{"id":1021,"date":"2015-04-20T00:00:00","date_gmt":"2015-04-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2015\/04\/20\/newsalert-2015-apr-20\/"},"modified":"2021-12-30T11:38:37","modified_gmt":"2021-12-30T11:38:37","slug":"newsalert-2015-apr-20","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2015\/04\/20\/newsalert-2015-apr-20\/","title":{"rendered":"Newsalert &#8211; 2015 Apr 20"},"content":{"rendered":"<p>**INSIGHT: When it comes to threat detection and incident response, context matters**<br \/>\nThis new generation of security analytics tools will undoubtedly make analysts more efficient and accurate in their analysis, but it will also mean that the analyst is reaching conclusions faster, contributing to the operational outcomes of security rather than \u201cafter action reporting\u201d on incidents they have detected.<br \/>\nUltimately the organisations that are moving beyond SIEM systems and are striving to understanding the extent and impact of attacks through Security Analytics, rather than just the mere presence of those threats are leading the way.<br \/>\n**Link:** [  http:\/\/www.reseller.co.nz\/article\/572958\/insight-when-it-comes-threat-detection-incident-response-context-matters\/  ] (  http:\/\/www.reseller.co.nz\/article\/572958\/insight-when-it-comes-threat-detection-incident-response-context-matters\/  )  <\/p>\n<p>**(ISC)\u00b2 STUDY: WORKFORCE SHORTFALL DUE TO HIRING DIFFICULTIES DESPITE RISING SALARIES, INCREASED BUDGETS AND HIGH JOB SATISFACTION RATE**<br \/>\nThe results of the seventh (ISC)\u00b2 Global Information Security Workforce Study (GISWS) conducted by Frost &#038; Sullivan for the (ISC)\u00b2 Foundation with the support of Booz Allen Hamilton, Cyber 360 Solutions and NRI Secure Technologies reveal that the security of businesses is being threatened by reports of understaffed teams dealing with the complexity of multiple security technologies and the threats posed by our increasingly connected world.   &#8211; See more at: http:\/\/blog.isc2.org\/isc2_blog\/2015\/04\/isc-study-workforce-shortfall-due-to-hiring-difficulties-despite-rising-salaries-increased-budgets-a.html#sthash.ZiGva4cy.dpuf<br \/>\n45 percent of hiring managers reporting that they are struggling to support additional hiring needs and 62 percent of respondents reporting that their organizations have too few information security professionals.<br \/>\n**Link:** [  http:\/\/blog.isc2.org\/isc2_blog\/2015\/04\/isc-study-workforce-shortfall-due-to-hiring-difficulties-despite-rising-salaries-increased-budgets-a.html  ] (  http:\/\/blog.isc2.org\/isc2_blog\/2015\/04\/isc-study-workforce-shortfall-due-to-hiring-difficulties-despite-rising-salaries-increased-budgets-a.html  )  <\/p>\n<p>**Use of multiple contractors could leave oil, gas operators open to hackers    Read more: http:\/\/triblive.com\/news\/editorspicks\/8084464-74\/gas-oil-energy#ixzz3XodTt7wG  Follow us: @triblive on Twitter | triblive on Facebook**<br \/>\n\u201cThe more third parties you work with, in general, they could then become a target to pivot into your network,\u201d said Bob Marx, a cybersecurity and industrial automation consultant with Cimation, an energy consulting company from Houston, Texas, with offices in Pittsburgh.<br \/>\n60 percent of energy companies in an international survey this year by Oil &#038; Gas IQ, an industry news site, said they do not have a cyber attack response plan.<br \/>\n**Link:** [  http:\/\/triblive.com\/news\/editorspicks\/8084464-74\/gas-energy-oil#axzz3Xod0Ycba  ] (  http:\/\/triblive.com\/news\/editorspicks\/8084464-74\/gas-energy-oil#axzz3Xod0Ycba  )  <\/p>\n<p>**ISACA first to combine skills-based cyber security training with performance-based exams, certifications to address talent shortage**<br \/>\nISACA introduced a portfolio of new cyber security certifications that are the first to combine skills-based training with performance-based exams and certifications. The seven new Cybersecurity Nexus (CSX) certifications help professionals build and evolve their careers in a constantly changing field and help close the skills gap for employers.<br \/>\n**Link:** [  http:\/\/www.itweb.co.za\/index.php?option=com_content&#038;view=article&#038;id=142610  ] (  http:\/\/www.itweb.co.za\/index.php?option=com_content&#038;view=article&#038;id=142610  )  <\/p>\n<p>**UN conference weighs efforts to combat cybercrime**<br \/>\nEfforts to tame the fast-growing cybercrime threat took center stage at the United Nations Crime Congress under way in Doha, Qatar, as a diverse group of experts in the field urged strong partnerships between the public and private sectors to create a safer digital landscape.<br \/>\nFor the past two years, UNODC, under its programme for cybercrime, has been delivering technical assistance to law enforcement authorities, prosecutors, and the judiciary, in three regions of the world, in Eastern Africa, South-East Asia, and Central America.<br \/>\n**Link:** [  http:\/\/www.eturbonews.com\/57811\/un-conference-weighs-efforts-combat-cybercrime  ] (  http:\/\/www.eturbonews.com\/57811\/un-conference-weighs-efforts-combat-cybercrime  )  <\/p>\n<p>**Predictive Replaces Reactive Security at RSA 2015**<br \/>\nMore than 30,000 expected to attend. The larger the turnout at a security conference, the more it indicates that the bad actors are winning most of the battles.<br \/>\nThe armored-car approach certainly remains an integral part of any security strategy, but the added dimension of anticipitory security using advanced data analytics to predict and deflect data breaches from the outside and inside is where it&#8217;s at now. This is what topmost on the minds of vendors, thought leaders and entrepreneurs. At least it should be, and if it isn&#8217;t, vendors not thinking about this are going to be left behind by the market.<br \/>\n**Link:** [  http:\/\/www.eweek.com\/security\/predictive-security-replaces-reactive-at-rsa-2015.html  ] (  http:\/\/www.eweek.com\/security\/predictive-security-replaces-reactive-at-rsa-2015.html  )  <\/p>\n<p>**Banks the target for hackers not customers, Europol chief Rob Wainwright says**<br \/>\nBanks, rather than their customers, are increasingly the main target of online thieves, the head of the European Union&#8217;s law enforcement agency says.<br \/>\n**Link:** [  http:\/\/www.abc.net.au\/news\/2015-04-18\/banks-the-target-for-hackers-not-customers\/6402722  ] (  http:\/\/www.abc.net.au\/news\/2015-04-18\/banks-the-target-for-hackers-not-customers\/6402722  )<\/p>\n","protected":false},"excerpt":{"rendered":"<p>**INSIGHT: When it comes to threat detection and incident response, context matters** This new generation of security analytics tools will undoubtedly make analysts more efficient and accurate in their analysis, but it will also mean that the analyst is reaching conclusions faster, contributing to the operational outcomes of security rather&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1021","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1021"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1021\/revisions"}],"predecessor-version":[{"id":3508,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1021\/revisions\/3508"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}