INFOSECURITY NEWSLETTER

November 1, 2017

[White Paper] Understanding The Challenges of Cloud Monitoring and Security

In this new white paper, we examine how you can monitor cloud applications and platforms as part of your overall security program. We also discuss solutions you can deploy to get better visibility into who’s accessing your network and critical assets.

Read More

Everything You Need to Know About Grid Cyber Security Risks

Devesh Panchwagh, deltarisk.com, October 31, 2017

As we wrap up National Cyber Security Awareness Month (NCSAM), our final theme, “Protecting Critical Infrastructure From Cyber Threats,” considers the state of cyber security for essential systems and critical infrastructure. This week’s theme also transitions to the topics of November’s Critical Infrastructure Security and Resilience Month (CISR).

Read More

Top Threats Impacting Endpoint Security Decisions

Help Net Security Staff, helpnetsecurity.com, October 27, 2017

Enterprise Strategy Group surveyed 300 IT and information security professionals from large midmarket and enterprise-class organizations in order to examine the top threats impacting endpoint security, and the role artificial intelligence is playing in corporate cybersecurity strategies.

Read More

Q&A: Essential Tips for Solving the Worker Shortage and Starting a Career in Cyber Security

Leah Schmid, deltarisk.com, October 27, 2017

The week four theme of National Cyber Security Awareness Month (NCSAM) is “The Internet Wants You: Consider a Career in Cybersecurity.” We asked our Vice President of Human Resources, Leah Schmid, to weigh in on this topic. In this week’s blog, she offers her insights into the different issues surrounding the growing shortage of qualified cyber security professionals and what that means for the future, as well as some advice for people interested in a career in cyber security.

Read More

Malicious Chrome Extension Steals All Data

Zelikja Zorz, helpnetsecurity.com, October 30, 2017

There’s a glut of malicious Google Chrome extensions out there, but some are more harmful than others. The one that SANS ISC incident handler Renato Marinho has dubbed “Catch-All” falls in the former category.

Read More

I Forgot My Pin: An Epic Tale of Losing $30,000 in Bitcoin

Nick Ortega, wired.com, October 29, 2017

Latest version goes by the .asasin extension and is collecting information on users’ computer operating system and IP address. Locky authors have again retooled the highly persistent ransomware campaign with a new strain that performs reconnaissance on victims’ computers and goes by a new file extension name, PhishMe reports.

Read More

WannaCry Ransomware: Hospitals Were Warned to Patch System to Protect Against Cyber-Attack — But Didn’t

Danny Palmer, zdnet.com, October 27, 2017

The National Health Service (NHS) was left vulnerable to the WannaCry ransomware attack because, despite local health trusts being warned to patch their systems, many had failed to do so.

Read More

A Noble-Winning Solution to Cyber Security

Robert Hackett, fortune.com, October 14, 2017

Professor Richard Thaler this week collected a Nobel Prize for his insights into behavioral economics—the idea that, contrary to economic theory, humans are not rational actors when it comes to financial decisions, but can be nudged to make better choices. The most famous application of Thaler’s insight is a law that encourages firms to automatically enroll workers in 401K plans rather than require them to sign up.

Read More

IoT Cybersecurity Improvement Act Sets Low Bar for IoT Device Safety

Sally Johnson, techtarget.com, October 23, 2017

The IoT Cybersecurity Improvement Act sets a minimum security bar for selling IoT products to the federal government by eliminating default passwords and known vulnerabilities.

Read More

Examining the Three Classes of Cybersecurity Needs

Gaurav Banga, forbes.com, October 25, 2017

September 2017 witnessed a trifecta of mega-breaches: Equifax, SEC and Deloitte. Cybersecurity was already a messy and technical topic, and these disclosures have made it even more perplexing.

Read More
financial newsletterhealthcare newsletter
Infosecurity Newsletter Archive

June 2018: 6th

May 2018: 2nd, 9th, 30th

April 2018: 4th, 11th, 18th, 25th

March 2018: 7th, 14th, 21st, 28st

February 2018: 7th, 14th, 21st, 28th

January 2018: 3rd, 10th, 17th, 24th, 31st

December 2017: 6th, 13th, 20th

November 2017: 1st, 15th, 29th

October 2017: 4th, 11th, 18th, 25th

September 2017: 6th, 13th, 20th, 27th

August 2017: 2nd, 9th, 16th, 23rd, 30th

July 2017: 5th, 12th, 19th, 26th

June 2017: 7th, 14th, 21st, 28th

May 2017: 3rd, 10th, 17th, 24th, 31st

April 2017: 5th, 12th, 19th, 26th

March 2017: 1st, 8th, 15th, 22nd, 29th

February 2017: 1st, 8th, 13th, 22nd

January 2017: 4th, 11th, 18th, 24th

December 2016: 7th, 14th, 21st, 28th


top cyber incident pain points