What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2017-08-24 16:32:44 PODCAST: How inward focused network traffic analysis can help stop intruders in their tracks (lien direct) By Byron V. Acohido Traditional perimeter defenses-firewalls, antivirus software and malware scanners-are no longer sufficient. And it doesn't matter if you are a large, multinational organization or a start-up. If perimeter defenses were adequate, attacks wouldn't get through. But attacks are, and they're increasing. Take ransomware attacks for instance. We've seen a tremendous uptick in […]
Blog.webp 2017-08-24 15:57:11 INFOGRAPHIC: Data breaches, vulnerabilities spike in first half of 2017 (lien direct) For the most part, year-to-year this century, statistics about data breaches have steadily grown worse, and 2017 is no exception. The magnitude of data breaches is on track to exceed last year, based on a recent report by Risk Based Security Inc. Already, in the first six months of 2017, more than 6 billion records […]
Blog.webp 2017-08-23 16:58:10 GUEST ESSAY: Here\'s how \'software containers\' are providing the latest \'must-have\' security layer (lien direct) By Rani Osnat, Vice President of Marketing at Aqua Security Container technology enables organizations to build, deliver and run enterprise applications faster and more easily, efficiently and cost effectively than ever before. Compared to virtual machines (VMs), containers are much smaller, start up much faster, and have better performance. Related article: Why companies need fresh […]
Blog.webp 2017-08-19 18:21:58 NEWS THIS WEEK: Ukrainian hacker with tied to DNC hack surrenders; Uber agrees to improve privacy; Scottish paliament hacked (lien direct) By Byron V. Acohido In the news this week, a Ukrainian hacker called “Profexer” who built one of the tools used to penetrate the Democratic National Committee servers last year has turned himself in to authorities. The man, who first contacted Ukrainian police earlier this year, claims he wrote a piece of software called the […] Uber
Blog.webp 2017-08-18 14:15:07 PODCAST: A case for studying the \'why\' of network breaches instead of just the \'how\' (lien direct) By Byron V. Acohido Employees often are seen as the weakest link in cybersecurity. Breaches by hackers may hit the headlines, but in many instances human error (or intent) is responsible for the majority of attacks. IBM's 2016 Cyber Security Index reported that insiders carried out 60 percent of all attacks. Three-quarters of these attacks […]
Blog.webp 2017-08-16 20:20:40 Q&A: Why the HBO hack is destined to accelerate the fledgling cyber insurance market (lien direct) By Byron Acohido, Following on the heels of the two globe-spanning ransomware worms, the HBO hack-with its distinctive blackmail component-rounds out a summer of extortion-fueled hacks and destruction and theft of valuable data at an unprecedented scale. WannaCry and Petya raced around the planet demanding ransoms after locking up servers at hundreds of organizations. The HBO hackers […] Wannacry
Blog.webp 2017-08-16 18:04:05 PODCAST: Want to know where the No. 1 cybersecurity-focused VC is betting $300 million? Give a listen (lien direct) By Byron Acohido In 2016, venture capital firms invested in more startups than ever before. The year saw venture VC firms invest a total of $3.1 billion in 279 cybersecurity startups. This compares to $3.7 billion of investment in 272 startups in 2015 and $833 million in 117 startups in 2010. Levels of investment look […]
Blog.webp 2017-08-16 18:04:05 (Déjà vu) PODCAST: Want to know what the No. 1 cybersecurity VC firm is betting $300 million on? Give a listen (lien direct) By Byron V. Acohido In 2016, venture capital firms invested in more startups than ever before. The year saw venture VC firms invest a total of $3.1 billion in 279 cybersecurity startups. This compares to $3.7 billion of investment in 272 startups in 2015 and $833 million in 117 startups in 2010. Levels of investment […]
Blog.webp 2017-08-11 16:52:27 Why securing networks requires a mind shift in the C-suite and board rooms (lien direct) By Byron V. Acohido As technology has evolved, it's gotten bigger and more complex, making the job of information technology departments more difficult. Dealing with Windows, Macs, the cloud and the Internet of Things (IOT) means they have to manage more things in more places. I had the chance to discuss this with Phil Lieberman, […]
Blog.webp 2017-08-10 23:05:18 VIDEO: How phishers are coming after you - and what you should do about it (lien direct) By Byron Acohido The current cybersecurity climate makes it hard not to be cautious of phishing attacks. Forget reclaiming lost family fortunes or assisting Nigerian princes, today's phishing scams are targeted, complex and incredibly prevalent. It feels like a new, high-profile phishing attack is getting reported every other month. In May, Google Docs users were […]
Blog.webp 2017-08-10 15:23:20 PODCAST: Why securing \'third-party\' risks has become so crucial (lien direct) By Byron V. Acohido In the past couple of years, third-party risk has grown from a topic only discussed by cybersecurity circles to a companywide concern. The tipping point may have been in 2014 when Target's point-of-sale (POS) system was compromised, and the details of 110 million in-store customers were stolen. How did the hackers […]
Blog.webp 2017-08-04 17:41:56 PODCAST: Dell SecureWorks discloses how faked personas fuel targeted attacks (lien direct) By Byron Acohido In the wake of phishing attacks involving Google Docs and DocuSign, corporate awareness of socially engineered cybersecurity threats is at an all-time high. Naturally, this has led to an increase in employee training and awareness. This kind of action couldn't be more necessary. According to Software Advice, 39 percent of employees admitted […]
Blog.webp 2017-08-02 20:55:41 How a serial entrepreneur hopes to unleash full potential of the emerging cyber insurance market (lien direct) By Byron Acohido Serial entrepreneur and cybersecurity expert M. Ariel Evans is positioning her latest start-up to revolutionize the way insurance companies assess and price policies against cyber threats and how businesses protect themselves against cyber breaches. An Israeli-American residing in Tel Aviv, Evans is now chief executive officer of InnoSec, a company that analyzes […]
Blog.webp 2017-07-07 20:43:06 PODCAST: Tech advances arrive to help secure legacy industrials control (lien direct) By Byron Acohido Many critical infrastructure systems, such as those that control the electric grid, oil and gas refineries, and transportation, are now getting linked to the internet. That makes them easier to manage and maintain, but also could put them in the line of fire for cyber attacks. I recently discussed the issues involved […]
Blog.webp 2017-06-30 20:29:07 PODCAST: Why your browser presents a big risk (lien direct) By Byron Acohido While many organizations have set up defenses for malware that could come in through email, the browsers we use to access the internet might be of equal or greater risk. I spoke with Lance Cottrell, Ntrepid's chief scientist, about browser security-or lack of security-and what can be done to protect devices and […]
Blog.webp 2017-06-29 14:02:45 PODCAST: Former White House CIO - companies need cyber defense strategy (lien direct) By Byron Acohido Theresa Payton honed her cybersecurity skills as the White House's first female chief information officer, under President George W. Bush. Payton is now president and CEO of cybersecurity consulting company Fortalice Solutions. I had the chance to interview her at the recent Enfuse 2017 cybersecurity conference in Las Vegas. We discussed how […]
Blog.webp 2017-06-21 20:55:57 Three funadmental steps to begin addressing third-party risks (lien direct) By Byron Acohido Managing third party risk still does not still does not command a high priority in all too many organizations – even after the apocalyptic Target data breach of 2013 that routed through an HVAC vendor. But that's slowly beginning to change. There is a growing recognition of the sprawling exposures that are […]
Blog.webp 2017-06-19 14:52:10 Why WannaCry signals a coming wave of nation-state cyber weapon hacks (lien direct) By Byron  Acohido Companies would be remiss to downplay the profound implications of last month's headline-grabbing WannaCry ransomware attack. WannaCry was a mere harbinger; the tip of the iceberg. WannaCry happened a few weeks after the Shadow Brokers hacking collective stole dozens of the National Security Agency's ace-in-the-hole hacking tools. Shadow Brokers futilely tried to […] Wannacry
Blog.webp 2017-06-15 18:00:07 What you should know about the Top 5 free VPNs (lien direct) By Andrey Doichev (Editor's note: Andrey Doichev is a self-described VPN enthusiast who analyses and tests different VPN software. The full version of this article was originally posted here. Commentary and opinions are expressly Doichev's.) Who likes FREE Software? I sure do. And I reckon you do too! In times where ISPs can sell your […]
Blog.webp 2017-06-14 18:04:00 VIDEO: Why the NIST framework is so fundamental to network security (lien direct) By Byron Acohido Put aside the cyber threats, which continue to worsen. All any company decision-maker needs to do is pay heed to the intensifying regulatory environment to understand that network security has become a mission-critical operational issue. Consider that the Colorado Division of Securities is implementing 90 pages of new rules to clarify what […]
Blog.webp 2017-06-09 19:17:57 In the news: intel confirms Russians executed cyber attacks on election systems, officials (lien direct) (News reports aggregated by Byron Acohido) Russian military intelligence executed a cyber attack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials just days before last November's presidential election, according to an intelligence report. The top-secret National Security Agency document analyzes intelligence very recently acquired by the […]
Blog.webp 2017-06-08 02:11:33 PODCAST: Why companies should \'stop fearing the breach\' - and deal with \'continuous compromises\' (lien direct) By Byron Acohido Guidance Software is among the longest-established vendors in the cybersecurity sector. The Pasadena, California-based company got its start in 1997 by pioneering digital forensics software for law enforcement agencies seeking to extract evidence from computer hard drives-evidence that would stand up in court. Today that core competency remains at the heart of […]
Blog.webp 2017-05-04 22:00:27 PODCAST: How \'DNS\' drives the good, the bad and the nasty on the Internet (lien direct) By Byron Acohido When the internet was in its infancy, numeric IP addresses were being created and assigned in an increasing frenzy, and a way was needed for humans to make sense of it all. So a University of Southern California researcher named Paul Mockapetris, with help from a colleague, Jon Postel, invented something called […]
Blog.webp 2017-03-27 22:28:46 PODCAST: What all companies should know about Darknet exposures (lien direct) By Byron Acohido The Darknet is a vast part of the internet where most ordinary citizens will never tread. Google, Bing and GoDuckGo do not keep track of anything in the Darknet. Its web locations can only be reached if you're versed in using nonstandard communications protocols. With this in mind, I attended a talk […]
Blog.webp 2017-01-27 19:24:21 Video: privacy regulations stiffen in Canada, Europe (lien direct) By Byron Acohido As a partner at the Canadian law firm Borden Ladner Gervais, Éloïse Gratton advises her clients on legal, practical and ethical ways to protect an individual's privacy while conducting business nationally and internationally. She has testified before Canada's House of Commons and other federal bodies and conducted training workshops attended by judges […]
Blog.webp 2017-01-09 20:39:33 NYDFS cybersecurity rules have teeth, set precedent (lien direct) By Byron Acohido 'Twas a few days before Christmas 2016, and the banking and insurance industries were in a tizzy. The New York State Department of Financial Services was on the verge of spoiling the holidays for these verticals by implementing an unprecedented set of rules requiring financial services firms to adopt first-class cybersecurity policies […]
Blog.webp 2017-01-02 20:55:54 Why we need to downplay intense rivalries - to improve cybersecurity (lien direct) By Byron Acohido Imagine if no one in your organization felt compelled to compete for an operating budget, and each and every employee fully understood and embraced cybersecurity best practices? Sound like a far-fetched fantasy? A security consultancy called New Context Services actually is promoting this radically new type of corporate culture, which it calls […]
Blog.webp 2016-12-30 20:07:37 Video: cyber insurance can offset data breach risk (lien direct) By Byron Acohido More organizations than ever, especially small and medium-size ones, will seek to account for the fast-rising risk of suffering a cyber attack in 2017 by buying a cyber liability policy. The general state of security of U.S. business networks remains anemic when compared to the vast and growing capabilities of hackers with […]
Blog.webp 2016-11-30 20:24:32 Video: NY holds companies accountable for cybersecurity (lien direct) By Byron Acohido Banks and other financial services companies wishing to do business in the state of New York will soon have to prove they are using first-class cybersecurity policies and practices. Officials at the New York State Department of Financial Services (NYDFS) were so concerned that a catastrophic network hack in the financial sector […]
Blog.webp 2016-10-18 20:29:41 Video: good guy Chris Vickery hunts exposed data (lien direct) By Byron Acohido Two more stunning disclosures from self-styled internet watchdog Chris Vickery underscore how organizations continue to routinely expose sensitive data in the cloud, risking dire consequences. “My findings clearly demonstrate that data breaches happen more often than the general public realizes, and companies are quick to deny and cover up these issues,” Vickery […]
Blog.webp 2016-10-09 20:54:50 Why dormant SSH keys represent a nightmarish exposure (lien direct) By Byron Acohido A nightmarish new exposure affecting virtually all major networks is just beginning to get the attention of the security community. It involves a fundamental networking protocol-Secure Shell, or SSH. Invented in 1995 by a Finnish programmer named Tatu Ylönen, SSH is an encrypting routine that enables one software application to securely connect […]
Blog.webp 2016-09-15 17:26:00 How open source flaws pose a rising threat to all businesses (lien direct) By Byron Acohido Arguably the biggest security blind spot in just about every business network is something too few security executives are aware of, much less focusing on: open source software vulnerabilities. This truism first rose to the fore in 2014 with the flurry of malicious activity following the discovery of gaping defects in three […]
Blog.webp 2016-08-10 22:00:59 Machine learning shows promise for improving cyber defenses (lien direct) By Byron Acohido LAS VEGAS — The cyber security sector  generates mountains of data. Security Information & Event Management, or SIEM, systems, like Splunk, generate logs of all network traffic. Threat data pours in from next generation firewalls, endpoint security systems, intrusion prevention and  detection systems and vulnerability management systems. A growing crop of threat […]
Last update at: 2024-04-29 10:07:48
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter