January 2019

The last thing any business needs is a swarm of myths and misunderstandings seeding common and frequent errors organizations of all sizes make in safeguarding data and infrastructure. Cybersecurity plays an integral role in the realm of good business models. You’d be hard pressed to come across an enterprise which doesn’t have some form of […]

by

This month’s round up from the world of cyber security features news that University Hospitals of Morecambe Bay NHS Trust has been hit by more than 140 cyber attacks in the last five years. Elsewhere, a number of digital health firms have received Cyber Essentials Plus certification. FOI reveals impact of cyber attacks on University Hospitals […]

by

Oakland Transforms City Services for Residents and Saves $1 Million Using OutSystems Your City Needs a Real-World Knowledge Graph in 2019 Keeping Residents Informed: An Emergency Manager’s Guide to IPAWS Alerting … read more at: http://www.govtech.com/security/San-Antonio-Planning-New-Cybersecurity-Operations-Center.html

by

Industrial control system cybersecurity is today largely focused on securing networks, and efforts largely ignore process control equipment that is crucial for plant safety and reliability, leaving it woefully vulnerable, an expert warns. In a recently published series of three white papers collaboratively produced by industrial control system (ICS) cybersecurity firm Dragos and General Electric […]

by

At RSA on March 4, 2019 there will be 50,000 cybersecurity nerds converging on San Francisco who have an amazing amount of knowledge and experience. Every year I attend RSA in order to learn as much as possible to capture knowledge to help CISOs do a better job. I focus my efforts by identify three […]

by

WASHINGTON (Reuters) – The U.S. government on Wednesday warned that a hacking group widely known as cloudhopper, which Western cybersecurity firms have linked to the Chinese government, has launched attacks on technology service providers in a campaign to steal data from their clients. The Department of Homeland issued a technical alert for cloudhopper, which it […]

by

The hack by Russian spies on the offices of the Organisation for the Prohibition of Chemical Weapons in the Netherlands has exposed some of the techniques commonly used to infiltrate computer networks by espionage agencies. But its brazen nature and the GRU’s decision to resort to a so-called “close access” hacking method says a lot about the motivation behind it […]

by

Researchers from Kaspersky Lab have uncovered multiple attempts to infect foreign diplomatic entities in Iran with Homebrew spyware. Homebrew is a free and open source software package management system. According to Kaspersky, the attacks seem to be employing Remexi, a type of Trojan that opens a backdoor on the compromised machine. Kaspersky Lab products detect […]

by