Netizen Blog and News
The Netizen team sharing expertise, insights and useful information in cybersecurity, compliance, and software assurance.
Category: Security
-

Governments have fallen victim to a string of high-profile cyberattacks in recent years. German IT expert Sandro Gaycken tells DW about cybersecurity’s shortcomings and why he thinks Kaspersky did not work with Russia. DW: At the end of October, a new virus called “BadRabbit” attacked computer systems in Russia, Ukraine, Germany and other countries. Among…
-

People often pay more attention to the benefits of modern technology than its problems — in part because so far, the consequences have been tolerable, experts said during a Chicago Ideas Week event Thursday. “That’s changing,” said Joshua Corman, founder of I Am The Cavalry, a grassroots organization focused on computer security and how it…
-

Early on July 4, hackers redirected traffic from Stearns County’s website to a site that claimed to be “testing some tricks.” A similar hack happened two days later in Leon County, Florida. In the aftermath of both breaches, employees from both county’s information services departments worked tirelessly to analyze the threat and prevent future ones.…
-

Accenture have become the latest major cybersecurity provider to be left red-faced regarding their own security. While it appears that major damage was averted, Accenture reportedly left a large cache of sensitive information without password protection on their cloud storage. Cybersecurity has become one of the hot topics for businesses around the world. In the…
-

It’s a constant battle between profitable business investments and “unprofitable” security investments to protect the current bottom-line. Despite the headlines, growth-oriented executives tend to prioritize other expenses. Despite repeated major, high-profile breaches, most cybersecurity teams still struggle to get sufficient funding. “After this hack, cybersecurity budgets are bound to increase.” We’ve all thought it. But,…
-

Why you need to go beyond compliance. Businesses will continue to face a ton of cyber threats, some of which will impact organizations severely enough to require security measures that will reach far beyond compliance. A Ponemon Institute study showed that the average compromised record cost approximately $194 per record. Loss of business due to…
-

The growing complexity (Part 1) of today’s networks and the growing sophistication of today’s threats has outpaced the ability of most traditional security devices to keep up. Until now, the approach of far too many IT teams has been to simply throw more money at the problem by adding yet another device into their security…
-

It seems like CSOs are always seeing flashing red lights on their security dashboards these days, warning them of another breach or risk of compromise. There are so many security events happening day in and day out that it’s difficult to decide what’s the top priority. That’s a good metaphor for the state of cybersecurity…
-

Cybersecurity initiatives for government agencies — in fact, other organizations, too — have to be proactive and iterative. According to the US Office of Management and Budget, federal agencies reported 30,899 cybersecurity incidents to the Department of Homeland Security last year. Threats are evolving across multiple vectors as the number of potential entry points expands…
-

Finding the cybersecurity leaders of tomorrow means being realistic about job descriptions and providing training and mentoring for non-traditional tech people. Attrition is up, and cyber attacks are on the rise. With continued burnout and a growing skills gap in an industry where mentorship is a lost art, how can enterprises prepare for resiliency? Feeding…