Category Archives: Internet Security
G7 Nations Sign Declaration to Keep the Internet Safe and Open – Infosecurity Magazine
G7 nations have signed a new declaration that promises to boost online safety worldwide in accordance with open democratic principles.
The joint ministerial declaration, signed by tech leaders from the UK, Canada, France, Germany, Italy, the US, and the EU, agreed on a range of principles to tackle cyber-risks. These emphasize that any action taken to tackle cybercrime must support democratic ideals and respect human rights and fundamental freedoms.
The announcement has come amid growing concerns about the influence of nations with illiberal values, such as China, in cyberspace, and the market power of big tech platforms, which potentially threatens competition and even free speech online.
The agreements relate to the following areas:
During the virtual meeting, hosted by UK digital secretary Oliver Dowden, the representatives of the G7 also discussed the need to enhance security and resilience in critical digital infrastructure, especially in telecommunications technologies such as 5G.
Dowden commented: As a coalition of the worlds leading democracies and technological powers, we want to forge a compelling vision of how tech should support and enhance open and democratic societies in the digital age.
Together we have agreed a number of priorities in areas ranging from internet safety to digital competition to make sure the digital revolution is a democratic one that enhances global prosperity for all.
The agreements are part of the first of seven ministerial declarations expected to be signed this year by the G7 governments.
View post:
G7 Nations Sign Declaration to Keep the Internet Safe and Open - Infosecurity Magazine
Letter: The ‘big lie’ and voter integrity – INFORUM
Having been the target of fraud rhetoric, Dominion Voting Systems or SmartMatic have responded by bringing disinformation or defamation lawsuits against Rudy Giuliani (former mayor of New York), Sydney Powell (former advisor to President Trump), Mike Lindell (CEO of My Pillow), Fox News, and three of its broadcasters because they have tied voting irregularities to these two companies.
RELATED
It has been almost six months since the election. So has any evidence of fraud been uncovered, or is the big lie just that a big lie?
John Poulos, CEO of Dominion, allegedly told the Michigan State Oversight Committee on Dec. 15, 2020, that voting systems are by design meant to be used as closed systems that are not networked meaning they are not connected to the Internet. Why is this important? If a voting machine is not connected to the internet it cannot be manipulated remotely. However, hackers have found Dominion voting machines through the internet.
Former US Army Col. Phil Walgrin (who worked in an information warfare unit and now works in cyber security), as well as Mary Fanning (a National Intelligence researcher) investigated internet traffic to and from voting machines starting before the 2020 election and ending after the election. What did they find? They found that voting machines were connected to the internet, and servers receiving and storing votes, resided in foreign countries. Server locations, down to street addresses, were found in Germany, Spain, Serbia and Toronto.
Data collected by Walgrin, Fanning and colleagues showed that voting machines were manipulated during the election from IP and MAC addresses in China, Iran and other places modifying votes in Bidens favor.
Voting machines vulnerabilities to hacking have been known for awhile. Sen. Amy Klobuchar, D-Minn., for example, in a 2018 interview acknowledged this and voiced concerns.
While it is not possible to know whether the FBI and CISA (the U.S. cyber security agency) are investigating this, no reports have been issued yet. General Thomas McInerney (ret.) has said the November 2020 election was the most severe cyber attack in history, and to his knowledge and concern there has not yet been any audits.
Mike Lindell has stated he does not fear Dominions suit against him. His reason: an insurmountable defense against defamation is truth. So his take is basically "bring it." The facts are on his side and he can now issue subpoenas to force the release of additional evidence. In light of this, perhaps the big question is how do we fix this before the 2022 election?
Scott Hoaby lives in Fargo.
This column does not necessarily reflect the opinion of The Forum's editorial board nor Forum ownership.
See more here:
Letter: The 'big lie' and voter integrity - INFORUM
Fact check: Hackers using visually similar characters to deceive in phishing schemes – USA TODAY
While the world is focused on battling the coronavirus, cyber attacks have increased in the healthcare field and for individuals. Veuers Justin Kircher has the story. Buzz60
Online attackers bent on stealing personal information are using a visual deception to trick people into visiting malicious websites, a post circulating on social media claims.
The April 20 Facebookpostshows two web addresses that, at first glance, appear identical. A closer look, though, shows that one character in this case, the letter a is slightly different in each one.
An average internet user can easily fall for this, the post reads. Be careful for every mail requiring you to click on a link.
The post has been shared hundreds of times on Facebook.
The claim appears to be true. Credible sources dating back to the early 2000s give a similar warning against this kind of spoof of the website a user intends to visit. But similar exploitations have emerged recently as well.
The user who shared the post could not be reached for comment.
The attack is a form of spoofing, when someone poses as a legitimate institution in an attempt to obtain personal information.
Most people by now have gotten a little bit suspicious. ... The idea is how can they trick you into thinking you know who it is or what it is when it isnt, said Stuart Madnick, founding director of Cybersecurity at MIT Sloan.
In this instance, it exploits the visual similarities between characters in the Roman alphabet used in the English language and the Cyrillic alphabet, which Britannica.com said was developed for Slavic-speaking people and is used in more than 50 languages, including Russian.
Substituting Cyrillic characters for Roman letters that look similar, such as the lowercase a, hackers can direct a user who intended to visit one website to another. Madnick said there are other ways to deceive without changing the alphabet, such as replacing a lowercase "L" with a capital "I" in some fonts.
Instead of going to a legitimate site, you may be directed to a malicious site, which could look identical to the real one, notes a 2008 security notice from the U.S. Cybersecurity & Infrastructure Security Agency. If you submit personal or financial information while on the malicious site, the attacker could collect the information and then use and/or sell it."
Fact check: Coronavirus vaccines dont cause death, wont decimate worlds population
The scheme is possible because of internationalized domain names and how web browsers read them, according to the agencys notice, which was updated in 2019.
The so-called homograph attacks have been around since the early 2000s. A 2005 post on The Register, an online technology news publication, called them a new vector for phishing attacks.
But they have popped up again recently. Last year, researchers discovered domain names designed to deceive users into thinking they were going to a legitimate website, The Register reported, despite efforts to contain the problem.
These bogus sites are designed to look real while phishing (to gather) credentials or distributing malware, according to the March 2020 post. You think youre logging into Google.com from an email or instant-chat link, but really youre handing over your password to a crook.
CISA also warned of the potential for homograph attacks in a December 2020 alert about cyber attacks designed to disrupt remote learning as children attended virtual classrooms during the COVID-19 pandemic.
Phishing scams lure you to a phony website. The American National Red Cross and its individual states, as well as the Canadian Red Cross, has seen several coronavirus phishing scams that claim to be from its organizations.(Photo: Marc Saltzman)
Spoofed hyperlinks and websites are a red flag for a potential attempt to steal personal information, according to CISA, part of the U.S. Department of Homeland Security. CISA recommends three steps to avoid falling victim tothe scheme:
People should assume they eventually will be thetarget of an attack and take steps in advance to mitigate any damage, MITs Madnick said. He recommended using software to protect against viruses and malware and having data backups that would make ransomware attacks less effective.
Take a good look at a phishing e-mail from a hacker(Photo: screenshot)
The claim that hackers use letters that look similar but come from another alphabet to deceive people in online phishing schemes is TRUE, based on our research. The deception known as a homograph attack has been going on since at least the early 2000s. Letters from the Cyrillic alphabet are substituted for those that are visually similar in the Latin alphabet to direct unknowing users to malicious websites.
Thank you for supporting our journalism. You cansubscribe to our print edition, ad-free app or electronic newspaper replica here.
Our fact check work is supported in part by a grant from Facebook.
Autoplay
Show Thumbnails
Show Captions
Read or Share this story: https://www.usatoday.com/story/news/factcheck/2021/04/30/fact-check-hackers-use-similar-looking-characters-phishing-schemes/4891437001/
The rest is here:
Fact check: Hackers using visually similar characters to deceive in phishing schemes - USA TODAY
Internet Security Market 2021 Will Reflect Significant Growth in Future with Size, Share, Growth, and Key Companies Analysis- HPE, IBM, Intel,…
DataIntelo published a detailed report on Global Internet Security Market for the clients that wants to explore new market avenues, get in-depth insights on the market products, maximize their revenue, and review the strategies implemented by prominent players in the market.
Key Players of the Internet Security Market
HPEIBMIntelSymantecAlienVaultBlackStratusCheck Point Software TechnologiesCiscoCyrenFortinetF-SecureGemaltoKaspersky LabMicrosoftPalo Alto NetworksRSASophosTrend MicroTrustwave HoldingsWurldtech Security Technologies
Get Sample of the Internet Security Report https://dataintelo.com/request-sample/?reportId=90352
Major Highlights of the Internet Security Market Report
The research team at DataIntelo has proximately monitored the market since 2017. During the time, the team has covered the factors that are expected to boost the market performance and impede the growth of the market during the forecast period, 2020-2027. Additionally, it has enlisted the challenges faced by key market players, new entrants, and emerging players in the market.
What is Covered in the Chapter of Impact of COVID-19 Pandemic?
The coronavirus pandemic has disrupted the market dynamics, as it had imposed the restriction on the opening of offices and manufacturing facilities. This, in turn, has persuaded employees to work from home and halted the production of goods across the globe. Moreover, it had increased the gap between demand and supply owing to the restricted trade affairs around the world. However, it has created lucrative opportunities for the key players in certain regions.
The COVID-19 chapter of Internet Security Market includes:
What is Covered in The Segmentation Part of The Internet Security Report?
Products
Malicious softwareDenial-of-service attacksPhishingApplication vulnerabilities
Applications
GovernmentBanking, financial services, and insurance (BFSI)ManufacturingInformation communication and technology (ICT)RetailHealthcare
Regions
Note: Can add country of your choice in the report at no extra cost.
The segmentation part of the report covers:
This segmentation provides the esteemed reader with the comprehensive regional analysis, which includes if the region/country has a potential worth of investment. This analysis is prepared by considering the socio-economic development and government regulations & policies of the country.
Buy the Complete Report https://dataintelo.com/checkout/?reportId=90352
Note: Additional company names can be added in the list.
The report covers the major players of the market and provides information about their product portfolio and strategies deploying regarding the market. This market report includes technological advancements of products by the key players. It lays out the information on collaborations, partnerships, mergers, and agreements carried out by industry players over the years in the market. Furthermore, it covers the factors that have created opportunities and challenges for them.
7 Reasons to Buy Report from DataIntelo
Below is the TOC of the report:
Executive Summary
Assumptions and Acronyms Used
Research Methodology
Internet Security Market Overview
Global Internet Security Market Analysis and Forecast by Type
Global Internet Security Market Analysis and Forecast by Application
Global Internet Security Market Analysis and Forecast by Sales Channel
Global Internet Security Market Analysis and Forecast by Region
North America Internet Security Market Analysis and Forecast
Latin America Internet Security Market Analysis and Forecast
Europe Internet Security Market Analysis and Forecast
Asia Pacific Internet Security Market Analysis and Forecast
Asia Pacific Internet Security Market Size and Volume Forecast by Application
Middle East & Africa Internet Security Market Analysis and Forecast
Competition Landscape
If you have any inquiry of the report, connect with our analyst @ https://dataintelo.com/enquiry-before-buying/?reportId=90352
About DataIntelo
DataIntelo has extensive experience in the creation of tailored market research reports in several industry verticals. We cover in-depth market analysis which includes producing creative business strategies for the new entrants and the emerging players of the market. We take care that our every report goes through intensive primary, secondary research, interviews, and consumer surveys. Our company provides market threat analysis, market opportunity analysis, and deep insights into the current and market scenario.
To provide the utmost quality of the report, we invest in analysts that hold stellar experience in the business domain and have excellent analytical and communication skills. Our dedicated team goes through quarterly training which helps them to acknowledge the latest industry practices and to serve the clients with the foremost consumer experience.
Contact Info:
Name: Alex Mathews
Address: 500 East E Street, Ontario,
CA 91764, United States.
Phone No: USA: +1 909 414 1393
Email:[emailprotected]
Website:https://dataintelo.com
Follow this link:
Internet Security Market 2021 Will Reflect Significant Growth in Future with Size, Share, Growth, and Key Companies Analysis- HPE, IBM, Intel,...
Utah is the 2nd State to Create a Safe Harbor for Companies Facing Data Breach Litigation – Lexology
In mid-March, Utah Governor Spencer Cox signed into law the Cybersecurity Affirmative Defense Act (HB80) (the Act), an amendment to Utahs data breach notification law, creating several affirmative defenses for persons (defined below) facing a cause of action arising out of a breach of system security, and establishing the requirements for asserting such a defense.
In short, the Act seeks to incentivize individuals, associations, corporations, and other entities (persons) to maintain reasonable safeguards to protect personal information by providing an affirmative defense in litigation flowing from a data breach. More specifically, a person that creates, maintains, and reasonably complies with a written cybersecurity program that is in place at the time of the breach will be able to take advantage of an affirmative defense to certain claims under the Act:
The written cybersecurity programs must satisfy several requirements to warrant the Acts protection. In part, such programs must provide administrative, technical, and physical safeguards to protect personal information. These safeguards include:
Reasonably conforming to a recognized cybersecurity framework generally means (i) being designed to protect the type of information involved in the breach of system security, and (ii) either (I) constituting a reasonable security program as described in the Act; (II) reasonably conforming to an enumerated security framework, such as the NIST special publication 800-171 or the Center for Internet Security Critical Security Controls for Effective Cyber Defense; or (III) reasonably complying with the federal or state regulations applicable to the personal information obtained in the breach of system security (e.g., complying with HIPAA when protected health information is breached).
A person may not claim an affirmative defense, however, if:
Utah is the second state to establish an affirmative defense to claims arising from a data breach. Back in 2018, Ohio enacted the Ohio Data Protection Act (SB 220), similarly providing a safe harbor for businesses implementing and maintaining reasonable cybersecurity controls.
This affirmative defense model established by both Utah and Ohio is a win for both companies and consumers, as it incentivizes heightened protection of personal data, while providing a safe harbor from certain claims for companies facing data breach litigation. It would not be surprising to see other states take a similar approach. Most recently, the Connecticut General Assembly reviewed HB 6607, An Act Incentivizing the Adoption of Cybersecurity Standards for Businesses, which provides for a similar safe harbor as in Utah and Ohio. Creating, maintaining, and complying with a robust data protection program is a critical risk management and legal compliance step, and one that might provide protection from litigation following a data breach.
Read more:
Utah is the 2nd State to Create a Safe Harbor for Companies Facing Data Breach Litigation - Lexology
Unpatched SAP applications are target-rich ground for hackers – ComputerWeekly.com
Hackers are targeting unpatched vulnerabilities in SAP applications, according to areport issued bySAP and cyber threat research company Onapsis.
The report detailed more than 300 successful exploitations of critical vulnerabilities previously patched by SAP through 1,500 attack attempts between June 2020 and March 2021.
It also highlighted that the time window for defenders to act was significantly smaller than previously thought, with examples of SAP vulnerabilities being weaponised in less than 72 hours after the release of patches and new unprotected SAP applications provisioned in cloud (IaaS) environments being discovered and compromised in less than three hours.
The report noted that 18 of the worlds 20 major vaccine producers run their production on SAP, 19 of 28 Nato countries run SAP, and 77% of the worlds transaction revenue touches an SAP system.
A spokesperson for Onapsis said this was the first time SAP had issued an official pressrelease about cyber threats affecting its customers. Onapsis is a security and compliance monitoring software company as well as a security research firm.
The release said both companies had worked in close partnership withtheUS Department of Homeland Security (DHS), the Cybersecurity and Infrastructure Security Agency (CISA) and Germanys Federal Cybersecurity Authority (BSI), advising organisations to take immediate action to apply long-available SAP patches and secure configurations, and perform compromise assessments on critical environments.
The two declared themselves unaware of known customer breaches directly related to this research. The report also did not describe any new vulnerabilities in SAP cloud software as a service or SAPs own corporate IT infrastructure. Both companies, however, noted that many organisations still had not applied relevant mitigations that have long been provided by SAP.
Were releasing the research Onapsis has shared with SAP as part of our commitment to helping our customers ensure their mission-critical applications are protected Tim McKnight, SAP
Were releasing the research Onapsis has shared with SAP as part of our commitment to helping our customers ensure their mission-critical applications are protected, saidTim McKnight, chief security officer at SAP. This includes applying available patches, thoroughly reviewing the security configuration of theirSAPenvironmentsand proactively assessing them for signs of compromise.
Onapsis CEO and co-founderMariano Nunez said the critical findings noted in its report described attacks on vulnerabilities for which patches and secure configuration guidelines had been available for months or even years.
Unfortunately, too many organisations still operate with a major governance gap in terms of the cyber security and compliance of their mission-critical applications, allowing external and internal threat actors to access, exfiltrate and gain full control of their most sensitive and regulated information and processes, he said. Companies that have not prioritised rapid mitigation for these known risks should consider their systems compromised and take immediate and appropriate action.
In the reports foreword, Nunez said: The evidence captured in this report clearly shows that threat actors have the motivation, means and expertise to identify and exploit unprotected mission-critical SAP applications, and are actively doing so. They are directly targeting these applications, including, but not limited to, enterprise resource planning (ERP), supply chain management (SCM), human capital management (HCM), product lifecycle management (PLM), customer relationship management (CRM) and others.
Business applications have been known for some time to be the soft underbelly of many corporate organisations, beyond perimeter security. Nunez, in the foreword, also said: Cloud and internet-exposed mission-critical applications that help foster new processes and business opportunities also increase the attack surface that cyber actors are now targeting.
The release stated that none of the vulnerabilities were present in cloud solutions maintained by SAP.
The DHS CISA has also issued an alert about the potential targeting of critical SAP applications.
Go here to see the original:
Unpatched SAP applications are target-rich ground for hackers - ComputerWeekly.com
Verizon Mobile Security Index: COVID-19 unearths new cyber threats for businesses – Verizon Communications
What you need to know:
Nearly half (49 percent) of businesses surveyed said that changes to remote working practices made during lockdown adversely affected their cybersecurity.
40 percent think mobile devices are their companys biggest IT security threat.
However 45 percent of businesses sacrificed the security of mobile devices to get the job done.
Results based on an independent survey of 856 professionals responsible for the buying, managing and the security of mobile and Internet of Things (IoT) devices for their companies.
BASKING RIDGE, N.J. - The COVID-19 pandemic forced businesses to quickly support remote working practices, often without proper security measures in place. The Verizon Business Mobile Security Index (MSI) 2021 reveals that many businesses may have left themselves vulnerable and open to cybercriminals in the rush to ensure their workforce could operate remotely. Forty-nine percent of businesses surveyed in the latest edition of Verizon's MSI stressed that changes made to remote working practices during lockdown adversely affected their companys cybersecurity.
Interestingly, even though 40 percent of businesses surveyed recognized that mobile devices are their companys biggest IT security threat, 45 percent of them knowingly sacrificed the security of mobile devices to get the job done (e.g., meet a deadline or productivity targets) and nearly a quarter (24 percent) sacrificed the security of mobile devices to facilitate their response to restrictions put in place due to the pandemic.
The pandemic caused a global shift in the way organizations operate, many of which ramped up their digital transformation agendas and working models to meet the fast-changing needs of both employees and customers, said Sampath Sowmyanarayan, Chief Revenue Officer, Verizon Business. While businesses focused their efforts elsewhere, cybercriminals saw a wealth of new opportunities to strike. With the rise of the remote workforce and the spike in mobile device usage, the threat landscape changed, which for organizations, means there is a greater need to hone in on mobile security to protect themselves and those they serve.
The effect of the pandemic on the workforce is going to have a lasting impact. According to the report, a large majority (70 percent) of those that had seen remote working grow following the introduction of pandemic restrictions expected it to fall again afterward. However, 78 percent said that it would still remain higher than before lockdown. Overall, our respondents said that they expected the number of remote workers to settle at around half (49 percent).
Small and Medium-Sized Businesses are also under threat
Over half of those surveyed (52 percent) said that small and medium-sized businesses are more of a target than larger enterprises but even though this is the case, 59 percent of small and medium-sized businesses had sacrificed security with 22 percent suffering a mobile compromise. Seventy-eight percent stated that they should take mobile-device security more seriously.
Of those surveyed, 72 percent of organizations are worried about device abuse or misuse. Part of the problem is that many companies struggle to develop an effective Acceptable Use Policy (AUP) 57 percent didnt have one at all.
The MSI details people and behaviors, apps, devices and things and networks and cloud as the four sectors of the mobile threat landscape. Additionally, it provides expert insights into how to help safeguard against pending cybercrime attacks, such as establishing a zero trust network access (ZTNA) model and a secure access service edge (SASE) architecture, which is designed for a mobile-first and cloud-first world.
The Verizon Mobile Security Index 2021 findings are based on an independent survey of 856 businesses across Australia, the U.S. and the U.K. It surveyed professionals that are responsible for the buying, managing, and security of mobile and Internet of Things (IoT) devices for their companies.
It provides unique insights into the current mobile threat landscape and what organizations are, or in many cases arent, doing to protect their data and key systems. In addition to analysis from Verizons experts, the report includes insights and real-world data from leading security and management companies Asavie, Blackberry Cylance, Check Point, IBM, Ivanti, Lookout, NetMotion, Netskope, Proofpoint, Qualcomm, Thales, VMware, and Wandera.
Read the full Verizon Mobile Security Index 2021, as well as the Public Safety, Public Sector and small and medium-sized businesses snapshots, and learn more about what Verizon is doing to help address cybersecurity threats.
See the original post:
Verizon Mobile Security Index: COVID-19 unearths new cyber threats for businesses - Verizon Communications
Preparing cyber professionals for the real world – ACS
There is a dire shortage of talent in the information security industry.
Today, industry roles command big salaries, but also bigger workloads.
When you read articles about the best jobs or highest paying jobs to consider, information security is always in the top 10 of the list.
How does this industry sustain current security professionals and prepare the next generation?
Here, I look at what current professionals can do, and offer sound advice for preparing the next generation of security pros.
Malicious cyber activities are becoming very common.
Some have gone so far as to say that this form of crime knows no bounds.
It is global and unlimited, like the internet itself.
The deficit of a well-developed, skilled workforce makes government and businesses recruitment efforts very difficult.
Developing sophisticated technical capacities has become a priority for US and global industries and governments.
The role of educators
No-one plays a more important role in preparing the next generation security professionals than educators and trainers.
We need to make sure existing education gives students a holistic view of cyber security with focus on relevance and proficiency.
The complicated state of cyber threats requires a learning methodology engendering critical thinking and deeper understanding to defend against increasingly complex cyberattacks.
A number of shortcomings exist in the conventional classroom training model in creating efficient and reliable cyber security professionals, according to the Software Engineering Institute.
Going forward, we will be facing increasingly interdisciplinary and multi-faceted challenges.
These will necessitate knowledge in different fields and areas, including law and law enforcement, criminology, engineering, computer science, to name a few.
This is hardly a surprise, as the main elements of cyber security technical perfection, process, and people must be supplemented by the capability to manage shortcomings.
Deterrence Doctrine and SPC (Situational Crime Prevention) theories
Information system researchers analysing security compliance and behaviour use the deterrence doctrine, according to which the likelihood of violations is inversely proportional to the perceived risk and punishment.
A review found that this theory has been the most-cited one in Centre for Internet Security (CIS) security literature over the past three decades.
According to this literature, one must increase awareness of an organisations efforts to limit ICT abuse and of the likelihood and/or extent of sanctions in order to reduce ICT violations.
The Situational Crime Prevention (SCP) Theory is widely used to study cybercrime and reduce criminal activities perpetrated or otherwise related to employees.
Most crimes are opportunistic and occur when a motivated offender detects a suitable and unguarded (or incapably guarded) target.
Proponents of the SCP theory find violators to be rational decisionmakers who carry out an analysis of costs and benefits before committing a crime.
Accordingly, the SCP theory outlines five broad categories of efforts to counteract cybercrime that security professionals should make. They are presented in the table below:
Table 1. Categories of efforts to counteract cybercrime, according to SCP
The US government established a cyber skill task force to address the crisis in human capital in the field of cyber security, improve retention and recruitment of cyber security professionals, and identify the best ways to create and support a national cyber security workforce.
This initiative gave rise to the NICE Framework: a proposal to group, organise, and describe cyber security tasks.
The framework is comprised of seven categories covering 31 specialty areas, as well as details regarding work roles, skills, abilities, knowledge, and tasks.
It has become a good starting point for developing a central cyber security curriculum and a useful categorisation of topics and related skills.
Cyber security exercises
The NICE Framework and the Situational Crime Prevention Theory have been combined to design and deliver cutting-edge tools and strategies.
One notable example of how these are used is the Cyber Security Exercises (CSE), an offense/defense environment, in which students are grouped and get a virtual machine to host HTTP(S), FTP, SSH, and other services.
These services can then be accessed by other groups.
The CSE aim to reflect real-life environments for students to apply their skills.
The approach of CSE architecture has proved useful for translating theory into practice.
More specifically, CSE are elaborate learning experiences aimed at developing competence and expert knowledge through simulation.
They are associated with a number of pedagogical issues, including design of exercises and training outcomes and evaluation.
Training effectiveness can be improved based on analysis, observation, and integrating educational knowledge and focus at each stage of the life cycle of CSE, including planning, feedback, and implementation.
Its necessary to measure change systematically in order to improve CSE, ranging from organisational change to changing customer experiences.
Scenarios to help prepare cyber security professionals
According to the Center for Internet Security, technical professionals, admins, and users share the responsibility for security.
The CIS has prepared a series of tabletop exercises to help cyber security professionals and teams secure their systems by means of tactical strategies.
These exercises are intended to assist organisations in comprehending various risk scenarios and preparing for potential cyberthreats.
The exercises Im about to present do not take very long to complete.They are a convenient tool to develop a cyber security mindset.They consist of six scenarios which list relevant processes, threat actors, and impacted assets:
Scenario 1: Malware infection
While using the companys digital camera for work, a staff member takes a picture that he then moves to his personal computer.
He does so by inserting the SD card, which while connected to his PC becomes infected with malware.
Unsuspecting of this fact, he re-inserts the card into his work computer and the malware spreads throughout the organisations system.
The question is how the company will now deal with this issue.
To answer this question, one needs to consider a few additional ones.
The first of these is who youd need to notify within the companys structure.
Its important to identify the vector of the infection and to establish a process for doing so.
In addition, what should managements reaction be?
Are there any other devices that could present a similar risk?
Does the company have policies and training to prevent this and do these apply to all storage devices?
At the core of this scenario is user awareness and detection ability.
Scenario 2: Quick fix
Your underpaid and overworked network administrator is finally going on vacation.
Just as shes packing the last item in her suitcase, her boss asks her to deploy a critical security patch.
She comes up with a quick fix so she can make her flight.
Soon after that, your service desk technician tells you people have been complaining that they cant log in.
It appears the admin did not run any tests for the critical patch she installed.
Does the technician have the skills and knowledge to handle the issue?
If not, whom should it be escalated to?
Does the company have a formal policy to change control in place?
Is staff sufficiently trained to escalate such issues?
Does the company have any disciplinary measures to take if an employee doesnt adhere to policies?
In the event of unexpected adverse impact, does the company have an option to rescind patches?
This is one of the threats that impact an organisations internal network.
Patch management is the process tested.
Scenario 3: An unexpected hacktivist threat
In the wake of an incident involving accusations of use of excessive force by authorities, a hacktivist threatens to attack your company.
You have no idea what kind of attack they are planning.
What measures can you take to best protect your organisation?
What is your reaction?
Again, you need to look at the potential threat vectors.
Perhaps certain vectors have been common in the last few weeks or months.
What methods can be used to prioritise threats?
You must alert your help desk as well as other departments within the organisation to the threat.
A bulletin board is a nifty solution.
You need to check your patch management status if you havent already, and augment IDS and IPS monitoring.
Think about getting outside help if you dont have the resources to manage all this by yourself.
Ask yourself what companies or organisations can help you analyse any malware identified.
Its evident that your response plan should account for such situations.
Your preparation is the process tested.
Your security professionals may be the first line of defense, but as you can see, they cant be the only one.
Your whole organisation needs to be involved, active, adequate, and compliant when security is at stake.
Scenario 4: Financial break-in
Following a financial audit, it emerges that a few people who have never actually worked for the company are receiving paychecks.
You conduct a review, which shows someone added them to the payroll a few weeks earlier, simultaneously, using a computer in the finance department.
How do you react?
The strategy starts with investigating how these people were added to payroll.
Lets say there was a break-in at the finance department prior to the addition.
A few computers were stolen.
However, there was no sensitive data on them, so the incident did not get serious attention.
See the original post here:
Preparing cyber professionals for the real world - ACS
How the quick shift to the cloud has led to more security risks – TechRepublic
Automating cloud security is a process still in its infancy for many organizations, says Unit 42.
Image: iStock/Undefined Undefined
The coronavirus pandemic forced many organizations to put their cloud migration projects into overdrive. Such a fast and unexpected transition to the cloud inevitably opened the door to more security threats. A report released Tuesday by Palo Alto Networks threat intelligence team Unit 42 examines how the cloud migration has affected security and what organizations can do to better protect themselves.
SEE:Managing the multicloud(ZDNet/TechRepublic special feature) |Download the free PDF version(TechRepublic)
Based on internal data, Unit 42's latest "Cloud Threat Report" found that organizations increased their cloud workloads by more than 20% between December 2019 and June 2020. Along the way, cloud security incidents rose by 188% just in the second quarter of 2020.
Industries that are vital in the effort to combat the pandemic have been hit especially hard. Over last year's second quarter, cloud security incidents for the retail, manufacturing and government sectors rose by 402%, 230% and 205%, respectively.
The rise in security incidents has been triggered in part by the inability of many organizations to automate cloud security. Previous research from Unit 42 found that 65% of publicly disclosed security incidents in the cloud were due to customer misconfigurations, a problem that could have been addressed through automated security controls. As one example, infrastructure as code (IaC) offers DevOps and security teams a way to enforce security standards, but this resource remains largely untapped.
To help organizations improve their cloud security, Unit 42 offers the following recommendations:
Gain awareness and deep cloud visibility. The first step in making cloud security and compliance easier is to understand how your developers and business teams are using the cloud today. This means getting and maintaining situational awareness of what's happening in your cloud environments down to the API and workload layers.
Set security guardrails. Ask yourself what misconfigurations should never exist in your environment. One example would be a database that receives direct traffic from the internet. When misconfigurations like this are found, your security guardrails should correct them automatically. If your organization does not already do so, consider using IaC templates to enforce security guardrails. There are potential security risks to using such templates, so be sure to scan them for common misconfigurations.
Adopt and enforce standards. It's extremely difficult to automate what you haven't standardized. Many teams talk about automation without having a security standard in place. Don't start from scratch. The Center for Internet Securityhas benchmarks for all major cloud platforms. Look to automate and codify these standards by leveraging IaC.
Train and hire security engineers who code. Unlike most traditional data centers, public cloud environments are driven by APIs. Successful risk management in the cloud requires that security teams be able to leverage these APIs to manage workload security at scale. APIs are difficult to use without having engineers on your security team who know how to code and automate security processes as part of the CI/CD pipeline.
Embed security in DevOps. Strive to map out the who, what, when and where of how your organization pushes code into the cloud. Once this is done, your goal should be to locate the least disruptive insertion points for security processes and tools into your CI/CD pipeline. In this regard, getting early buy-in from DevOps teams is critical. From there, work to minimize human interaction over time by automating as many operations as possible.
This is your go-to resource for XaaS, AWS, Microsoft Azure, Google Cloud Platform, cloud engineering jobs, and cloud security news and tips. Delivered Mondays
See original here:
How the quick shift to the cloud has led to more security risks - TechRepublic
Upgrade your digital security and enjoy a cleaner internet experience with this plug-and-play filter | TheHill – The Hill
The Hill may be compensated and/or receive an affiliate commission if you buy through our links.
The world is more interconnected than ever before, but this wave of technological innovation also creates evolving challenges to personal privacy. Digital security is at risk on a daily basis, even when you don't realize it, and it's crucial to stay a step ahead of those with malicious intent.
Fortunately, the Winston Privacy Filter is a simple solution that puts you in a position of empowerment when it comes to digital privacy. Discounted by 10% to a one-time payment of only $179 (reg. $199), this product is primed to supply restored peace of mind for you and your family.
Enjoy faster browsing, fewer ads, and safer internet access on all of your devices by accessing this plug-and-play option. Not only does Winston filter out trackers and aggressive advertising tactics, but it scrambles internet traffic to avoid disclosure of your location and identity in case outsiders attempt to pry into your personal information.
Swiftly eliminate big tech's spying efforts and fight against hackers to prevent damaging identity theft. Set restrictions as you see fit, including blockers for malware and adult content.
Whether you plan to use Winston on your work computer, smart TV, or children's interactive tablets, this product provides ideal protection in an increasingly risky online reality. Plus, you'll be covered on mobile devices with apps that service iOS and Android.
This subscription-free package comes with privacy filter hardware (made with aluminum and plastic; measuring in at less than five inches), a power adapter, two CAT6 Ethernet Cables, rubber bumpers, and instructions to help you sustain optimized performance.
With a 4.7 out of 5-star rating from Trustpilot, Winston is equipped with a RAM of 800MHz and 1GB DDR4 memory, backed up by security settings that are impervious to spectre and meltdown hacks.
Prioritize your digital privacy by investing in long-term protection from the Winston Privacy Filter for only $179.
Prices subject to change.
View original post here:
Upgrade your digital security and enjoy a cleaner internet experience with this plug-and-play filter | TheHill - The Hill