INFOSECURITY NEWSLETTER

June 6, 2018

[Webinar] Forecasting the Future of Managed Security: Why You Need a Modern MSSP

View our on-demand webinar to learn why the traditional MSSP model isn’t working, why the modern MSSP is a better solution for today’s threats, and the steps you can take to hire or replace an MSSP.

View it On-Demand

How to Prepare Your AWS Environment in Advance of a Cyber Security Incident

Macie Thompson, deltarisk.com, June 6, 2018

In a previous blog, I covered four cloud features that can help incident response teams. In today’s blog, I’m focusing on how to prepare your Amazon Web Services (AWS) environment so you can reduce your stress levels if and when you have an actual cyber security incident. Incident response can be extremely stressful, especially when you find an attacker still active in your network. The more you can plan and stage your environment, the easier it will be for your team to deal with an emergency.

Read More


Why Use a Managed Security Services Provider (MSSP)?

AlienVault, msspalert.com, June 1, 2018

Your CEO has been paying attention, and suddenly, your IT department has a budget for security and compliance for 2017. You remember taking a course on cybersecurity in 2003, but other than that, you’re not sure you have the chops to take on a full security management program. You remember a friend at another company mentioned that they use a Managed Security Service Provider (MSSP) for their compliance initiatives. MSSPs provide security management services to customers of all sizes (like your MSP).

Read More

What is the CIO’s Role in Cybersecurity Leadership?

Alison DeNisco Rayome, techrepublic.com, June 1, 2018

At the recent MIT Sloan CIO Symposium in Cambridge, Lance Weaver, vice president of product strategy and emerging services at Equinix, spoke with TechRepublic’s Alison DeNisco Rayome about the need for CIO’s to play a role in cybersecurity strategy and leadership.

Read More


The Hack React: Testing a SOC Director’s Cybersecurity Incident Response

Pamela Cobb, securityintelligence.com, May 30, 2018

The following story illustrates what can occur before, during and after a cybersecurity hack. Malcolm Gerhard isn’t real, but the issues he faces are not products of fiction. Hardly a week goes by without a headline-grabbing cyberattack or data breach, and the healthcare industry is known to be at heightened risk. Actual case studies inspired Malcolm’s experience in this scenario. Read on to discover what happens when a SOC director discovers and responds to a healthcare hack. Would you have reacted differently?

Read More

1Password 7: A New Design and Added Security Features

Zeljka Zorz, helpnetsecurity, May 31, 2018

Both the Mac and Windows version sport a new design that puts the important things (i.e. the user’s items, the most important information) into focus and a new custom font that makes it easier to type passwords into another device. The Mac version continues to support Touch ID and the Windows version Windows Hello for biometrics-based login. Both versions sport a new and even more helpful 1Password mini, and in the Mac version it’s not limited to working with browsers.

Read More

Cybersecurity Is a Team Sport, DHS Official Says

Phil Goldstein, fedtechmagzine.com, June 1, 2018

The federal government has a lot of work to do to enhance its own cybersecurity, as a recent report from the Office of Management and Budget and Department of Homeland Security makes clear. However, to improve cybersecurity, the government must continue to partner with the private sector and state and local governments, according to a DHS official. Rick Driggers, deputy assistant secretary for cybersecurity and communications in the National Protection and Programs Directorate (NPPD) at DHS, said that as cybersecurity threats evolve and multiply, the government cannot combat the problem on its own.

Read More

Tips for Hardening Networks Against IoT-based DDoS Attacks

Marie Hattar, securityweek.com, May 30, 2018

The Internet of Things (IoT) has been a boon for the cybercriminal industry. IoT devices number in the billions worldwide and most are unsecured or undersecured, making them appealing targets to be used in distributed denial-of-service (DDoS) attacks that can overwhelm an enterprise network and cause critical business systems to crash. They are so tempting that by the end of 2017, reported attacks numbered 15 per minute globally—a rate that has surely increased in 2018.

Read More


Cyber Security: We Need a Better Plan to Deter Hacker Attacks Says US

Steve Ranger, zdnet.com, June 4, 2018

The US needs to fundamentally rethink its strategies for stopping cyber attacks and should develop a tailored approach to deterring each of its key adversaries, according to a new government report. The report published by the US State Department — like a recent paper on botnets — comes in response to an executive order signed by President Donald Trump last year, which called for a report “on the nation’s strategic options for deterring adversaries and better protecting the American people from cyber threats”.

Read More

How Viable is Machine Learning for Cybersecurity?

Alex Hickey, ciodive.com, June 5, 2018

Technology and security industries have turned to artificial intelligence and machine learning with a fervor once reserved for the latest iPhone release. On the expo floor at a cybersecurity show, professionals are hard pressed to collect a vendor flier without AI or ML mentioned at least once. Can the hype deliver — let alone last? Machine learning is reaching the end of its peak of inflated expectations, poised for an imminent descent to the trough of disillusionment on Gartner’s hype cycle.

Read More

Sign Up for Our Newsletter

financial newsletterhealthcare newsletter
Infosecurity Newsletter Archive

June 2018: 6th

May 2018: 2nd, 9th, 30th

April 2018: 4th, 11th, 18th, 25th

March 2018: 7th, 14th, 21st, 28st

February 2018: 7th, 14th, 21st, 28th

January 2018: 3rd, 10th, 17th, 24th, 31st

December 2017: 6th, 13th, 20th

November 2017: 1st, 15th, 29th

October 2017: 4th, 11th, 18th, 25th

September 2017: 6th, 13th, 20th, 27th

August 2017: 2nd, 9th, 16th, 23rd, 30th

July 2017: 5th, 12th, 19th, 26th

June 2017: 7th, 14th, 21st, 28th

May 2017: 3rd, 10th, 17th, 24th, 31st

April 2017: 5th, 12th, 19th, 26th

March 2017: 1st, 8th, 15th, 22nd, 29th

February 2017: 1st, 8th, 13th, 22nd

January 2017: 4th, 11th, 18th, 24th

December 2016: 7th, 14th, 21st, 28th


top cyber incident pain points