June 6, 2018
View our on-demand webinar to learn why the traditional MSSP model isn’t working, why the modern MSSP is a better solution for today’s threats, and the steps you can take to hire or replace an MSSP.
Macie Thompson, deltarisk.com, June 6, 2018
In a previous blog, I covered four cloud features that can help incident response teams. In today’s blog, I’m focusing on how to prepare your Amazon Web Services (AWS) environment so you can reduce your stress levels if and when you have an actual cyber security incident. Incident response can be extremely stressful, especially when you find an attacker still active in your network. The more you can plan and stage your environment, the easier it will be for your team to deal with an emergency.
AlienVault, msspalert.com, June 1, 2018
Your CEO has been paying attention, and suddenly, your IT department has a budget for security and compliance for 2017. You remember taking a course on cybersecurity in 2003, but other than that, you’re not sure you have the chops to take on a full security management program. You remember a friend at another company mentioned that they use a Managed Security Service Provider (MSSP) for their compliance initiatives. MSSPs provide security management services to customers of all sizes (like your MSP).
Alison DeNisco Rayome, techrepublic.com, June 1, 2018
At the recent MIT Sloan CIO Symposium in Cambridge, Lance Weaver, vice president of product strategy and emerging services at Equinix, spoke with TechRepublic’s Alison DeNisco Rayome about the need for CIO’s to play a role in cybersecurity strategy and leadership.
Pamela Cobb, securityintelligence.com, May 30, 2018
The following story illustrates what can occur before, during and after a cybersecurity hack. Malcolm Gerhard isn’t real, but the issues he faces are not products of fiction. Hardly a week goes by without a headline-grabbing cyberattack or data breach, and the healthcare industry is known to be at heightened risk. Actual case studies inspired Malcolm’s experience in this scenario. Read on to discover what happens when a SOC director discovers and responds to a healthcare hack. Would you have reacted differently?
Zeljka Zorz, helpnetsecurity, May 31, 2018
Both the Mac and Windows version sport a new design that puts the important things (i.e. the user’s items, the most important information) into focus and a new custom font that makes it easier to type passwords into another device. The Mac version continues to support Touch ID and the Windows version Windows Hello for biometrics-based login. Both versions sport a new and even more helpful 1Password mini, and in the Mac version it’s not limited to working with browsers.
Phil Goldstein, fedtechmagzine.com, June 1, 2018
The federal government has a lot of work to do to enhance its own cybersecurity, as a recent report from the Office of Management and Budget and Department of Homeland Security makes clear. However, to improve cybersecurity, the government must continue to partner with the private sector and state and local governments, according to a DHS official. Rick Driggers, deputy assistant secretary for cybersecurity and communications in the National Protection and Programs Directorate (NPPD) at DHS, said that as cybersecurity threats evolve and multiply, the government cannot combat the problem on its own.
Marie Hattar, securityweek.com, May 30, 2018
The Internet of Things (IoT) has been a boon for the cybercriminal industry. IoT devices number in the billions worldwide and most are unsecured or undersecured, making them appealing targets to be used in distributed denial-of-service (DDoS) attacks that can overwhelm an enterprise network and cause critical business systems to crash. They are so tempting that by the end of 2017, reported attacks numbered 15 per minute globally—a rate that has surely increased in 2018.
Steve Ranger, zdnet.com, June 4, 2018
The US needs to fundamentally rethink its strategies for stopping cyber attacks and should develop a tailored approach to deterring each of its key adversaries, according to a new government report. The report published by the US State Department — like a recent paper on botnets — comes in response to an executive order signed by President Donald Trump last year, which called for a report “on the nation’s strategic options for deterring adversaries and better protecting the American people from cyber threats”.
Alex Hickey, ciodive.com, June 5, 2018
Technology and security industries have turned to artificial intelligence and machine learning with a fervor once reserved for the latest iPhone release. On the expo floor at a cybersecurity show, professionals are hard pressed to collect a vendor flier without AI or ML mentioned at least once. Can the hype deliver — let alone last? Machine learning is reaching the end of its peak of inflated expectations, poised for an imminent descent to the trough of disillusionment on Gartner’s hype cycle.