INFOSECURITY NEWSLETTER

August 23, 2017

Seven Keys to Strengthen Your Cybersecurity Culture

Dan Lohrmann, govtech.com, August 20, 2017

While running on my treadmill on Thursday morning, August 17, 2017, I was watching CNBC’s Squawk Box, as David Novak, co-founder and former CEO of YUM Brands, came on the show as a guest. He was asked how he was so successful at growing such a powerful set of global YUM Brands with great results including names like Pizza Hut, Taco Bell, Burger King and others.

Read More

Incident Response Best Practices: What You Can Expect During the First Call

Andrew Cook, deltarisk.com, August 18, 2017

Imagine this scenario: you’ve just discovered your network has been breached. You need to get a handle on the situation quickly but you’re still trying to figure out what happened. What are the incident response best practices you should follow?

Read More

It’s Baaaack: Locky Ransomware is on the Rise Again

Bill Brenner, nakedsecurity.com, August 17, 2017

Locky was once among the most dominant strains of ransomware. Over time, it receded from view, replaced by ransomware such as Cerber and Spora. But in the last couple of weeks, Locky has returned. Last week it sported a new extension: .diablo6. This week researchers are seeing more new variants, now with a .lukitus extension.

Read More

Anonymous Hacker Says They Stole 1.2 Million NHS Patients’ Data

David Bisson, grahamcluley.com, August 22, 2017

A member of the Anonymous hacking collective claims to have stolen data belonging to 1.2 million patients of the United Kingdom’s National Health Service (NHS). The breach affected swiftQueue, a software provider of dashboard and metrics solutions to healthcare clinics.

Read More

8 Top Cyberattack Maps and How to Use Them

Steve Ragan, csoonline.com, August 21, 2017

Cyber-attack maps can be fun to look at, but are they useful? As usual, when it comes to security context is key, so CSO looked at eight of the web’s most popular cyber-attack maps. While the maps themselves are mostly eye candy with limited context, there are some creative ways they can be used.

Read More

These Women Want to Fix Cybersecurity’s Massive Gender Gap

Alfred Ng, cnet.com, August 18, 2017

Last year, Leigh Honeywell got a stark reminder of why she stopped going to the Defcon hacker convention. The security expert, whose background at companies like Microsoft, Symantec and Slack brought her to the show for nearly a decade, was waiting for a friend at Bally’s Las Vegas Hotel and Casino, which played host to the conference.

Read More

10 Bad Habits Cybersecurity Professionals Must Break

Alison DeNisco, techrepublic.com, August 10, 2017

Demand for cybersecurity professionals continues to rise, with the projected talent gap in the field reaching 1.8 million jobs by 2022. Those that take on these roles play a key role in the enterprise, as the average cost of a data breach worldwide is now $3.62 million.

Read More

Petya Ransomware: Cyberattacks Cost Could Hit $300M for Shipping Giant Maersk

Danny Palmer, zdnet.com, August 16, 2017

Falling victim to the global Petya cyberattack is set to cost Maersk, the world’s largest container ship and supply vessel operator, up to $300m in lost revenues. The Danish transport and logistics conglomerate — which has offices in 130 countries and almost 90,000 employees — revealed predicted losses due to the ransomware infection in its second quarter financial report.

Read More

Breaches are Coming: What Game of Thrones Teaches About Cybersecurity

Orion Cassetto, darkreading.com, August 11, 2017

The popular Game of Thrones series starts with the ominous warning that “Winter is Coming” and in the mythical Westeros, children are raised hearing stories of “the Long Night,” a winter that happened thousands of years ago and supposedly lasted a generation.

Read More
financial newsletterhealthcare newsletter
Infosecurity Newsletter Archive

June 2018: 6th

May 2018: 2nd, 9th, 30th

April 2018: 4th, 11th, 18th, 25th

March 2018: 7th, 14th, 21st, 28st

February 2018: 7th, 14th, 21st, 28th

January 2018: 3rd, 10th, 17th, 24th, 31st

December 2017: 6th, 13th, 20th

November 2017: 1st, 15th, 29th

October 2017: 4th, 11th, 18th, 25th

September 2017: 6th, 13th, 20th, 27th

August 2017: 2nd, 9th, 16th, 23rd, 30th

July 2017: 5th, 12th, 19th, 26th

June 2017: 7th, 14th, 21st, 28th

May 2017: 3rd, 10th, 17th, 24th, 31st

April 2017: 5th, 12th, 19th, 26th

March 2017: 1st, 8th, 15th, 22nd, 29th

February 2017: 1st, 8th, 13th, 22nd

January 2017: 4th, 11th, 18th, 24th

December 2016: 7th, 14th, 21st, 28th


top cyber incident pain points