Cybersecurity has been a decades-long “grey rhino” in the wings of this “black swan” event. Last year, a Tokopedia data breach jeopardised more than 15 million user accounts, and cybercrime accounted for 43 percent of all crime in Singapore. Interconnectivity in a digital landscape may bring greater agility and convenience to manufacturers but the same benefits apply to malevolent players which are now no longer encumbered by geography.
Much like multi-layered anti-COVID measures, from defense (face masks and hand sanitisers) to prevention (lockdowns), rapid detection (PCR kits), and a cure (vaccines and antiviral drugs), corporations need to apply the same robust approach to protecting critical infrastructure.
Be able to answer these 5 questions after an attack
Ransomware is a top agenda item for executives and board of directors with organizations across the globe. Jim McGann presents five questions that every organization, whether a global enterprise or a micro-business, needs to have answers to with regards to this threat.
In the past, ransomware attacks were less common and easier to combat, however, today with the rise of bitcoin and ransomware as a service, attacks are more common than ever.
Additionally, cyber criminals used to rely on simple business email compromise attacks and send out thousands of infected emails hoping someone would innocently click. Today, these bad actors have become far more sophisticated, utilizing machine learning and hidden approaches that easily circumvent existing security applications.
In cybersecurity, the sky really is falling
You’ve probably seen enough movies or television shows to recognize that phrase; it’s most commonly taken as a sign that the messenger is insane in some way. Of course, the world isn’t coming apart. Look around us. It’s all still here.
Yet even as we acknowledge that, we know on some level it isn’t true. Whatever your thoughts on environmental destruction, COVID-19, social justice, and other pressing issues of the moment, you can’t deny that people don’t have at least some cause for feeling despair. This also applies to cybersecurity. A cursory glance around would lead any rational person to realize the severity of the problem, but plenty of people walk around pretending the sky isn’t falling.
5 Steps to Protecting Federal Data Repositories in the Cloud
From ransomware to exfiltration, cybersecurity attacks are targeting sensitive government data. Here’s a reliable approach to protecting mission-critical information.
Federal government organizations are storing, accessing and sharing more of their data in the cloud. Federal cloud-computing contracts were expected to grow by $500 million year over year to reach $6.6 billion in fiscal 2020, and then increase to $8.5 billion by fiscal 2023, according to Bloomberg Government. The cloud gives agencies the flexibility, for example, to allow employees to work remotely.
Tracking the gains of women in the cybersecurity field
While the cybersecurity industry has made strides in filling the diversity gap, it remains an issue in several aspects, including a lack of female representation.
The Women in CyberSecurity (WiCyS) conference, which brings together women and allies from cybersecurity industries, academia, government, nonprofits and research, is part of an effort to change that.
The conference is set to return in person for its eighth annual conference, held Sept. 8-10 in Denver, Colorado, backed by high-profile sponsors ranging from Adobe and Cisco to Google and the National Security Agency.
Dallas ISD data breach may have exposed Social Security numbers
The personal information and Social Security numbers of Dallas ISD students, alumni and staff may have been exposed in a data breach discovered last month.
While DISD officials don’t believe the stolen information has been shared or sold, they can’t be “100 percent certain” until further forensic analysis has been completed.
Read more Cyber Security News at https://que.com/tag/cybersecurity/