November 2017

The Defense Information Systems Agency has asked industry to submit comments on a business case analysis about threat indicator sharing capabilities that can support DISA’s cybersecurity portfolio. DISA said in a FedBizOpps notice posted Tuesday it will collect and use feedback in efforts to acquire a machine-to-machine technology platform designed to facilitate exchange of cyber threat indicators. […]

by

A U.S. Navy MH-60S Sea Hawk helicopter assigned to the Indians of Helicopter Sea Combat Squadron (HSC) 6 prepares to land on the flight deck of the aircraft carrier USS Theodore Roosevelt (CVN 71) in the Indian Ocean Nov. 24, 2017. Photo courtesy of U.S. Defense Dept. The increasing frequency and widening attack vector of […]

by

Threat hunting, in Deloitte’s definition, is the active search for cyber adversaries that have slipped past other defences. With the developing sophistication of ‘low and slow’, it said, and the growing impact of data breaches, the need for threat hunting is dramatically increasing. The aim is to inspection the IT environments of Deloitte clients to […]

by

Global banks need to do more to protect themselves from cyber attacks after a “significant evolution” in the threat level in the last 18 months, according to the SWIFT global payments network. Hackers are deploying increasingly sophisticated ways of breaching banks’ cyber defenses to launch finely orchestrated attacks, SWIFT said in a report co-written with […]

by

The cybersecurity market is expanding rapidly — to the tune of $1 trillion in global spending expected over the next five years. That means a lot of new market entrants. While venture capital is pouring into cyber startups, major tech brands are also marching onto the field. Amazon Web Services (AWS) is the newest big name […]

by

In “How to sell cybersecurity to your executive team,” I discussed strategies to sell cybersecurity to your board of directors, executives, and business leaders using a standards-based approach. Ultimately, this strategy would lead to you receiving a larger cybersecurity budget. Ample security budgets are rare, but by speaking the executive team’s language, using metrics and […]

by

A considerable number of articles cover machine learning and its ability to protect us from cyberattacks. Still, it’s important to separate the hype from the reality and see what exactly machine learning (ML), deep learning (DL) and artificial intelligence (AI) algorithms can do right now in cybersecurity. Shutterstock First of all, I have to disappoint […]

by

On Monday, the Justice Department unveiled an indictment of three Chinese nationals employed by Chinese cybersecurity firm Boyusec (博御信息), charging them with hacking into the computer systems of Moody’s Analytics, Siemens AG, and GPS developer Trimble Inc. to steal confidential business information “for the purpose of commercial advantage and private financial gain.” A Pittsburgh grand […]

by