August 23, 2017
Dan Lohrmann, govtech.com, August 20, 2017
While running on my treadmill on Thursday morning, August 17, 2017, I was watching CNBC’s Squawk Box, as David Novak, co-founder and former CEO of YUM Brands, came on the show as a guest. He was asked how he was so successful at growing such a powerful set of global YUM Brands with great results including names like Pizza Hut, Taco Bell, Burger King and others.
Andrew Cook, deltarisk.com, August 18, 2017
Imagine this scenario: you’ve just discovered your network has been breached. You need to get a handle on the situation quickly but you’re still trying to figure out what happened. What are the incident response best practices you should follow?
Bill Brenner, nakedsecurity.com, August 17, 2017
Locky was once among the most dominant strains of ransomware. Over time, it receded from view, replaced by ransomware such as Cerber and Spora. But in the last couple of weeks, Locky has returned. Last week it sported a new extension: .diablo6. This week researchers are seeing more new variants, now with a .lukitus extension.
David Bisson, grahamcluley.com, August 22, 2017
A member of the Anonymous hacking collective claims to have stolen data belonging to 1.2 million patients of the United Kingdom’s National Health Service (NHS). The breach affected swiftQueue, a software provider of dashboard and metrics solutions to healthcare clinics.
Steve Ragan, csoonline.com, August 21, 2017
Cyber-attack maps can be fun to look at, but are they useful? As usual, when it comes to security context is key, so CSO looked at eight of the web’s most popular cyber-attack maps. While the maps themselves are mostly eye candy with limited context, there are some creative ways they can be used.
Alfred Ng, cnet.com, August 18, 2017
Last year, Leigh Honeywell got a stark reminder of why she stopped going to the Defcon hacker convention. The security expert, whose background at companies like Microsoft, Symantec and Slack brought her to the show for nearly a decade, was waiting for a friend at Bally’s Las Vegas Hotel and Casino, which played host to the conference.
Alison DeNisco, techrepublic.com, August 10, 2017
Demand for cybersecurity professionals continues to rise, with the projected talent gap in the field reaching 1.8 million jobs by 2022. Those that take on these roles play a key role in the enterprise, as the average cost of a data breach worldwide is now $3.62 million.
Danny Palmer, zdnet.com, August 16, 2017
Falling victim to the global Petya cyberattack is set to cost Maersk, the world’s largest container ship and supply vessel operator, up to $300m in lost revenues. The Danish transport and logistics conglomerate — which has offices in 130 countries and almost 90,000 employees — revealed predicted losses due to the ransomware infection in its second quarter financial report.
Orion Cassetto, darkreading.com, August 11, 2017
The popular Game of Thrones series starts with the ominous warning that “Winter is Coming” and in the mythical Westeros, children are raised hearing stories of “the Long Night,” a winter that happened thousands of years ago and supposedly lasted a generation.