INFOSECURITY NEWSLETTER

February 21, 2018

[Webinar] Data Breach Survival Tactics: Building Actionable Incident Response Plans

In today’s threat landscape, it isn’t a question of if you’ll experience an incident, but when. When a security incident strikes, you’ll need a well-prepared staff and with a battle-tested plan. A mature incident response plan keeps everyone on the same page. View our incident response webinar to learn how you can quickly contain the impact of a breach, resolve an incident, and get back to business as quickly as possible.

Watch it On Demand

Incident Response Strategy: Determining Where to Invest

Andrew Cook, deltarisk.com, February 15, 2018

It can be hard to plan for a security incident if you’ve never experienced one first hand. Incidents involve unauthorized access, denial of service, presence of malicious logic, and improper usage. As an incident responder, I’ve seen plenty of these situations play out. I was fortunate to share some of my experiences and lessons with the top-notch professionals attending the LegalCIO conference in New York, where we hosted a round table covering “Is Your Organization Prepared for a Cyber Attack? Key Takeaways from Real-Life Incidents.”

Read More


Blockchain and Its Impact on the Future of Cyber Security

Nicole Lindsey, cpomagazine.com, February 14, 2018

It’s hard to escape the notion that security in today’s digital world is fundamentally broken. The stronger the defenses that are erected around the digital assets of corporations, the more prevalent are the attacks from hackers. The smarter that employees get about protecting passwords and devices, the more ingenious that the attacks become. That reality has led many Internet security researchers to the conclusion that the blockchain could represent the future of cyber security.

Read More

A Former TSA and NSA Executive Reveals How to Break Into the Cybersecurity Field

Alison DeNisco Rayome, techrepublic.com, February 14, 2018

When Emma Garrison-Alexander was a senior executive at the National Security Agency (NSA), she had an assistant who was an older white man. “When people came in, they almost always assumed that he was the boss,” she said. “He would have to turn to them and say, here is Ms. Garrison-Alexander.” “There were assumptions that I was a secretary,” Garrison-Alexander said. “But I don’t really want to call those obstacles—those were just things that happened in an environment where people were just not accustomed to women being in certain positions.”

Read More


NIST Releases Cybersecurity Report on the Internet of Things

Homeland Security Today Team, hstoday.us, February 14, 2018

NIST’s Interagency International Cybersecurity Standardization Working Group has released its interagency report on cybersecurity standards for the Internet of Things, and it is inviting draft comments from agencies. The report covers the standards landscape for cybersecurity for the Internet of Things and it maps standards to 11 core areas. The Interagency International Cybersecurity Standardization Working Group was established in 2015 to coordinate on major issues in international cybersecurity standardization and enhance U.S. federal agency participation in applying the standards.

Read More

Multi-Stage Word Attack Infects Users Without Using Macros

Catalin Cimpanu, bleepingcomputer.com, February 15, 2018

Spam distributors are using a new technique to infect users with malware, and while this attack relies on having users open Word documents, it does not involve users having to allow the execution of macro scripts. This new macro-less technique is currently under active exploitation, being detected by Trustwave SpiderLabs researchers in an ongoing malware campaign. The company says crooks are using this multi-phase, no-macros technique to infect users with a password stealer. Currently, evidence suggests only one group is using this novel trick, albeit this will surely be adopted by others.

Read More

Why the Cyber Threat Landscape Could Grow Under GDPR

Nick Ismail, information-age.com, February 15, 2018

The biggest change to data protection laws since the 1990s, GDPR requires businesses to put “appropriate measures” in place to protect the Personally Identifiable Information (PII) it holds, whether that’s customers, prospects, employees or suppliers. All businesses will hold some form of PII, even if it’s just employee data, and therefore must comply with GDPR. 2017 saw cyber threats like ransomware finally covered in the mainstream media thanks to the global WannaCry, Petya and Bad Rabbit outbreaks. The beloved NHS was hit in an attack that was initially perceived as a targeted strike on the National Health Service.

Read More

What Cybersecurity Surprises Does 2018 Hold?

Darren Guccione, csoonline.com, February 14, 2018

Bitcoin, the General Data Protection Regulation in Europe and the Internet of Things (IoT) are just three recent developments that will present security professionals with new challenges in 2018. That’s in addition to the usual raft of malware, DDoS attacks and database thefts that have dominated the headlines for some time. To get a handle on what to expect, we asked two Keeper Security experts – Director of Security and Architecture Patrick Tiquet and Chief Technology Officer Craig Lurey – to peer into their crystal balls to find what 2018 holds. Here’s what they saw.

Read More


Protecting The Power-Grid From Cyber-Attacks Requires A Change Of Mindset

Greg Sim, informationsecuritybuzz.com, February 21, 2018

In an attempt to boost the cyber-protection of the UK’s most critical industries, the government is pushing firms to turn to the best standard of cyber defence available. But will these fines be enough to encourage the C-Suite to take action? In recent years, there have been sudden shutdowns of transport systems and power grids that we are familiar with from Hollywood blockbusters but nowadays these have become real-world possibilities as hackers continue to breach critical systems.

Read More

Cybersecurity Advice for Higher Education

Chris Bunn, securityboulevard.com, February 21, 2018

Information security continues to challenge both large and small institutions alike. According to EDUCAUSE, a nonprofit association of IT leaders in higher education, information security remains the #1 issue in 2018 for the third year in a row. Perhaps this is not a surprise when you learn the education sector has the highest rate of ransomware of all industries and the compliance environment is becoming more complex by the day.

Read More

Sign Up for Our Newsletter

financial newsletterhealthcare newsletter
Infosecurity Newsletter Archive

June 2018: 6th

May 2018: 2nd, 9th, 30th

April 2018: 4th, 11th, 18th, 25th

March 2018: 7th, 14th, 21st, 28st

February 2018: 7th, 14th, 21st, 28th

January 2018: 3rd, 10th, 17th, 24th, 31st

December 2017: 6th, 13th, 20th

November 2017: 1st, 15th, 29th

October 2017: 4th, 11th, 18th, 25th

September 2017: 6th, 13th, 20th, 27th

August 2017: 2nd, 9th, 16th, 23rd, 30th

July 2017: 5th, 12th, 19th, 26th

June 2017: 7th, 14th, 21st, 28th

May 2017: 3rd, 10th, 17th, 24th, 31st

April 2017: 5th, 12th, 19th, 26th

March 2017: 1st, 8th, 15th, 22nd, 29th

February 2017: 1st, 8th, 13th, 22nd

January 2017: 4th, 11th, 18th, 24th

December 2016: 7th, 14th, 21st, 28th


top cyber incident pain points