnerable for long periods of time even after the patches are available, a fact that hackers love.

Read More

Sign Up for Our Newsletter

financial newsletterhealthcare newsletter
Infosecurity Newsletter Archive

June 2018: 6th

May 2018: 2nd, 9th, 30th

April 2018: 4th, 11th, 18th, 25th

March 2018: 7th, 14th, 21st, 28st

February 2018: 7th, 14th, 21st, 28th

January 2018: 3rd, 10th, 17th, 24th, 31st

December 2017: 6th, 13th, 20th

November 2017: 1st, 15th, 29th

October 2017: 4th, 11th, 18th, 25th

September 2017: 6th, 13th, 20th, 27th

August 2017: 2nd, 9th, 16th, 23rd, 30th

July 2017: 5th, 12th, 19th, 26th

June 2017: 7th, 14th, 21st, 28th

May 2017: 3rd, 10th, 17th, 24th, 31st

April 2017: 5th, 12th, 19th, 26th

March 2017: 1st, 8th, 15th, 22nd, 29th

February 2017: 1st, 8th, 13th, 22nd

January 2017: 4th, 11th, 18th, 24th

December 2016: 7th, 14th, 21st, 28th


top cyber incident pain points