INFOSECURITY NEWSLETTER

August 2, 2017

Hackers Descend on Las Vegas to Expose Voting Machine Flaws

Kevin Collier, politico.com, July 30, 2017

Election officials and voting machine manufacturers insist that the rites of American democracy are safe from hackers. But people like Carten Schurman need just a few minutes to raise doubts about that claim.

Read More

A Pen Tester’s Perspective on Petya Ransomware

Noah Powers, deltarisk.com, July 26, 2017

There’s no shortage of analysis on the Petya ransomware strain that struck organizations across the globe in the past month. You can find blog posts and articles covering practically every angle – from the machine language nuances of the code, to the length of the encryption key, to the possible nationality of the code writer.

Read More

Could Cybercriminals Be on the Verge of Executing a New, Terrible Type of Attack on Healthcare?

Mark Hagland, healthcare-informatics.com, July 31, 2017

An excellent “Perspective” op-ed article published online earlier this month in The New England Journal of Medicine is bringing forward for industry leaders to consider a very important and alarming new possibility around data breaches involving PHI (protected health information).

Read More

Creating a Common Language of Cybersecurity

Robert K. Ackerman, afcea.org, August 1, 2017

As electronic options to provide and access patient health information increase, so too can opportunities for hackers to steal that information or hold it hostage if medical professionals do not maintain and upgrade their cybersecurity.

Read More

A $10 Hardware Hack that Wrecks IoT Security

Lily Hay Newman, wired.com, July 29, 2017

Most consumer tech manufacturers figure that once a hacker can physically access a device, there’s not much left that can be done to defend it. But a group of researchers known as the Exploitee.rs say that giving up too soon leaves devices susceptible to hardware attacks that can lead to bigger problems.

Read More

Enterprise IT Leaders Demand More Stringest Cyber Security From Suppliers

Nick Ismail, information-age.com, July 31, 2017

Nick Ismail, Information-age.com, July 31, 2017
CybSafe, the behavioural science based cyber security e-learning platform, today revealed that enterprise level organisations are increasingly assessing cyber security during supplier contract negotiations.

Read More

Facebook Security Chief: Cybersecurity Pros Need More Empathy to Protect Us

Mike Orcutt, technologyreview.com, July 26, 2017

Facebook was arguably the most important battleground for information warfare in the run-up to the 2016 presidential election, and its chief security officer says cybersecurity professionals need to do more to protect Internet users from bad actors.

Read More

[Opinion] The Biggest Threat to Cybersecurity is Not Enough Info Sharing

Lloyd McCoy Jr., csoonline.com, July 26, 2017

Even the Department of Defense is working hard to keep pace with the changing landscape of cybersecurity threats. The key, by most estimates, is information sharing. But whether the DOD and other agencies are ready for the level of sharing required is another matter.

Read More

Hackers are Winning the War as Companies Worldwide Fail on Cyber Security

Nick Ismail, information-age.com, July 27, 2017

Most companies worldwide are failing to measure cyber security effectiveness and performance, according to a cyber security report from Thycotic – a provider of privileged account management (PAM) and endpoint privilege management solutions.

Read More
financial newsletterhealthcare newsletter
Infosecurity Newsletter Archive

June 2018: 6th

May 2018: 2nd, 9th, 30th

April 2018: 4th, 11th, 18th, 25th

March 2018: 7th, 14th, 21st, 28st

February 2018: 7th, 14th, 21st, 28th

January 2018: 3rd, 10th, 17th, 24th, 31st

December 2017: 6th, 13th, 20th

November 2017: 1st, 15th, 29th

October 2017: 4th, 11th, 18th, 25th

September 2017: 6th, 13th, 20th, 27th

August 2017: 2nd, 9th, 16th, 23rd, 30th

July 2017: 5th, 12th, 19th, 26th

June 2017: 7th, 14th, 21st, 28th

May 2017: 3rd, 10th, 17th, 24th, 31st

April 2017: 5th, 12th, 19th, 26th

March 2017: 1st, 8th, 15th, 22nd, 29th

February 2017: 1st, 8th, 13th, 22nd

January 2017: 4th, 11th, 18th, 24th

December 2016: 7th, 14th, 21st, 28th


top cyber incident pain points