Netizen Blog and News
The Netizen team sharing expertise, insights and useful information in cybersecurity, compliance, and software assurance.
Category: Security
-

Charles Darwin’s theory of evolution, introduced in 1859 in ‘On the Origin of Species,’ focused on natural selection—which evolved into the well-known phrase “survival of the fittest.” Applying that to the cybersecurity industry means that only some businesses can compete in the modern cybersecurity landscape and survive the natural selection, and that might not be…
-

The Homeland Security Department attempts to set the standard for fielding cyber technologies. A group of U.S. government researchers focused on fortifying homeland security has cybersecurity technology development down to a science. Those researchers work for the Department of Homeland Security (DHS), within the Science and Technology Directorate’s (S&T’s) Cyber Security Division. The division, like…
-

Employing a diverse range of information security pros can help hospitals to more effectively relate to the enemies trying to attack them. Hiring a diverse range of infosec employees benefits hospitals in ways not often discussed. In addition to employment equality, for instance, cybersecurity teams comprised of people with varying backgrounds is one key to…
-

Fall is officially here, which means the return of delicious Oktoberfest beer, Halloween costume preparations, and pumpkin-spice everything. It also means that National Cyber Security Awareness Month is almost here. October is National Cyber Security Awareness Month, which is “designed to engage and educate public and private sector partners through events and initiatives to raise…
-

As we improve health care through connected technology, we also must protect it from the bad guys Imagine this text message shows up in your e-mail: “Dear Sam, We have complete control of your hospital’s telemetry network. Please remit $15,000 in bitcoin to our offshore bank immediately or we will disable communication on this network.”…
-

The worst lines ever spoken in thriller/horror movies are “I’ll be right back” and “What else could possibly go wrong?” In the first instance, the person speaking those words is probably not coming back, and the moment the second is said, something else goes horribly wrong. In the “what else could possibly go wrong, cybersecurity edition” category, particularly in…
-

The grocer, which Amazon.com bought in August, said it had been informed of unauthorized use of payment cards that had been used at in-store taprooms and restaurants. Whole Foods Market says it’s investigating a potential hack or theft of customer payment card information at in-store taprooms and restaurants. In a news release on Thursday, the…
-

SANTA FE, N.M. — A cybersecurity breach at Equifax exposed sensitive personal data – including Social Security numbers, birth dates and addresses – potentially impacting 143 million Americans. Hackers using the handle Dragonfly 2.0 reportedly targeted dozens of U.S. energy companies last spring and summer, gaining access to utility networks and, in some cases, control…
-

As we improve health care through connected technology, we also must protect it from the bad guys Imagine this text message shows up in your e-mail: “Dear Sam, We have complete control of your hospital’s telemetry network. Please remit $15,000 in bitcoin to our offshore bank immediately or we will disable communication on this network.”…
-

“So, how do I get my son back?” The famous line from Tom Mullen, Mel Gibson’s character in the 1996 flick Ransom, paints a clear picture of what we are dealing with today regarding cyberwarfare. But instead of our children being abducted, it’s our data that’s being held captive. Every 40 seconds a business falls…