Cyber security the biggest priority for finance firms
The survey of 504 senior managers found that despite cyber-attacks being a top concern in the financial sector, confidence is at a high amongst financial services professionals, with 94 per cent believing that they are well-equipped to defend against attacks. The study also found that data and security systems are a top priority for senior managers in the public sector, with this being cited by 79 per cent of respondents, whilst 88 per cent believe that they have a strong line of defence when it comes to cyber-attacks.
The CFO and cyber security: Staying resilient in the age of digital
More and more, the CFO is starting to play an important role in advising other board members on the possible financial impact of a data breach, ensuring that sufficient funds are allocated for preventing and containing potential incidents. To be able to do this effectively, CFOs require an increased knowledge on how cyber threats are managed, as well as having an understanding of cyber security risk, and that means working a lot more closely with security experts.
The Big Hack Attack
Cyber criminals have become increasingly sophisticated, and all financial services firms are ripe targets for frauds. In 2016, the FBI’s Internet Crime Complaint Center received almost 300,000 complaints for almost $1.3 billion in losses. According to the IBM X-Force Threat Intelligence Index, the financial services sector was attacked more than any other industry that year. The most pervasive scams involve phishing, ransomware, malware and denial-of-service attacks.
90% Of Healthcare IT Pros Raising Cyber Security Budget
It seems health systems executives are not quite sold on new tech’s ROI, whereas they are firmly planted in provable cyber security solutions. This decision is particularly crucial in an industry containing patient data and scores of other sets holding personally identifiable information (PII).
Are Orgs Filling Necessary Healthcare Cybersecurity Roles?
One-third of payers surveyed said they currently have an established cybersecurity program manager, and 44 percent reported they planned to recruit a candidate for the role in 2018. Just over half of all respondents said they do not conduct regular risk assessments, while 39 percent stated they do not conduct regular firewall penetration testing. Nearly all surveyed C-suite members – 92 percent – said potential data breach threats and cybersecurity itself are still not key focus areas for their boards of directors.
To fight cyber crime, we need swords, not just shields
We’re now engaged in asymmetrical warfare, fighting super-empowered individuals and groups that are wreaking havoc on American society from abroad. […] Our decades-old cybersecurity model, focused almost entirely on passively blocking malicious software and spam, is broken and beyond repair. It is time to embrace a new approach: turning the tables on the attackers and making them pay. It’s called active defense.
Europe Confronts Hybrid Combat
Most of the Nordic and Baltic countries in Europe are considering a total defense concept. This entails close linkage of military capabilities restricted to use in war with civil cyber defense, law enforcement and the cybersecurity industry to overcome the advantages of criminal or nation-state-sponsored attackers and to keep or regain information dominance.
This Team Is a Lean, Mean Cyber Crime-Fighting Machine
The human factor is important in this equation. It is vital for defenders to know their enemies—especially how they think. Attackers know very well how to exploit the vulnerabilities of security technologies. Furthermore, they are aware of how unprepared many organizations are to react to an attack or even coordinate efforts. Hackers try to get in where they are least expected. If defenders do not know how a hacker thinks or acts, then they will only be in an onlooker’s position.
Overnight Cybersecurity: Congress faces pressure over election cybersecurity | Agencies race to bolster email security | FTC approves settlement over Lenovo privacy charges
Congressional efforts to secure election systems from cyberattacks are picking up steam with lawmakers under pressure to prevent hacks in the 2018 midterms. After the revelation that Russia tried to probe election systems in 21 states in the 2016 election, security experts, state officials and others demanded federal action to help states upgrade outdated voting machines and bolster security around voter registration databases.
David Ignatius: Iran poses a significant cyberthreat
The FBI concluded that from 2012 to 2013, the Iranian operation “locked hundreds of thousands of banking customers out of accounts for long periods of time and resulted in tens of millions of costs to remediate,” the Carnegie analysts explain. Many financial institutions that had been hit by the Iranians said little about the attacks, to avoid worrying customers or shareholders.
Former Mossad Chief: ‘Cyberattacks the New Nuclear Weapons’
“Last year, I was in the United States a week after then-President Obama ordered the FBI to investigate the extent of Russian interference in the American elections,” Pardo said. “I asked one of the senior officers there what it would mean for the United States as a country if it was discovered that such interference had taken place, but he couldn’t answer. This is exactly the problem – it could have been committed by a government, or by a lone wolf. A kid with 150 IQ could cause damage that a fighter pilot couldn’t.”
Govt could tax social media firms for not enabling encryption backdoors, hints Wallace
Talking about why rash measures on part of the government could undermine cyber security of the UK as a whole, Jonathan Evans, an ex MI5 chief who retired in 2013, said that while the use of encryption has hampered the ability of security agencies to access communications between terrorists, banning encryption altogether would also impact the cybersecurity of the society as a whole.
How to Checkmate IoT Attacks
Two of the biggest standout IoT-related security initiatives are the federal Comply to Connect (C2C) and Continuous Diagnostics and Mitigation (CDM) programs. The Defense Department and the Department of Homeland Security, respectively, drove the creation of these measures. C2C and CDM are not niche programs narrowly focused on the IoT in the government, which makes them useful models for any large organization that wants to account for the IoT’s wide reach within the scope of existing security missions and requirements.
NSA’s top talent leaving because of low pay, slumping moral and unpopular reorganization
The National Security Agency is losing its top talent at a worrisome rate as highly skilled personnel, some disillusioned with the spy service’s leadership and an unpopular reorganization, take higher-paying, more flexible jobs in the private sector. Since 2015, the NSA has lost several hundred hackers, engineers and data scientists, according to current and former U.S. officials with knowledge of the matter. The potential impact on national security is significant, they said.
Space: Keeping ELINT In Orbit
Little is said about ELINT satellites because, more than photo satellites, these electronic listening birds can potentially pick up anything (radar, radio, whatever) that is broadcast from anywhere. This is an alarming possibility for producers and users of military electronics. Not knowing exactly what those enemy ELINT satellites are picking up is very disturbing. China, for example, has launched Cyber War type hacking attacks on American companies involved with collecting and analyzing Mentor satellite data.
Iranians resist internet censorship amid deadly street protests
The clampdown has resulted in Tor users climbing from around 6k at the beginning of December to over 10,000 at the last count as citizens seek to circumvent the controls, according to official stats. The Islamic Republic’s government has blocked Telegram and Instagram amid demonstrations, initially about economic conditions, in which at least 22 people have lost their lives.
Reminder: Republicans Also Gave Big Telecom Permission to Sell Your Personal Data This Year
This happened back in March, so it’s easy to have forgotten in the midst of the anxiety about net neutrality, but this is just as important a political decision, and is likely already impacting the way ISPs are using your data (hard to say though since, you know, they don’t have to tell us). As long as the companies aren’t doing anything to violate their own privacy policies, they have free reign over their customers’ information, which they can sell to the highest bidder.
New bill could finally get rid of paperless voting machines
A bipartisan group of six senators has introduced legislation that would take a huge step toward securing elections in the United States. Called the Secure Elections Act, the bill aims to eliminate insecure paperless voting machines from American elections while promoting routine audits that would dramatically reduce the danger of interference from foreign governments.
MacOS LPE Exploit Gives Attackers Root Access
“An attacker needs to already have a presence on the system to take advantage of this vulnerability. This could be through infecting the target system via a remote vulnerability, such as a Safari bug, or could be through physical access, such as on a kiosk-type system,” said Jasiel Spelman, senior vulnerability researcher with Zero Day Initiative.
Cybercriminals favored non-malware attacks in 2017: Report
Non-malware, or file-less, attacks using PowerShell and Windows Management Instrumentation tools, normally utilized by IT staffers along with exploiting exploit in-memory access and running applications, like web browsers and Office applications, were used in 52 percent of all attacks, according to a Carbon Black report. The number of non-malware based attacks increased, on average, of 6.8 percent per month during 2017 with 64 percent of security researchers surveyed by Carbon Black noting an uptick in this style of attack.
‘Kernel memory leaking’ Intel processor design flaw forces Linux, Windows redesign
Programmers are scrambling to overhaul the open-source Linux kernel’s virtual memory system. Meanwhile, Microsoft is expected to publicly introduce the necessary changes to its Windows operating system in an upcoming Patch Tuesday: these changes were seeded to beta testers running fast-ring Windows Insider builds in November and December.
Critical Informatics and the Critical Informatics logo are the trademarks of Critical Informatics, Inc. All other brand names, trademarks, service marks and copyrights are the property of their respective owners. © 2017 Critical Informatics, Inc. All rights reserved.