Report prepared by the New York Cyber Task Force examines the leading cyber defense challenges and finds that coordination between government agencies and private business must be revamped. Read More
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
As part of a Digital New Deal, cybersecurity bootcamps will play a pivotal role in improving the earning potential of professionals in a space that is desperately looking to fill roles. Read More
Challenge in securing critical national infrastructure (CNI) can be boiled down to the fact that many of these systems were never designed to be connected to the Internet and integrated with a slew of other solutions and devices. Read More
Ponemon and WhiteSource report on application security indicates that most large enterprise-scale organizations feel that their portfolio of applications has become more vulnerable recently. Read More
Report from Mandiant mapped out recent cyber attacks against FTA and finds it likely that more organizations have been compromised. CISA has issued a joint advisory with Australia, New Zealand, Singapore and the UK. Read More
Law firm associated with Donald Trump and half of Fortune 500 companies leaked 100 GB of confidential client information in a third-party data breach linked to Clop ransomware. Read More
Kia Motors America suffered a suspected DoppelPaymer ransomware attack that shut down internal and customer-facing systems. Hackers demanded 404 Bitcoins worth about $20 million. Read More
It's not a surprise that there has been a significant increase in healthcare cyber attacks, but the numbers revealed by a new Bitglass study are nevertheless eye-popping: an increase of over 55% in 2020. Read More
Popular Android file-sharing app SHAREit with over a billion downloads has a security flaw that could leak users’ sensitive information and allow remote code execution. Read More
Learn why our brains are destined to eventually fall for phishing attacks and how cybercriminals have adapted to modern work practices to make phishing emails more successful. Read More