June 6 2018 Weekly Newsletter

[cs_content][cs_section bg_image=”https://deltarisk.com/wp-content/uploads/2016/12/newsletter_feature1.jpg” bg_color=”hsl(0, 65%, 15%)” parallax=”false” separator_top_type=”none” separator_top_height=”50px” separator_top_inset=”0px” separator_top_angle_point=”50″ separator_bottom_type=”none” separator_bottom_height=”50px” separator_bottom_inset=”0px” separator_bottom_angle_point=”50″ _order=”0″ class=”feature_banner_interior” style=”margin: 0px;padding: 0 0px;”][cs_row inner_container=”false” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/1″ style=”padding: 0px;”][cs_text]

INFOSECURITY NEWSLETTER

[/cs_text][/cs_column][/cs_row][/cs_section][cs_section parallax=”false” separator_top_type=”none” separator_top_height=”50px” separator_top_inset=”0px” separator_top_angle_point=”50″ separator_bottom_type=”none” separator_bottom_height=”50px” separator_bottom_inset=”0px” separator_bottom_angle_point=”50″ style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”2/3″ style=”padding: 0px;”][cs_text]

June 6, 2018

[/cs_text][cs_text]

[Webinar] Forecasting the Future of Managed Security: Why You Need a Modern MSSP

View our on-demand webinar to learn why the traditional MSSP model isn’t working, why the modern MSSP is a better solution for today’s threats, and the steps you can take to hire or replace an MSSP.
[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”https://deltarisk.com/resources/webinars/” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]View it On-Demand[/x_button][x_line style=”border-top-width: 1px;”][cs_text]

How to Prepare Your AWS Environment in Advance of a Cyber Security Incident

Macie Thompson, deltarisk.com, June 6, 2018

In a previous blog, I covered four cloud features that can help incident response teams. In today’s blog, I’m focusing on how to prepare your Amazon Web Services (AWS) environment so you can reduce your stress levels if and when you have an actual cyber security incident. Incident response can be extremely stressful, especially when you find an attacker still active in your network. The more you can plan and stage your environment, the easier it will be for your team to deal with an emergency.

[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”https://deltarisk.com/blog/how-to-prepare-your-aws-environment-in-advance-of-a-cyber-security-incident/” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][cs_text]


Why Use a Managed Security Services Provider (MSSP)?

AlienVault, msspalert.com, June 1, 2018

Your CEO has been paying attention, and suddenly, your IT department has a budget for security and compliance for 2017. You remember taking a course on cybersecurity in 2003, but other than that, you’re not sure you have the chops to take on a full security management program. You remember a friend at another company mentioned that they use a Managed Security Service Provider (MSSP) for their compliance initiatives. MSSPs provide security management services to customers of all sizes (like your MSP).[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”https://www.msspalert.com/cybersecurity-guests/use-managed-security-service/” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][cs_text]

What is the CIO’s Role in Cybersecurity Leadership?

Alison DeNisco Rayome, techrepublic.com, June 1, 2018

At the recent MIT Sloan CIO Symposium in Cambridge, Lance Weaver, vice president of product strategy and emerging services at Equinix, spoke with TechRepublic’s Alison DeNisco Rayome about the need for CIO’s to play a role in cybersecurity strategy and leadership.

[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”https://www.techrepublic.com/article/what-is-the-cios-role-in-cybersecurity-leadership/” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][cs_text]


The Hack React: Testing a SOC Director’s Cybersecurity Incident Response

Pamela Cobb, securityintelligence.com, May 30, 2018

The following story illustrates what can occur before, during and after a cybersecurity hack. Malcolm Gerhard isn’t real, but the issues he faces are not products of fiction. Hardly a week goes by without a headline-grabbing cyberattack or data breach, and the healthcare industry is known to be at heightened risk. Actual case studies inspired Malcolm’s experience in this scenario. Read on to discover what happens when a SOC director discovers and responds to a healthcare hack. Would you have reacted differently?

[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”https://securityintelligence.com/the-hack-react-testing-a-soc-directors-cybersecurity-incident-response/” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][cs_text]

1Password 7: A New Design and Added Security Features

Zeljka Zorz, helpnetsecurity, May 31, 2018

Both the Mac and Windows version sport a new design that puts the important things (i.e. the user’s items, the most important information) into focus and a new custom font that makes it easier to type passwords into another device. The Mac version continues to support Touch ID and the Windows version Windows Hello for biometrics-based login. Both versions sport a new and even more helpful 1Password mini, and in the Mac version it’s not limited to working with browsers.[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”https://www.helpnetsecurity.com/2018/05/31/1password-7-security/” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][cs_text]

Cybersecurity Is a Team Sport, DHS Official Says

Phil Goldstein, fedtechmagzine.com, June 1, 2018

The federal government has a lot of work to do to enhance its own cybersecurity, as a recent report from the Office of Management and Budget and Department of Homeland Security makes clear. However, to improve cybersecurity, the government must continue to partner with the private sector and state and local governments, according to a DHS official. Rick Driggers, deputy assistant secretary for cybersecurity and communications in the National Protection and Programs Directorate (NPPD) at DHS, said that as cybersecurity threats evolve and multiply, the government cannot combat the problem on its own.[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”https://fedtechmagazine.com/article/2018/06/cybersecurity-team-sport-dhs-official-says” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][cs_text]

Tips for Hardening Networks Against IoT-based DDoS Attacks

Marie Hattar, securityweek.com, May 30, 2018

The Internet of Things (IoT) has been a boon for the cybercriminal industry. IoT devices number in the billions worldwide and most are unsecured or undersecured, making them appealing targets to be used in distributed denial-of-service (DDoS) attacks that can overwhelm an enterprise network and cause critical business systems to crash. They are so tempting that by the end of 2017, reported attacks numbered 15 per minute globally—a rate that has surely increased in 2018. [/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”https://www.securityweek.com/tips-hardening-networks-against-iot-based-ddos-attacks” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][cs_text]


Cyber Security: We Need a Better Plan to Deter Hacker Attacks Says US

Steve Ranger, zdnet.com, June 4, 2018

The US needs to fundamentally rethink its strategies for stopping cyber attacks and should develop a tailored approach to deterring each of its key adversaries, according to a new government report. The report published by the US State Department — like a recent paper on botnets — comes in response to an executive order signed by President Donald Trump last year, which called for a report “on the nation’s strategic options for deterring adversaries and better protecting the American people from cyber threats”.
[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”https://www.zdnet.com/article/cyber-security-we-need-a-better-plan-to-deter-hacker-attacks-says-us/” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][x_line style=”border-top-width: 1px;”][cs_text]

How Viable is Machine Learning for Cybersecurity?

Alex Hickey, ciodive.com, June 5, 2018

Technology and security industries have turned to artificial intelligence and machine learning with a fervor once reserved for the latest iPhone release. On the expo floor at a cybersecurity show, professionals are hard pressed to collect a vendor flier without AI or ML mentioned at least once. Can the hype deliver — let alone last? Machine learning is reaching the end of its peak of inflated expectations, poised for an imminent descent to the trough of disillusionment on Gartner’s hype cycle.[/cs_text][x_button size=”global” block=”false” circle=”false” icon_only=”false” href=”https://www.ciodive.com/news/how-viable-is-machine-learning-for-cybersecurity/524968/” title=”” target=”blank” info=”none” info_place=”top” info_trigger=”hover” info_content=””]Read More[/x_button][/cs_column][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/3″ class=”newslettermain_right” style=”padding: 0px;”][cs_element_text _id=”44″ ][x_raw_content][/x_raw_content][x_image type=”none” src=”https://deltarisk.com/wp-content/uploads/2017/01/financial-right-column.jpg” alt=”financial newsletter” link=”true” href=”/resources/newsletter/financial-newsletter/” title=”” target=”” info=”none” info_place=”top” info_trigger=”hover” info_content=””][x_image type=”none” src=”https://deltarisk.com/wp-content/uploads/2017/01/healthcare-right.jpg” alt=”healthcare newsletter ” link=”true” href=”/resources/newsletter/healthcare-newsletter/” title=”” target=”” info=”none” info_place=”top” info_trigger=”hover” info_content=””][cs_text]

Infosecurity Newsletter Archive

[/cs_text][x_widget_area sidebar=”ups-sidebar-inforsecurity-sidebar” ][x_line style=”border-top-width: 1px;”][x_image type=”none” src=”https://deltarisk.com/wp-content/uploads/2016/12/10pts-mobile.jpg” alt=”top cyber incident pain points ” link=”true” href=”https://deltarisk.com/resources/white-papers/top-10-cyber-incident-pain-points-prepared/” title=”” target=”” info=”none” info_place=”top” info_trigger=”hover” info_content=””][/cs_column][/cs_row][/cs_section][/cs_content]