Cisco University: Elevate Your Cybersecurity, Network Security, Forensics, and Incident Response Skills

Cisco University: Elevate Your Cybersecurity, Network Security, Forensics, and Incident Response Skills

In my three-decade-long career, I have had the privilege of undergoing extensive training in various aspects of cybersecurity, network security, and computer forensics. With numerous certifications and over 900 hours of specialized training from the NSA and the National Cryptographic School (NCS), and more than 600 hours from the FBI and the FBI Academy in Computer Forensics, I have always been committed to staying at the forefront of this ever-evolving field. As a result, I’ve…

Read More

IBM on Future Cybersecurity: Passkeys, Deepfakes, Quantum Computing

IBM on Future Cybersecurity: Passkeys, Deepfakes, Quantum Computing

“The internet will be a lot safer in five years than it is today, thanks to technological advances that address common problems at scale.” This prediction by Chris Hockings, CTO of IBM Asia Pacific, might seem a bit ambitious given that AI-powered cybercrime is growing at an exponential rate, deepfake technology is enhancing social engineering attacks, and the power of quantum computing is on the horizon. But Hockings spoke with TechRepublic about how he believes…

Read More

RATs in the tunnel: Uncovering the cyber underworld.

RATs in the tunnel: Uncovering the cyber underworld.

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks.  Being a security researcher is…

Read More

How to Spot Phishing Lures | McAfee Blog

How to Spot Phishing Lures | McAfee Blog

Phishing attacks have all kinds of lures. And many are so tried and true that it makes them easy to spot. The target of a phishing attack is you. More specifically, your personal info and your money. Whether a scammer reaches out by email, with a text, or through a direct message, that’s what they’re after. And with a link, they whisk you off to a sketchy site designed to take them from you. Just…

Read More

Low Media Literacy: A Risk to Australia's Cybersecurity Landscape

Low Media Literacy: A Risk to Australia's Cybersecurity Landscape

A recent study by Western Sydney University, Adult Media Literacy in 2024, revealed worryingly low levels of media literacy among Australians, particularly given the deepfake capabilities posted by newer AI technologies. This deficiency poses an IT security risk, given that human error remains the leading cause of security breaches. As disinformation and deepfakes become increasingly sophisticated, the need for a cohesive national response is more urgent than ever, the report noted. Because AI can produce…

Read More

Why the UN Convention Against Cybercrime Requires a Second Look

Why the UN Convention Against Cybercrime Requires a Second Look

Cybercrime is escalating globally. Criminal groups are leveraging advanced technology to operate across borders, necessitating that law enforcement agencies have the capabilities to prevent, investigate, and prosecute these crimes while also protecting human rights. Effective international cooperation is essential to combat these threats and uphold shared values. However, the recently adopted UN Convention against Cybercrime falls short and requires more attention before ratification by member states. Concerns for human rights and liberal democracies values in…

Read More

The AI Revolution: Transforming Technology and Reshaping Cybersecurity

The AI Revolution: Transforming Technology and Reshaping Cybersecurity

Artificial Intelligence (AI) is revolutionizing government and technology, driving an urgent need for innovation across all operations. Although historically, local and state government systems have seen only incremental changes with limited AI adoption, today, a significant shift is occurring as AI is integrated across all government sectors. Benefits of AI Integration The benefits of these changes are evident. AI-powered systems analyze vast amounts of data, offering insights for better decision-making. Public services become more personalized…

Read More

SOCI Act 2024: Insights on Critical Infrastructure

SOCI Act 2024: Insights on Critical Infrastructure

A rise in ransomware incidents and the embrace of artificial intelligence are considered potential data risks facing Australia’s critical infrastructure organisations, according to a new report. This news comes as new cyber security rules under the Security of Critical Infrastructure Act 2018 come into force in August 2024. The Critical Infrastructure Edition of the 2024 Data Threat Report, by technology organisation Thales, found that ransomware incidents at critical infrastructure organisations are on the rise globally…

Read More

NIST's New Post-Quantum Cryptography Standards Announced

NIST's New Post-Quantum Cryptography Standards Announced

The U.S. National Institute of Standards and Technology this week unveiled three encryption algorithms designed to resist cyberattacks, which industry observers said are a positive step toward preventing cyberattacks that break current encryption methods. The Federal Information Processing Standard (FIPS) 203, 204, and 205 provide standards for general encryption and protecting digital signatures. They were derived from multiple submissions in NIST’s post-quantum cryptography standardization project. Quantum computers are rapidly increasing the ability for high-performance computing,…

Read More

Enabling Cyber Resiliency with NIST, Cisco Security, and Splunk

Enabling Cyber Resiliency with NIST, Cisco Security, and Splunk

Cyber resilience is a critical priority for any organization, especially for those within the US Public Sector. The need for this resiliency has never been greater for helping ensure the delivery of their mission and business outcomes. Cyber resiliency refers to an organization’s ability to prepare for, prevent, respond to, and recover from cyber incidents. Government agencies and other organizations need a robust cybersecurity framework and effective enterprise tools to achieve this. The NIST Cybersecurity…

Read More
1 2 3 4 5 6 22