As we have seen in the headlines, insider threats are a constant challenge for government agencies. But the problem comes with one silver lining. Each time a successful insider threat strikes, it pushes agencies to bolster their cybersecurity programs. The National Industrial Security Program Operating Manual (NISPOM) Change 2 is an example of just that...Read More
As prices come down, virtual private networks (VPNs) are becoming a must-have tool for many small and medium-size business owners. The growing popularity is a reflection of the chaotic times in enterprise computing, marked by malware and ransomware targeting vulnerable systems and a decentralized work force of globetrotting employees juggling several gadgets at once.
More SMB data is now stored in the cloud, too, often leaving...Read More
Medical devices, such as such as pacemakers, insulin pumps and defibrillators, could become lethal in the hands of a hacker tampering with them remotely.
A new study that shows medical devices—and patients—are vulnerable to cyber attacks is a wake-up call for manufacturers, according to a Silicon Valley software company that sponsored the study.
A new ransomware attack created computer chaos worldwide—though primarily in Europe —on June 27. The outbreak, dubbed both GoldenEye and Petya by researchers, is being compared to WannaCry. While antivirus firms and IT departments struggle to get the outbreak under control, there’s still some debate about how it works and how it spreads. But in some ways, the virus is even more powerful, and more nasty, than WannaCry.
The list of victims is...Read More
The countdown has begun. In less than a year, tough new rules on data protection will come into effect for the European Union. For the first time, companies will be required to notify regulatory authorities, and potentially consumers, in the event of a significant cyber breach.
In elevating the rights of consumers, the EU General Data Protection Regulation (GDPR) represents a sea change in how companies will have to operate—and...Read More
Hurricanes. Earthquakes. Wildfires. Mother Nature’s extraordinary powers of destruction leave survivors struggling to put their lives back together.
Many survivors are under tremendous stress and more vulnerable to fraud. Criminals know it. After a natural disaster strikes, there often is an uptick in disaster fraud, charitable solicitations fraud, price gouging and contractor and vendor fraud, according to...Read More
The DocuSign malware attack that occurred in mid-May is noteworthy because it highlights a go-to tactic popular with cyber criminals at the moment: account takeovers.
Attackers will first steal email data or credentials and then use them to launch highly targeted phishing campaigns. The one-two punch targets anyone with an email address and is becoming increasingly common.
DocuSign confirmed...Read More
Malcolm Nance predicted Russian hackers were trying to influence the course of American politics in his book, The Plot to Hack America: How Putin’s Cyberspies and WikiLeaks Tried to Steal the 2016 Election.
Since then, the intelligence expert, historian and author has become the lead counter-terrorism expert for NBC News and MSNBC, analyzing the Russian hacking investigation and related news from the Capitol.... Read More
Do you know how often you use artificial intelligence tools every day?
Many people associate artificial intelligence or “AI” with robots and science fiction movies, but the reality is that if you use a cell phone, digital assistant or a computer, then you are likely already interacting with AI technology.
The point of most AI technologies is to make your life easier. To do that, they “listen...Read More
Preet Bharara, a former federal prosecutor known for fighting cyber crime, will speak at the 2017 Privacy XChange Forum Oct. 22-24 in Lake Las Vegas, Nevada.
He joins an incredible lineup of speakers, including intelligence expert Malcolm Nance and cyber security guru Bruce Schneier at the Privacy XChange Forum (PxF). Now in its fifth year, the forum brings together cyber security and industry leaders from around the world to shape the cyber security agenda for the year....Read More