Enhancing cybersecurity skills for the entire workforce must be a priority for cyber-resilience

Enhancing cybersecurity skills for the entire workforce must be a priority for cyber-resilience

Technology is not the only answer: An expert suggests improving the human cyber capacity of a company’s workforce plus cybersecurity technology offers a better chance of being safe. Image: iStock/vadimrysev Risk resulting from a cybersecurity event affects the entire organization. “As such, the cyber workforce—those responsible for preventing and responding to an attack—are no longer limited to just ‘the geeks in the basement,’” said James Hadley, CEO and founder of Immersive Labs, in an email…

Read More

Machine learning is a great tool for cybersecurity, but be cautious, expert says

Machine learning is a great tool for cybersecurity, but be cautious, expert says

Supervised and unsupervised machine learning are good ways to detect threats. But what’s the difference? TechRepublic’s Karen Roby spoke with Chris Ford, VP of product for Threat Stack, about supervised and unsupervised machine learning. The following is an edited transcript of their conversation. SEE: Hiring Kit: Video Game Programmer (TechRepublic Premium) More about artificial intelligence Christopher Ford: Supervised and unsupervised learning are techniques that help to facilitate different use cases within the sphere of machine…

Read More

Dark web prices drop for credit cards but soar for PayPal accounts

Dark web prices drop for credit cards but soar for PayPal accounts

Selling prices for stolen PayPal accounts have shot up by 194%, according to research by Comparitech. Image: Getty Images/iStockphoto The dark web acts as a virtual marketplace for a variety of ill-gotten or illegal items, including drugs, guns, phony documents, counterfeit currency, malware kits, and, of course, personal information. A hacker who obtains sensitive user data is likely to try to hawk it on the dark web. But as with any marketplace, prices vary depending…

Read More

Stay on top of your online security with our Protection Score

Stay on top of your online security with our Protection Score

How protected am I online?  Customers often ask us some version of this question. It’s a good question and in the past, there was no direct answer – only recommendations. For instance, we recommend online protection that goes beyond antivirus to include identity and privacy protection, as well as promoting safety best practices like using multi-factor authentication. We wondered if there was a simpler and easier way to advise customers how to better protect themselves.  A recent survey shows how important online security has become to consumers. We found that 74% of you have concerns about keeping your information private online.  57% want to be…

Read More

Data Breach Lawsuit Against Sonic Will Proceed

Data Breach Lawsuit Against Sonic Will Proceed

Litigation filed against American fast-food chain Sonic over a 2017 data breach has been allowed to proceed. Financial institutions brought a lawsuit against Sonic Corp after it emerged that financial data belonging to customers of the restaurant had been stolen in a cyber-attack. The attacker(s) installed malware on a point-of-sale system used at hundreds of Sonic franchises. In a data breach notice issued at the time of the attack, Sonic stated: “Sonic Drive-In has discovered that credit and debit card numbers may have…

Read More

US Considers Limiting CISA Director’s Term

US Considers Limiting CISA Director’s Term

The United States is considering putting a cap on the amount of time an individual can work in the role of director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA).  Bipartisan House lawmakers introduced legislation this week that proposes limiting the term of the top cybersecurity role to five years.  If passed into law, the proposed CISA Cybersecurity Leadership Act would also reaffirm that the role of CISA director requires Senate approval after presidential nomination. …

Read More

NCCoE Releases Cybersecurity Guide for First Responders

NCCoE Releases Cybersecurity Guide for First Responders

The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) has released the final version of a Cybersecurity Practice Guide for first responders.  The NIST Cybersecurity Practice Guide SP 1800-13, Mobile Application Single Sign-On: Improving Authentication for Public Safety First Responders (PSFRs) was developed in collaboration with industry stakeholders and NIST’s Public Safety Communications Research Lab.  To provide emergency care and support, PSFR personnel rely on mobile platforms to access public…

Read More

Microsoft warns of attacks targeting Office documents

Microsoft warns of attacks targeting Office documents

Affecting Windows desktops and servers, the attacks exploit an MSHTML vulnerability by using specially crafted Microsoft Office documents. Image: iStock/Simonkolton Microsoft has raised alarm bells over a new cyberattack that’s actively targeting Windows users by exploiting a security flaw through malicious Office documents. In a security update released on Tuesday, the software giant described its investigation into a remote code execution vulnerability in MSHTML that works through specially crafted Microsoft Office documents. SEE: Incident response policy (TechRepublic…

Read More

Executive Spotlight: Q&A with Chief Public Policy Officer, Tom Gann

Executive Spotlight: Q&A with Chief Public Policy Officer, Tom Gann

I’m back at it again with another round of our executive blog series. This week I had the privilege to speak with Tom Gann, our Chief Public Policy officer and he had some interesting things to say on the cyber security issues that are shaping public policy dialogue in Washington DC and other capitals around the world, and much much more. Q: What is one event in your life that made you who you are…

Read More
1 2,113 2,114 2,115 2,116 2,117 2,600