November 29, 2017
In this webinar, we’ll take a look at 2017 cloud data breaches: what went wrong and how to avoid the same fate. What are some of the telltale signs a misconfiguration is going to put your critical assets at risk? How can you avoid a misconfiguration in the future? Join our team of cloud security experts for a 45-minute webinar to learn more about the steps you can take to improve your cloud security posture and keep your critical information protected.
Ryan Clancy, deltarisk.com, November 21, 2017
Managed security services providers (MSSPs) have risen in popularity. The new report, “Security Advisory Services Market by Service Type – Global Forecast to 2022,” indicates that the security advisory services market is expected to grow nearly 20 percent annually from USD $5.77 billion in 2017 to USD $13.57 billion by 2022.
Waqas Amir, hackread.com, November 28, 2017
Security researchers at the Austin based Anti-virus software firm Forcepoint have discovered a massive spam ransomware campaign in which the Scarab malware destroys all your files if you don’t pay the ransom, which is asked in Bitcoin. The campaign was started on 23rd November while attackers have used the largest email spam botnet on the internet called Necurs for distributing malicious emails.
Brian Barrett, wired.com, November 24, 2017
Amazon Echo and Google Home—and other devices that have Alexa and Google Assistant built in—are some of the most promising new technologies to come along in years. And they’re genuinely useful to have around, whether it’s to settle a bet or help out with a recipe. But it can also feel a little creepy to have a speaker in your house that’s always listening. What exactly is it doing with that info? Where does it go?
Gil Press, forbes.com, November 26, 2017
Like death and taxes, there are only two safe predictions about cybersecurity in 2018: There will be more spectacular data breaches and the EU General Data Protection Regulation (GDPR) will go into effect on May 25. But as the continuing digital transformation of our lives entails the ongoing digital transformation of crime, vandalism and warfare, 2018 could also bring a lot of new takes on old vulnerabilities, some completely new types of cyberattacks, and successful new defenses.
Dom Galeon, futurism.com, November 26, 2017
The advent of functioning quantum computers has been considered to present a threat to today’s encryption methods. On the other hand, these quantum systems might hold the key to keeping computers and the internet secure, thanks to quantum cryptography. A team of researchers from Duke University, Ohio State University, and Oak Ridge National Laboratory have tackled quantum encryption on a whole new scale.
Swati Khandelwal, thehackernews.com, November 21, 2017
In past few months, several research groups have uncovered vulnerabilities in the Intel remote administration feature known as the Management Engine (ME) which could allow remote attackers to gain full control of a targeted computer. Now, Intel has admitted that these security vulnerabilities could “potentially place impacted platforms at risk.”
Joe Hotchkiss, govtech.com, November 17, 2017
Local and state officials Thursday ceremonially “topped out” the steel frame of a $60 million cybersecurity training center scheduled to open next July. Workers on the Hull McKnight Georgia Cyber Innovation and Training Center actually put the final steel beam in place, on the highest point of the mid-rise building, Nov. 10. But Thursday’s gathering more formally recognized the progress of the facility, including a barbecue lunch to thank the project’s work crews.
Zeljka Zorz, helpnetsecurity.com, November 27, 2017
As the end-of-the-year holiday season approaches, many security researchers, consumer groups and even governments warn against buying specific products or, at least, to make an effort read up about potential risks before buying them.In the last year or so, security researchers have tested many smart toys, and found them wanting in the security and privacy department. Even the FBI is making an effort to educate consumers about the potential dangers of such toys.
Maarten Van Horenbeeck, hbr.org, November 21, 2017
It’s a common adage that employees are the weak link in corporate cybersecurity. But I believe they are also the best defense, if they are given policies that are easy to follow and not too numerous and complex. Employee security training and best practices need to be user friendly and simple to be effective.