By: Wedge Greene
The First Cyber War Recently it seemed likely that we were on the verge of the first, global cyber war. Large DDoS attacks that gradually escalated over the last 12 months gave rise, in
mid-October, to a massive, prolonged, sophisticated, multi-front attack on Internet infrastructure. Now it appears this was malicious and not a state-supported attack. But this should not make us
more relaxed. Before this fall, several years of successful and widespread state sponsored data hacking only resulted in squirreling away data for the attacker’s future advantage…
» read this article
By: Tim Young
Fair warning: I’m about to make a reference to American electoral politics. But wait! Don’t click away! It’s not what you think. I’ll reference no candidate, successful or otherwise, by name,
and this won’t be an article about Wikileaks or hacks by foreign governments or anything like that. So you can save all of those conversations for your uncomfortable Thanksgiving dinners. I’m
talking about something else entirely. One bright spot about our overly long presidential campaigns is that they can teach those willing to learn about how the system works, warts and all…
» read this article
By: Wedge Greene, Trevor Hayes
Planners today are well acquainted with a positive feedback system. When coupled to a formal game scenario, one side’s advancing move becomes the baseline for the alternate players counter and
then advance. An arms race is a classic example. Cybersecurity is a classic arms race, but with many more opponents. Today’s cybersecurity game is far more complex than was the two player
nuclear arms race. This cyber-arms race can become as deadly as any other when we consider that we are protecting computer-controlled infrastructure from serious disruption and failure…
» read this article
By: Alan Zeichick
I can’t trust the Internet of Things. Neither can you. There are too many players and too many suppliers of the technology that can introduce vulnerabilities in our homes, our networks – or
elsewhere. It’s dangerous, my friends. Quite dangerous. In fact, it can be thought of as a sort of Fifth Column, but not in the way many of us expected. Merriam-Webster defines a Fifth Column as “a
group of secret sympathizers or supporters of an enemy that engage in espionage or sabotage within defense lines or national borders…
» read this article
By: Gabby Nizri
According to ongoing research conducted by the Breach Level Index, more than 3.5 million data records are lost or stolen every single day. Furthermore, the costs and ancillary damages stemming
from security breaches also continue to rise. In fact, the 2016 Ponemon Cost of Data Breach report revealed that the average cost of just one security breach has risen to a whopping $4 million.
Perhaps more noteworthy, however, was the study’s demonstration of a direct correlation between how quickly an organization can identify and contain data breach incidents, and their ability to
mitigate subsequent financial consequences…
» read this article
By: Max Pruger
If you have been monitoring recent IT news events, you are probably aware of one of the most problematic threats impacting cybersecurity today - Ransomware. The growing concern over this
potentially devastating malware targets victims by encrypting their computer files and demanding that they pay a financial ransom in order to receive a code that permits the recovery of their
information. Recent research from security solution provider Kaspersky Labs noted that ransomware attacks have now surpassed advanced persistent network (APT) attacks as the premier threat to
business IT infrastructure today…
» read this article
By: Dave Larson
…
» read this article
By: Tim Young
“If you have built castles in the air, your work need not be lost; that is where they should be. Now put the foundations under them.” - Henry David Thoreau, Walden I know what Thoreau was
getting at here. We should dream boldly and then work vigilantly to make those dreams a reality in order to avoid turning a worthy goal into a foolish, abstract pursuit. But on a different level, I
love how this quote applies to security in a virtualized, cloud-based, IoT-loving, decentralized world. We have scattered our treasures into the wind, confident that they will be there when we want
them…
» read this article
By: Jim Schakenbach
With all the talk of hacking, security, and fraud in the news this month, it seems fitting to start off with a review of some of the more notable news surrounding security issues and privacy.
As robocalling quickly metastasized across the country this year, service providers found themselves inundated with consumer complaints. YouMail took a two-step approach to solving the problem,
starting with a new application program interface (API) that enables telecom carriers, private branch exchange (PBX) providers, and third-party developers to programmatically determine whether a
given phone number is an undesirable robocaller…
» read this article