Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail138.atl101.mcdlv.net;

Posted on August 30, 2016December 30, 2021 by admini

[From the desk of Paul Davis – his opinions and no-one else’s]
Apart from the reporter’s opinions 😉
So onto the news:

4 Ways to Engage Executives in Cyber Risk

A survey of retail executives shows many retailers making progress toward strengthening their cyber risk management programs, though they (along with their peers in other industries) could still benefit from improved governance and engagement with business leaders.

This shift in perspective, from seeing cyber risk as an IT problem to treating it as a business issue, is taking hold in the retail industry, according to findings from a survey of retail executives conducted by Deloitte & Touche in 2014.¹ “Executives at major retailers increasingly regard cyber risk as part of the broader conversation about business risk,” says Alison Kenney Paul, vice chairman and U.S. Retail and Distribution leader for Deloitte LLP. “As a result, they’re starting to seek a broader approach to cyber security than they’ve used in the past, and our survey results back this up.”

For example, two-thirds of respondents are actively reviewing the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework, and 21 percent are either already using it or planning to adopt it in the near future.

“To combat cyber risk, the tone really must start at the top, with the board, CEO, and CFO setting up effective governance and organization structures,” says Mantha. “Part of their mandate as senior leaders is to ensure all employees understand their role in helping to prevent cyber attacks. That includes endorsing creative initiatives (e.g., threat simulations or war games) that teach and reward responsible behaviors across the enterprise.”

Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=9d73530f87&e=20056c7556

GLOBAL CYBERSPACE IS SAFER THAN YOU THINK: REAL TRENDS IN CYBERCRIME

What are the real trends in cybercrime? Recent media coverage has been rife with stories of large-scale data breaches, hacks and online financial crime. Information technology (IT) security firms such as Norton Symantec and Kaspersky Labs publish yearly reports that generally show the security of cyberspace to be poor and often getting worse. This paper argues that the level of security in cyberspace is actually far better than the picture described by media accounts and IT security reports.

Currently, numbers on the occurrence of cybercrime are almost always depicted in either absolute (1,000 attacks per year) or as year-over-year percentage change terms (50 percent more attacks in 2014 than in 2013). To get an accurate picture of the security of cyberspace, cybercrime statistics need to be expressed as a proportion of the growing size of the Internet (similar to the routine practice of expressing crime as a proportion of a population, i.e., 15 murders per 1,000 people per year). To substantiate this argument, data was collected on the size of the Internet, with a focus on users, points of interaction and volume of online activity. Data was then collected on the vectors of cyber attack, the occurrence of cyber attacks and the cost of cybercrime.

Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=a168bcbb20&e=20056c7556

Evolving Threat Landscape Demands Executives Understand Cyber Risk

In the wake of a number of recent high-profile, damaging cyberattacks—including the recent breach of the Office of Personnel Management, which compromised the sensitive information of millions of federal employees—executives and board members are gradually becoming aware of today’s cyber threats and the potentially devastating impact these can have on their organizations.

In response, software provider Tripwire recently asked 22 prominent experts in the cyber field how security teams can improve their executives’ cybersecurity literacy. The consensus?

One of the key ways security professionals can help boards/executives improve their cybersecurity literacy is to connect recent major security incidents with the tools that can be used to prevent, mitigate, and respond to them, according to David Meltzer, Chief Research Officer at Tripwire.

Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=c03f3ebe77&e=20056c7556

New Horizons Computer Learning Center of Knoxville Offers CyberSec First Responder: Threat Detection and Response, a Groundbreaking Cybersecurity Training Course and Certification

KNOXVILLE, TN, Jul 21, 2015 (Marketwired via COMTEX) — New Horizons Computer Learning Center, a leading provider of instructor-led technical training, announces the addition of CyberSec First Responder: Threat Detection and Response to their public training schedule. This cybersecurity training course and corresponding ProCert Accredited certification, Certified CyberSec First Responder, were developed by Logical Operations with the goal of helping organizations combat cybersecurity threats.

Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=e569ecb7c5&e=20056c7556

Average DDoS attack size increasing, Arbor warns businesses

The average size of distributed denial of service (DDoS) attacks is increasing in terms of bits and packets per second, according to Arbor Networks.

Although the largest attack monitored in the second quarter of 2015 was a 196 Gigabit per (Gbps) second user datagram protocol (UDP) Flood, Arbor says the growth in the average attack size is of most concern to enterprise networks.

According to the latest data from Arbor’s active threat level analysis system (Atlas), 21% of attacks in the quarter topped 1Gbps, while the most growth was seen in the 2Gbps to 10Gbps range.

The data also shows a significant spike in the number of attacks in the 50Gbps to 100Gbps range in June 2015, which were mainly SYN floods targeting destinations in the US and Canada.

Arbor’s data shows that reflection amplification DDoS attacks using the simple service discovery protocol (SSDP) appear to be abating compared with the first quarter of 2015, in which 126,000 were recorded, but they are still at the same level as the last quarter of 2014 of around 84,000.

Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=d8cca186b8&e=20056c7556

New ISACA Governance Study Underscores Need for Business Involvement and Agility

Sydney, Australia (22 July 2015)— Corporate governance processes are at a weak level of implementation at most organisations, indicating that boards of directors are not sufficiently involved, according to a new global governance study commissioned by IT association ISACA. Conducted by the University of Antwerp—Antwerp Management School, Benchmarking and Business Value Assessment of COBIT 5 helps identify key gaps and priorities at organisations worldwide as well as how they are using the COBIT 5 business framework for information technology.

“The findings are a call to action for board members to take responsibility for ensuring that their organisation’s information and technology are effectively governed and managed,” said Steven De Haes, an author of the survey report. “There is a clear association between board involvement and strong organisational performance.”

The study results also underscore the need for a greater focus on agility.

COBIT 5 identifies seven key resources called enablers because they enable effective governance in an organisation. The study found that the most poorly utilised enabler in most organisations is culture, ethics and behavior. Services, infrastructure and applications are the most effectively leveraged enabler.

Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=e8e4412486&e=20056c7556

Survey: Organization’s size doesn’t indicate its “security maturity”

Regardless of size, nearly three-quarters of companies lack the maturity to address cyber security risks, according to the inaugural “Cybersecurity Poverty Index” released by RSA, The Security Division of EMC.

The index compiled survey results from more than 400 security professionals across 61 countries. Participants self-assessed the maturity of their cyber security programs against the NIST Cybersecurity Framework, and the results pointed to insufficient maturity across the board.

Of the organizations surveyed with more than 10,000 employees, 83 percent rated their capabilities as less than “developed” in overall maturity, suggesting that they see room for significant growth.

Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=4912514608&e=20056c7556

Soteria Intelligence Announces Innovative Research on Social Media Threats and Counter-Messaging Strategies

LOS ANGELES–(BUSINESS WIRE)–Soteria Intelligence is pleased to announce the company’s most recent research focused on analyzing anonymous social media threats as well as counter-messaging strategies to combat criminal and terrorist activity on social networks.

One of the biggest threats educational institutions face today is the use of anonymous messaging applications that have become a vehicle for delivering a wide variety of threats. Given the perceived anonymity of posts on such networks, Soteria Intelligence’s research indicates that individuals often make more direct and violent threats when compared to threats that have been made on Twitter and other social networks in the past.

Soteria Intelligence’s research on analyzing anonymous social media threats explores the use of linguistic pattern recognition to compare activity on public social networks where individuals have profiles (they’re identifiable) with activity taking place on anonymous social networks. “The goal is to identify patterns as a way of revealing those who choose to operate under a veil of secrecy,” stated Aaron Schoenberger, CEO of Soteria Intelligence.

Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=ee33c29f4b&e=20056c7556

============================================================
Feedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)

If someone forwarded this email to you and you want to be added in,
please click this: ** Subscribe to this list (http://paulgdavis.us3.list-manage1.com/subscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a)

** Unsubscribe from this list (http://paulgdavis.us3.list-manage.com/unsubscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556&c=6235b56678)

** Update subscription preferences (http://paulgdavis.us3.list-manage2.com/profile?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556)

Leave a Reply

You must be logged in to post a comment.

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme