In the middle of a disaster is the worst possible time to discover that the backups won’t
load, the cloud service provider can’t be reached, the firewall has a leak, and the one guy
with all the key passwords is at a no-phones-allowed yoga retreat.
In a disaster, people panic. Lines of communication break down. People forget what they’re
supposed to do, make mistakes because they’re in a rush, or just hide and hope that the problem
goes away. Disaster preparedness plans go out of date quickly as people move around and as
infrastructure is reconfigured.
The company’s annual data breach report shows hacking attacks that take your files away got worse this year. They doubled and got more sophisticated.
Eeek! A nation’s entire government is staggering to its feet after being shut down for a week due to a “cyber attack”.
Emerging security operations, automation, compliance and response solutions perform dynamic scans that cover the entire stack including user access, application, data, docker containers, operating system and the AWS cloud. They further provide a platform with the ability to generate and produce compliance reports required by HIPAA, FedRAMP, GDPR and NIST security standards as well as proactive incident response to ensure the confidentiality, integrity and availability of digital assets.
When Ohio State University did its first student-focused phishing in January — a strategy
also used in the corporate world — over 18 percent of the recipients clicked through. The
University of Alabama at Birmingham’s employee-focused phishing awareness campaign
snagged over 7,000 people in March, or about a quarter of the recipients.
In San Diego, the Space and Naval Warfare Systems Command – a division of the U.S. Defense Department
known as SPAWAR — employs 3,390 cyber security workers, according to the analysis by the economic development corporation.
That’s nearly half of the 7,620 total jobs in the region, with the 4,230 not working at SPAWAR sprinkled
across 104 private firms that include ESET, LP3-SecurIT, Security on Demand and iNetwork.
On March 22, Atlanta’s city government was hit with a ransomware attack, with hackers demanding
six bitcoins in exchange for releasing the data. At the time of writing this, that’s a demand for
As a result of the attack, many systems in Atlanta are offline. Some of the city’s services have
been forced to return to the “pen and paper” method of operation.
Demand for security professionals is outstripping supply. Last year, the US employed over three quarters of a million people in these positions, with approximately 350,000 jobs going unfulfilled. It’s estimated that unfilled positions will exceed 3.5 million by 2021. Katie Tierney, Senior Director of Global Sales Engineering, White Hat Security shares a few ways to recruit and retain the necessary skills in your organization.
Overall, 72% of cybersecurity pros surveyed said hiring experienced video gamers in the IT department would be a good way to plug the cyber skills gap.
Gamification—or the concept of applying the elements of game playing to non-game activities—is growing as a tool used in cybersecurity, the report noted. Many companies hold gamification exercises like hackathons, red team-blue team, and bug bounty programs, and almost all (96%) who use these techniques report seeing benefits.
Media organizations experienced a number of security breaches with a wide range of attack vectors, the report found. The top security breaches media organizations reported facing were SQL injections (23%), DNS attacks (21%), pirated content (20%), and DDoS attacks (17%). Other cybersecurity attacks reported included account hacks, website defacement, and cross-site scripting.