INFOSECURITY NEWSLETTER

August 30, 2017

Cybersecurity 101: How Universities are Dealing With Hackers

Alfred Ng, cnet.com, August 27, 2017

Cybersecurity 101: How Universities are Dealing With Hackers
As thousands of freshmen move into their dorms for the first time, there are plenty of thoughts rushing through their minds: their first time away from home, what cringey nickname they’re gonna try to make a thing, if there are any parties before orientation kicks off.

Read More

Why the Honor Code Among Hackers Has Broken Down

Jeff John Roberts, fortune.com, August 26, 2017

The honor code among hackers has broken down. That’s the opinion of Christopher Ahlberg, the CEO of Recorded Future, a company that places moles in chatrooms where cyber-criminals gather, and uses machine learning to predict attacks.

Read More

Incident Response Best Practices: What You Can Expect During the First Call

Andrew Cook, deltarisk.com, August 18, 2017

Imagine this scenario: you’ve just discovered your network has been breached. You need to get a handle on the situation quickly but you’re still trying to figure out what happened. What are the incident response best practices you should follow?

Read More

The Current State of Government Cybersecurity is ‘Grim,’ Report Says

Conner Forrest, techrepublic.com, August 24, 2017

When it comes to cybersecurity readiness, US government organizations aren’t doing so hot. In a recent report from SecurityScorecard comparing the security practices of 18 industries, government ranked no. 16.

Read More

Outside Attacks Caused Almost Half of Data Breaches in July

Joseph Goedert, healthdatamanagement.com, August 22, 2017

Data breaches in the healthcare industry were most likely caused by outside hacking in July, the first month in 2017 in which threats from outside healthcare organizations exceeded insider breaches, according to Protenus, a security firm that tracks industry breaches.

Read More

Popular Robots are Dangerously Easy to Hack, Cybersecurity Firm Says

Jeremy Kahn, bloomberg.com, August 22, 2017

Some of the most popular industrial and consumer robots are dangerously easy to hack and could be turned into bugging devices or weapons, IOActive Inc. said. The Seattle-based cybersecurity firm found major security flaws in industrial models sold by Universal Robots, a division of U.S. technology company Teradyne Inc.

Read More

Interest in Cyberinsurance Grows as Cybercrime Targets Small Businesses

Marissa Lang, sfchronicle.com, August 28, 2017

Ajay Bam is more tech-savvy than the average small-business owner. A coder by training, Bam started a business that delves into deep areas of artificial intelligence and machine learning. And yet, Bam said, he wasn’t able to foresee or fend off a cyberattack that nearly sank his startup, Viryll, a service for online marketers, earlier this year.

Read More

How Open Source Analytics can Boost Your Cybersecurity Arsenal

Fedscoop Staff, fedscoop.com, August 28, 2017

Data growth never stops and the sheer volume and variety of this data has challenged organizations to makes sense of it all. Over the last few years, these groups have been turning to big data solutions to extract valuable insights and actionable intelligence from these massive new sets of data.

Read More

Firm Sees ‘Overwhelming Response’ to Cybersecurity Training Program

Mike Akers, lasvegassun.com, August 29, 2017

When someone looks to change career paths and get into a new industry, it can be tough. Nevada has tapped a company to help make that transition easier for those seeking work in the technology sector.

Read More
financial newsletterhealthcare newsletter
Infosecurity Newsletter Archive

June 2018: 6th

May 2018: 2nd, 9th, 30th

April 2018: 4th, 11th, 18th, 25th

March 2018: 7th, 14th, 21st, 28st

February 2018: 7th, 14th, 21st, 28th

January 2018: 3rd, 10th, 17th, 24th, 31st

December 2017: 6th, 13th, 20th

November 2017: 1st, 15th, 29th

October 2017: 4th, 11th, 18th, 25th

September 2017: 6th, 13th, 20th, 27th

August 2017: 2nd, 9th, 16th, 23rd, 30th

July 2017: 5th, 12th, 19th, 26th

June 2017: 7th, 14th, 21st, 28th

May 2017: 3rd, 10th, 17th, 24th, 31st

April 2017: 5th, 12th, 19th, 26th

March 2017: 1st, 8th, 15th, 22nd, 29th

February 2017: 1st, 8th, 13th, 22nd

January 2017: 4th, 11th, 18th, 24th

December 2016: 7th, 14th, 21st, 28th


top cyber incident pain points