Page 2,833«..1020..2,8322,8332,8342,835..2,8402,850..»

Psychologist Jordan Peterson infuriates Marvel because they compare him to the Red Skull in a comic Explica .co – Explica

Jordan B. Peterson, a Canadian clinical psychologist and professor, rose to world fame a few years ago for opposing a law in his country that would force people to use the pronouns chosen by trans people; the eloquence and elegance with which he opposed progressive ideas (or as they are derisively called, politically correct made it gain thousands of followers around the world; Some described him as a defender of common sense while others saw him as a danger, since he seemed to justify certain radical groups in the United States, linked to white supremacism and the extreme right.

Subscribe here to Disney Plus

The reason why the admired and despised psychologist has made news today is that he discovered that a new Marvel comic parodied some of his phrases and ideas on the character of Red Skull, a classic Captain America villain who is also a Nazi. On the one hand, this is not the first time that Peterson has been accused of fostering ideas akin to Nazism, and it is not the first time that a person has been caricatured to mock his ideas and avoid the fatigue of refuting them.

The comic in question was written by Ta-Nehisi Coates, American journalist and educator who since 2016 works as a screenwriter for Marvel Comics; Before entering the comic book world, he wrote on cultural issues for The Village Voice, Washington City Paper, and Time, and has won several awards for his books.

The first image Peterson shared, accompanied by the phrase What the hell? (What the hell?) Shows Red Skull on a laptop monitor, with the titles Ten Rules for Life, Chaos and Order, Karl Luegers Genius and The Feminist Trap, which are obvious references to the book 12 Rules for Life: An Antidote to Chaos.

Also read: Marvel, Harry Potter, Disney and the political polarization of millennials and centennials

What the hell? https://t.co/CGkuztpEjq

Dr Jordan B Peterson (@jordanbpeterson) April 6, 2021

Then he shared another panel of the comic where we see Captain America talking about the influence of Red Skull on young people, and we can almost imagine that he could be referring to Jordan B. Peterson, because in this version of the villain, he offers readings on the Internet:

It is the same for everyone. Youths. Weak. Looking for a purpose. I found the flag, you found the badge. They found [Red] Skull. It tells you what you have always wanted to hear. Which are secretly great. That the whole world is against them. That if they really are men, they will fight.

Do I really live in a universe where Ta-Nehisi Coates has written a Captain America comic that presents a parody of my ideas as part of the philosophy of the arch-villain Red Skull?

Do I really live in a universe where Ta-Nehisi Coates has written a Captain America comic featuring a parody of my ideas as part of the philosophy of the arch villain Red Skull? https://t.co/waFsAvWlfd

Dr Jordan B Peterson (@jordanbpeterson) April 6, 2021

The reactions went even further, as one user compared Jordan Petersons official biography to the origin story of Batmans villain, Scarecrow, to which the psychologist replied that there is no such official biography:

I dont have an official bio and I was thinner than that. And not so high.

I dont have an official biography and I was thinner than that. And not as tall. https://t.co/VuEGjYKl5X

Dr Jordan B Peterson (@jordanbpeterson) April 6, 2021

The Opindia site shared the news that Peterson was shocked by the comparison that was made of him to Red Skull, and he commented:

Its hard not to be surprised by the sheer surreality of the time we live in

Its hard not to be shocked by the sheer surreality of the time we inhabit https://t.co/vOKqBStaDo

Dr Jordan B Peterson (@jordanbpeterson) April 6, 2021

It is obvious that Jodan B. Peterson She is not happy with Marvel and with the comic book author for the way his ideas have been parodied, but it is a risk that he faced from the first moment he decided to oppose movements such as feminism, the fight for trans rights. and gender studies. Although caricaturing and putting people with whom one disagrees in Manichean terms does not seem the best either.

Do not miss: Classic characters that are now considered racist and macho by millennials and centennials

fbq('init', '1384358188242876');fbq('track', 'PageView');

Visit link:
Psychologist Jordan Peterson infuriates Marvel because they compare him to the Red Skull in a comic Explica .co - Explica

Read More..

Verizon Mobile Security Index: COVID-19 unearths new cyber threats for businesses – Verizon Communications

What you need to know:

Nearly half (49 percent) of businesses surveyed said that changes to remote working practices made during lockdown adversely affected their cybersecurity.

40 percent think mobile devices are their companys biggest IT security threat.

However 45 percent of businesses sacrificed the security of mobile devices to get the job done.

Results based on an independent survey of 856 professionals responsible for the buying, managing and the security of mobile and Internet of Things (IoT) devices for their companies.

BASKING RIDGE, N.J. - The COVID-19 pandemic forced businesses to quickly support remote working practices, often without proper security measures in place. The Verizon Business Mobile Security Index (MSI) 2021 reveals that many businesses may have left themselves vulnerable and open to cybercriminals in the rush to ensure their workforce could operate remotely. Forty-nine percent of businesses surveyed in the latest edition of Verizon's MSI stressed that changes made to remote working practices during lockdown adversely affected their companys cybersecurity.

Interestingly, even though 40 percent of businesses surveyed recognized that mobile devices are their companys biggest IT security threat, 45 percent of them knowingly sacrificed the security of mobile devices to get the job done (e.g., meet a deadline or productivity targets) and nearly a quarter (24 percent) sacrificed the security of mobile devices to facilitate their response to restrictions put in place due to the pandemic.

The pandemic caused a global shift in the way organizations operate, many of which ramped up their digital transformation agendas and working models to meet the fast-changing needs of both employees and customers, said Sampath Sowmyanarayan, Chief Revenue Officer, Verizon Business. While businesses focused their efforts elsewhere, cybercriminals saw a wealth of new opportunities to strike. With the rise of the remote workforce and the spike in mobile device usage, the threat landscape changed, which for organizations, means there is a greater need to hone in on mobile security to protect themselves and those they serve.

The effect of the pandemic on the workforce is going to have a lasting impact. According to the report, a large majority (70 percent) of those that had seen remote working grow following the introduction of pandemic restrictions expected it to fall again afterward. However, 78 percent said that it would still remain higher than before lockdown. Overall, our respondents said that they expected the number of remote workers to settle at around half (49 percent).

Small and Medium-Sized Businesses are also under threat

Over half of those surveyed (52 percent) said that small and medium-sized businesses are more of a target than larger enterprises but even though this is the case, 59 percent of small and medium-sized businesses had sacrificed security with 22 percent suffering a mobile compromise. Seventy-eight percent stated that they should take mobile-device security more seriously.

Of those surveyed, 72 percent of organizations are worried about device abuse or misuse. Part of the problem is that many companies struggle to develop an effective Acceptable Use Policy (AUP) 57 percent didnt have one at all.

The MSI details people and behaviors, apps, devices and things and networks and cloud as the four sectors of the mobile threat landscape. Additionally, it provides expert insights into how to help safeguard against pending cybercrime attacks, such as establishing a zero trust network access (ZTNA) model and a secure access service edge (SASE) architecture, which is designed for a mobile-first and cloud-first world.

The Verizon Mobile Security Index 2021 findings are based on an independent survey of 856 businesses across Australia, the U.S. and the U.K. It surveyed professionals that are responsible for the buying, managing, and security of mobile and Internet of Things (IoT) devices for their companies.

It provides unique insights into the current mobile threat landscape and what organizations are, or in many cases arent, doing to protect their data and key systems. In addition to analysis from Verizons experts, the report includes insights and real-world data from leading security and management companies Asavie, Blackberry Cylance, Check Point, IBM, Ivanti, Lookout, NetMotion, Netskope, Proofpoint, Qualcomm, Thales, VMware, and Wandera.

Read the full Verizon Mobile Security Index 2021, as well as the Public Safety, Public Sector and small and medium-sized businesses snapshots, and learn more about what Verizon is doing to help address cybersecurity threats.

See the original post:
Verizon Mobile Security Index: COVID-19 unearths new cyber threats for businesses - Verizon Communications

Read More..

Preparing cyber professionals for the real world – ACS

There is a dire shortage of talent in the information security industry.

Today, industry roles command big salaries, but also bigger workloads.

When you read articles about the best jobs or highest paying jobs to consider, information security is always in the top 10 of the list.

How does this industry sustain current security professionals and prepare the next generation?

Here, I look at what current professionals can do, and offer sound advice for preparing the next generation of security pros.

Malicious cyber activities are becoming very common.

Some have gone so far as to say that this form of crime knows no bounds.

It is global and unlimited, like the internet itself.

The deficit of a well-developed, skilled workforce makes government and businesses recruitment efforts very difficult.

Developing sophisticated technical capacities has become a priority for US and global industries and governments.

The role of educators

No-one plays a more important role in preparing the next generation security professionals than educators and trainers.

We need to make sure existing education gives students a holistic view of cyber security with focus on relevance and proficiency.

The complicated state of cyber threats requires a learning methodology engendering critical thinking and deeper understanding to defend against increasingly complex cyberattacks.

A number of shortcomings exist in the conventional classroom training model in creating efficient and reliable cyber security professionals, according to the Software Engineering Institute.

Going forward, we will be facing increasingly interdisciplinary and multi-faceted challenges.

These will necessitate knowledge in different fields and areas, including law and law enforcement, criminology, engineering, computer science, to name a few.

This is hardly a surprise, as the main elements of cyber security technical perfection, process, and people must be supplemented by the capability to manage shortcomings.

Deterrence Doctrine and SPC (Situational Crime Prevention) theories

Information system researchers analysing security compliance and behaviour use the deterrence doctrine, according to which the likelihood of violations is inversely proportional to the perceived risk and punishment.

A review found that this theory has been the most-cited one in Centre for Internet Security (CIS) security literature over the past three decades.

According to this literature, one must increase awareness of an organisations efforts to limit ICT abuse and of the likelihood and/or extent of sanctions in order to reduce ICT violations.

The Situational Crime Prevention (SCP) Theory is widely used to study cybercrime and reduce criminal activities perpetrated or otherwise related to employees.

Most crimes are opportunistic and occur when a motivated offender detects a suitable and unguarded (or incapably guarded) target.

Proponents of the SCP theory find violators to be rational decisionmakers who carry out an analysis of costs and benefits before committing a crime.

Accordingly, the SCP theory outlines five broad categories of efforts to counteract cybercrime that security professionals should make. They are presented in the table below:

Table 1. Categories of efforts to counteract cybercrime, according to SCP

The US government established a cyber skill task force to address the crisis in human capital in the field of cyber security, improve retention and recruitment of cyber security professionals, and identify the best ways to create and support a national cyber security workforce.

This initiative gave rise to the NICE Framework: a proposal to group, organise, and describe cyber security tasks.

The framework is comprised of seven categories covering 31 specialty areas, as well as details regarding work roles, skills, abilities, knowledge, and tasks.

It has become a good starting point for developing a central cyber security curriculum and a useful categorisation of topics and related skills.

Cyber security exercises

The NICE Framework and the Situational Crime Prevention Theory have been combined to design and deliver cutting-edge tools and strategies.

One notable example of how these are used is the Cyber Security Exercises (CSE), an offense/defense environment, in which students are grouped and get a virtual machine to host HTTP(S), FTP, SSH, and other services.

These services can then be accessed by other groups.

The CSE aim to reflect real-life environments for students to apply their skills.

The approach of CSE architecture has proved useful for translating theory into practice.

More specifically, CSE are elaborate learning experiences aimed at developing competence and expert knowledge through simulation.

They are associated with a number of pedagogical issues, including design of exercises and training outcomes and evaluation.

Training effectiveness can be improved based on analysis, observation, and integrating educational knowledge and focus at each stage of the life cycle of CSE, including planning, feedback, and implementation.

Its necessary to measure change systematically in order to improve CSE, ranging from organisational change to changing customer experiences.

Scenarios to help prepare cyber security professionals

According to the Center for Internet Security, technical professionals, admins, and users share the responsibility for security.

The CIS has prepared a series of tabletop exercises to help cyber security professionals and teams secure their systems by means of tactical strategies.

These exercises are intended to assist organisations in comprehending various risk scenarios and preparing for potential cyberthreats.

The exercises Im about to present do not take very long to complete.They are a convenient tool to develop a cyber security mindset.They consist of six scenarios which list relevant processes, threat actors, and impacted assets:

Scenario 1: Malware infection

While using the companys digital camera for work, a staff member takes a picture that he then moves to his personal computer.

He does so by inserting the SD card, which while connected to his PC becomes infected with malware.

Unsuspecting of this fact, he re-inserts the card into his work computer and the malware spreads throughout the organisations system.

The question is how the company will now deal with this issue.

To answer this question, one needs to consider a few additional ones.

The first of these is who youd need to notify within the companys structure.

Its important to identify the vector of the infection and to establish a process for doing so.

In addition, what should managements reaction be?

Are there any other devices that could present a similar risk?

Does the company have policies and training to prevent this and do these apply to all storage devices?

At the core of this scenario is user awareness and detection ability.

Scenario 2: Quick fix

Your underpaid and overworked network administrator is finally going on vacation.

Just as shes packing the last item in her suitcase, her boss asks her to deploy a critical security patch.

She comes up with a quick fix so she can make her flight.

Soon after that, your service desk technician tells you people have been complaining that they cant log in.

It appears the admin did not run any tests for the critical patch she installed.

Does the technician have the skills and knowledge to handle the issue?

If not, whom should it be escalated to?

Does the company have a formal policy to change control in place?

Is staff sufficiently trained to escalate such issues?

Does the company have any disciplinary measures to take if an employee doesnt adhere to policies?

In the event of unexpected adverse impact, does the company have an option to rescind patches?

This is one of the threats that impact an organisations internal network.

Patch management is the process tested.

Scenario 3: An unexpected hacktivist threat

In the wake of an incident involving accusations of use of excessive force by authorities, a hacktivist threatens to attack your company.

You have no idea what kind of attack they are planning.

What measures can you take to best protect your organisation?

What is your reaction?

Again, you need to look at the potential threat vectors.

Perhaps certain vectors have been common in the last few weeks or months.

What methods can be used to prioritise threats?

You must alert your help desk as well as other departments within the organisation to the threat.

A bulletin board is a nifty solution.

You need to check your patch management status if you havent already, and augment IDS and IPS monitoring.

Think about getting outside help if you dont have the resources to manage all this by yourself.

Ask yourself what companies or organisations can help you analyse any malware identified.

Its evident that your response plan should account for such situations.

Your preparation is the process tested.

Your security professionals may be the first line of defense, but as you can see, they cant be the only one.

Your whole organisation needs to be involved, active, adequate, and compliant when security is at stake.

Scenario 4: Financial break-in

Following a financial audit, it emerges that a few people who have never actually worked for the company are receiving paychecks.

You conduct a review, which shows someone added them to the payroll a few weeks earlier, simultaneously, using a computer in the finance department.

How do you react?

The strategy starts with investigating how these people were added to payroll.

Lets say there was a break-in at the finance department prior to the addition.

A few computers were stolen.

However, there was no sensitive data on them, so the incident did not get serious attention.

See the original post here:
Preparing cyber professionals for the real world - ACS

Read More..

How the quick shift to the cloud has led to more security risks – TechRepublic

Automating cloud security is a process still in its infancy for many organizations, says Unit 42.

Image: iStock/Undefined Undefined

The coronavirus pandemic forced many organizations to put their cloud migration projects into overdrive. Such a fast and unexpected transition to the cloud inevitably opened the door to more security threats. A report released Tuesday by Palo Alto Networks threat intelligence team Unit 42 examines how the cloud migration has affected security and what organizations can do to better protect themselves.

SEE:Managing the multicloud(ZDNet/TechRepublic special feature) |Download the free PDF version(TechRepublic)

Based on internal data, Unit 42's latest "Cloud Threat Report" found that organizations increased their cloud workloads by more than 20% between December 2019 and June 2020. Along the way, cloud security incidents rose by 188% just in the second quarter of 2020.

Industries that are vital in the effort to combat the pandemic have been hit especially hard. Over last year's second quarter, cloud security incidents for the retail, manufacturing and government sectors rose by 402%, 230% and 205%, respectively.

The rise in security incidents has been triggered in part by the inability of many organizations to automate cloud security. Previous research from Unit 42 found that 65% of publicly disclosed security incidents in the cloud were due to customer misconfigurations, a problem that could have been addressed through automated security controls. As one example, infrastructure as code (IaC) offers DevOps and security teams a way to enforce security standards, but this resource remains largely untapped.

To help organizations improve their cloud security, Unit 42 offers the following recommendations:

Gain awareness and deep cloud visibility. The first step in making cloud security and compliance easier is to understand how your developers and business teams are using the cloud today. This means getting and maintaining situational awareness of what's happening in your cloud environments down to the API and workload layers.

Set security guardrails. Ask yourself what misconfigurations should never exist in your environment. One example would be a database that receives direct traffic from the internet. When misconfigurations like this are found, your security guardrails should correct them automatically. If your organization does not already do so, consider using IaC templates to enforce security guardrails. There are potential security risks to using such templates, so be sure to scan them for common misconfigurations.

Adopt and enforce standards. It's extremely difficult to automate what you haven't standardized. Many teams talk about automation without having a security standard in place. Don't start from scratch. The Center for Internet Securityhas benchmarks for all major cloud platforms. Look to automate and codify these standards by leveraging IaC.

Train and hire security engineers who code. Unlike most traditional data centers, public cloud environments are driven by APIs. Successful risk management in the cloud requires that security teams be able to leverage these APIs to manage workload security at scale. APIs are difficult to use without having engineers on your security team who know how to code and automate security processes as part of the CI/CD pipeline.

Embed security in DevOps. Strive to map out the who, what, when and where of how your organization pushes code into the cloud. Once this is done, your goal should be to locate the least disruptive insertion points for security processes and tools into your CI/CD pipeline. In this regard, getting early buy-in from DevOps teams is critical. From there, work to minimize human interaction over time by automating as many operations as possible.

This is your go-to resource for XaaS, AWS, Microsoft Azure, Google Cloud Platform, cloud engineering jobs, and cloud security news and tips. Delivered Mondays

See original here:
How the quick shift to the cloud has led to more security risks - TechRepublic

Read More..

Upgrade your digital security and enjoy a cleaner internet experience with this plug-and-play filter | TheHill – The Hill

The Hill may be compensated and/or receive an affiliate commission if you buy through our links.

The world is more interconnected than ever before, but this wave of technological innovation also creates evolving challenges to personal privacy. Digital security is at risk on a daily basis, even when you don't realize it, and it's crucial to stay a step ahead of those with malicious intent.

Fortunately, the Winston Privacy Filter is a simple solution that puts you in a position of empowerment when it comes to digital privacy. Discounted by 10% to a one-time payment of only $179 (reg. $199), this product is primed to supply restored peace of mind for you and your family.

Enjoy faster browsing, fewer ads, and safer internet access on all of your devices by accessing this plug-and-play option. Not only does Winston filter out trackers and aggressive advertising tactics, but it scrambles internet traffic to avoid disclosure of your location and identity in case outsiders attempt to pry into your personal information.

Swiftly eliminate big tech's spying efforts and fight against hackers to prevent damaging identity theft. Set restrictions as you see fit, including blockers for malware and adult content.

Whether you plan to use Winston on your work computer, smart TV, or children's interactive tablets, this product provides ideal protection in an increasingly risky online reality. Plus, you'll be covered on mobile devices with apps that service iOS and Android.

This subscription-free package comes with privacy filter hardware (made with aluminum and plastic; measuring in at less than five inches), a power adapter, two CAT6 Ethernet Cables, rubber bumpers, and instructions to help you sustain optimized performance.

With a 4.7 out of 5-star rating from Trustpilot, Winston is equipped with a RAM of 800MHz and 1GB DDR4 memory, backed up by security settings that are impervious to spectre and meltdown hacks.

Prioritize your digital privacy by investing in long-term protection from the Winston Privacy Filter for only $179.

Prices subject to change.

View original post here:
Upgrade your digital security and enjoy a cleaner internet experience with this plug-and-play filter | TheHill - The Hill

Read More..

Airlock Digital Further Improves its Allowlisting Solution – Enterprise Security Mag

Airlock eliminates the support burden of allowlisting by implementing simple workflows that minimize user disruption. If a required application is blocked, IT teams, including non-security personnel, can grant permissions to users using a variety of One-Time Password (OTP) options.

FREMONT, CA :Airlock Digital, an Australian cybersecurity leader, is continuing to improve its industry-leading allowlisting solution further to block malware, ransomware, and zero-day attacks and help IT and cybersecurity teams comply with cybersecurity requirements and reduce allowlisting operational effort.

There are many security products that can allow or block files. That isnt the challenge, says David Cottingham, Co-Founder, Airlock Digital. The challenge is how you instrument the allowlisting process to operationalise pro-active security controls.

Allowlisting, also known as application whitelisting or application monitoring, is documented in a range of government cybersecurity standards and regulations worldwide, including the ACSC Essential Eight Strategies to Mitigate Cyber Security Incidents, U.S. NIST 800-171, CMMC, Center for Internet Security Basic Six, Canadian Top 10 IT Security Actions, and New Zealand Critical Controls are among the top ten mitigations. There are several cybersecurity solutions available today that can prevent files from being executed on endpoint systems. Almost none have the granular centralized control, workflow support, or organizational flexibility needed to support allowlisting in complex, enterprise computing environments at a reasonable cost.

Codeless self-service aims to reduce friction and enables users to handle exceptions as quickly as possible, reducing overall business impact and work disruption, says Cottingham. Ultimately, organizations can choose how they want exception management to be used, in line with the organizations appetite for risk.

Airlock eliminates the support burden of allowlisting by implementing simple workflows that minimize user disruption. If a required application is blocked, IT teams, including non-security personnel, can grant permissions to users using a variety of One-Time Password (OTP) options. A new codeless self-service functionality is included in the latest Airlock version 4.7 update, in addition to one-time use and mobile OTP. This helps to retain user usability without compromising security. Privilege users can self-administer temporary access to applications and scripts that are limited to the general user base using codeless self-service.

By having more granular criteria for blocklisting rules, you can now easily operationalise your security policies, says Daniel Schell, Co-Founder, and Chief Technology Officer, Airlock Digital. Based on Active Directory group membership, security administrators can easily block applications such as TeamViewer across the environment in a couple of clicks, while still allowing access for users that may need it.

Airlock Digital has adopted a user-centric approach to allowlisting with the latest product enhancements. Airlock gives businesses more flexibility and streamlines workflows by allowing them to manage access for individual users or groups in addition to devices. This makes Airlocks allowlisting more scalable and allows for integration with Privileged Access Management (PAM) solutions. Additionally, more granular blocklisting standards have been introduced, enabling blocklist rules to be applied to particular enterprise security classes and operating system versions, ensuring that only properly privileged users can execute files across a range of device types.

The importance of Airlock as a strategic cybersecurity tool for achieving proactive endpoint defense continues to develop. Another immediate advantage is that it reduces the number of security incidents that Security Operations Centre (SOC) teams must contend with. This is accomplished simply by stopping malicious execution and limiting the ability to execute risky code.

Airlock also offers users full insight into all files running on their endpoints, including their history and related network operation, and can share this information with SIEM platforms. Airlock cloud customers can now use a REST API to retrieve SIEM logs from the cloud, eliminating the need for a custom solution or exposing ports to the internet.

See more here:
Airlock Digital Further Improves its Allowlisting Solution - Enterprise Security Mag

Read More..

New WEF Principles for Cybersecurity Board Governance Address Expansion, Organizational Scope of Cyber Risk – CPO Magazine

Cyber risk climbs the organizational priority ladder every year, but it accelerated in a unique way with the pandemic conditions of 2020. The World Economic Forums newly-released principles for board governance of cybersecurity offer a base of best practices for dealing with this new reality, with a new element being a strong emphasis on organization-wide implementation of cybersecurity culture.

The report identifies six core principles that the WEF believes are items of the most immediate importance, with an eye toward expanding them into a research agenda at some point in the near future. The ultimate goal is a cohesive approach to cyber risk governance that can be applied globally. For the moment, the project supports each of these core principles with a basic framework aimed at facilitating immediate implementation.

The WEF research team, composed of members of the Internet Security Alliance (ISA) and drawing from surveys conducted among the National Association of Corporate Directors (NACD), cautions that business leaders need to immediately begin viewing cyber risk as a potentially existential concern. Both consumers and government regulators are now judging companies by how tight of a security ship they run and how well they protect sensitive personal information that is entrusted to them.

The WEFs ideal vision is a cohesive, global, cross-border approach to cyber risk governance. That doesnt exist as of yet, but the report is intended as a first step. The most important core element, convincing board directors that cybersecurity should be a priority for improvement in the immediate future, appears to already be a majority opinion with 60.5% of NACD respondents classifying it as important or very important. Additionally, 70% view cyber threats as a strategic, enterprise risk.

Respondents to the World Economic Forum Global Risk Report 2021 listed cybersecurity failure as the fourth most pressing business risk in the near term (0 to 2 years), behind only infectious diseases, livelihood crises and extreme weather events. Rapidly developing and changing cybersecurity threats were also #4 on the list of expected trends that will have the greatest impact on companies in the coming year.

The six board governance principles begin with the suggestion that cybersecurity be viewed as a strategic business enabler rather than merely an IT issue. WEF frames cyber risk, which has now increased to the point that it is virtually omnipresent, as a continual opportunity to both preserve and create value. Key board governance considerations here include regular inclusion of cyber risk considerations in board meetings, ensuring that a board committee has oversight of cyber issues and asking executives to identify opportunities to use cybersecurity as a market differentiator or business driver.

The second board governance principle is developing a clear understanding of economic drivers and impact of cyber risk. Board governance suggestions here include regularly engaging in scenario planning that models trade-offs between digital transformation and cyber risk, and establishing a consistent risk quantification framework for calculating likelihood and economic impact of various cybersecurity scenarios.

The third board governance principle is to align cyber risk management with business needs. This can be done by requiring the C suite to report to the board on the cybersecurity implications of their activities and to develop tested plans for anticipated events, and by requiring management to provide the board with road maps of the companys determinations of risk materiality through the lens of regulatory obligations.

The fourth board governance principle is to ensure that organizational design supports cybersecurity. Suggestions in this area include setting expectations that cybersecurity receives adequate funding and staffing, cultivating a cybersecurity culture that extends beyond the IT department and appointing an accountable officer responsible for coordinating organization-wide cyber risk strategy.

The fifth principle is to integrate cybersecurity expertise into board governance. This could mean regular training for board directors, soliciting regular reports from third-party advisors / assessors, or periodic audits among other possibilities.

The final suggested board governance principle is to encourage systemic resilience and collaboration. The report suggests the creation of peer networks for sharing best practices that extend beyond individual organizations, putting similar collaboration plans in place and sending management to participate in industry groups and knowledge-sharing platforms.

While there is much more subtlety to the case than this, you can boil the report down to a fundamental argument: boards need to pay more attention to cybersecurity and pay more forward in the way of resources and staffing to keep pace with what is an exponentially increasing risk. However, the one entirely new element here (in the sense of not being suggested in prior WEF publications) is the emphasis on inter-organization collaboration and a general refocus on cyber risk as a systemic and pernicious threat that manifests in very similar ways for all sorts of different businesses. Cyber risk must not only move up the ladder from technicians to an active role among boards of directors, but management must engage on the topic with the management of other organizations to improve outcomes.

Report identifies 6 core principles that the WEF believes are items of the most immediate importance for addressing #cyberrisk. #cybersecurity #respectdataClick to Tweet

The WEF anticipates expanding on these initial principles with further publications in the near future, but has not yet announced a specific time frame.

Read the original:
New WEF Principles for Cybersecurity Board Governance Address Expansion, Organizational Scope of Cyber Risk - CPO Magazine

Read More..

Dotlines CTO Eftekhar builds the first-ever DIY productivity & security solution – Hindustan Times

India, 2nd April 2021: Back at the start of his career 10 years ago, working in the fast-growing internet services companies, Mr. Eftekhar knew deep in his mind that dependence on the internet will only rise exponentially and the millions of connected homes and businesses will be needing a practical and robust tool to get the best of internet, minus the threats and dangers it brings along.

With a deep understanding of IP networking, coupled with his sparkling talent in application networking, Eftekhar U Chy started building the 1st-ever do-it-yourself or DIY internet control and security solution Audra (www.audra.io). The rising tech-titan and his AI/ML-powered cloud solution bring new hope for SMEs in their fearless growth. With an on-prem appliance, tagged with machine learning backed robust AI-cloud application, which is also conveniently controlled by a mobile app, Audra is definitely the answer to many homes and small businesses across Asia and beyond. When it comes to internet security, Audra aims to be the right fit for them.

Eftekhar now spearheads the Singapore-based technology entity Dotlines as its CTO. The group continues to bag spectacular growth across continents, with the innovations Eftekhar and his vigorous technology organization bring for the group. The group does business in more than 12 verticals, all powered by his state-of-the-art technology platforms.

Audra is a key vertical in our group, and it offers a complete suite of solutions across the internet pyramid. It gives efficient protection for ISPs, iron-clad security for enterprises, productivity and safeguarding for small-medium businesses, parental control and threat-prevention for homes, and finally easily-done protection for personal devices, said Eftekhar.

He informed that 80% of hackers choose Asian SMEs as an easy target because they are well-unprotected. Not only that, 60% of employees spend one-third of their time doing personal stuff, and thus SMEs lose a lot on the productivity side.

He added, Asia is thriving on the substantial SME base, and we see they are increasingly getting digitalized. Countries like Indonesia, India are no different. But most of them think they are not vulnerable, find market solutions complex and 90% of them have no IT personnel to manage office network. We at Dotlines, always do purpose-driven innovation, and Audra is an outcome of that philosophy. We built Audra in a way, so that, it is extremely simple to set up (no IT background needed), convenient to set rules for productivity and security of office network (pre-set rules, control from an easy user app in the phone) and affordable for SME owners to own this with no hassle.

India, with its massive base of 60+ million MSMEs, need a solid answer to the concerns they have, when it comes to business digitalization. We strongly believe Audra is the best of the answers. Therefore, with our proven tracks in Indonesia, Malaysia, we are confident, SMEs in India will also adopt the simple, convenient and affordable products and security benefits Audra offers, concluded Eftekhar.

Audras marvel is set around its superbly practical end-user-based design-thinking and highly efficient solution architecture. Its sophisticated machine learning algorithm powers up its Cloud AI, which delivers unprecedented practicality and robustness, when it comes to internet control to bring employee productivity in and push known/unknown cyber threats out.

To know more, visit Audra.

Read the original:
Dotlines CTO Eftekhar builds the first-ever DIY productivity & security solution - Hindustan Times

Read More..

Security-as-a-Service Market is poised to surge at a CAGR of over 18% through 2031 – Yahoo Finance

NEW YORK, April 5, 2021 /PRNewswire/ -- Across regions and verticals, due to increased security threats, adoption of security solutions is rising, leading to expansion of the security-as-a-service (SaaS) market. Due to a sudden increase in cyber-crimes and data hacking activities, enterprises have started focusing on better security solutions for securing information deployed on the cloud as well as on-premise, and to strengthen the security structure of their company. Moreover, large organizations are taking initiatives to implement Saas solutions for their business applications deployed on the cloud, and helping other small enterprises understand the usage of security as a service capabilities and internet security threats.

Persistence Market Research Logo

As per Persistence Market Research revised analysis, the global SaaS market is poised to surge at a CAGR of over 18% through 2031.

Key Takeaways from Market Study

North America was the dominant market in 2020 in terms of value for SaaS. Over the coming years, Europe is expected to be one of the key markets for sustainable revenue generation from security as a service, as increasing adoption of cloud-based solutions and services is boosting market growth in the region.

The BFSI (Banking, Financial Services, and Insurance) segment is expected to offer the highest incremental opportunity during the forecast period, as many private banks are using SaaS models for email encryption, data loss prevention, and network protection.

To reduce implementation costs, large enterprises are using cloud-based solutions and adopting SaaS solutions.

The education and manufacturing industry is expected to increasingly adopt security as a service solutions to securely access confidential data on a real-time basis.

The SaaS market in the U.S. is expected to expand at a CAGR of around 16% over the next ten years, while that in the U.K. at 17.5%.

The markets in China and India are slated to surge at around 20% CAGRs respectively, over the next ten years.

Request for Sample PDF of Report: https://www.persistencemarketresearch.com/samples/12583

Story continues

"Enterprises are implementing IOT-based solutions progressively. IOT solution providers are integrating SaaS in order to reduce cyber-attacks on connected devices, identify the threat, and fix susceptibilities before launching them in the market, says a Persistence Market Research analyst.

COVID-19 Pandemic Impact Analysis

Increase in remote working has led to the need for greater focus on cyber-security, because of higher exposure to cyber risks. This is evident from the fact that around 47% of individuals fall for phishing scams while working at home. Cyber-attackers are seeing COVID-19 as an opportunity to step up their criminal activities and exploit vulnerable employees working from home. Hence, to reduce the impact of cyber-attacks, companies are focusing and enhancing their development and application of security measures.

Ask an Expert for more query: https://www.persistencemarketresearch.com/ask-an-expert/12583

Many companies are increasing their spending budgets on security solutions as a fight against increasing number of cyber-attacks and threats amidst this pandemic outbreak. Also, cybersecurity technology and service providers are shifting priorities to support current needs: business continuity, remote work, and planning for transition to the next normal.

Get Full Access of Report: https://www.persistencemarketresearch.com/checkout/12583

Find More Valuable Insights

Persistence Market Research puts forward an unbiased analysis of the global security as a service market, providing historical demand data (2016-2020) and forecast statistics for the period 2021-2031. To understand the opportunities in SaaS, the market is segmented on the basis of component (solutions and services), application (network security, endpoint security, application security, cloud security, and others), and vertical (banking financial service and insurance, healthcare, retail, it & telecom, energy & utilities, government, and others), across seven major regions of the world.

Browse Research Release at: https://www.persistencemarketresearch.com/market-reports.asp

Browse End-to-end Market: IT and Telecommunication

Related Reports:

About Persistence Market Research

Overview:

Persistence Market Research (PMR) is a third-platform research firm. Our research model is a unique collaboration of data analytics and market research methodology to help businesses achieve optimal performance.

To support companies in overcoming complex business challenges, we follow a multi-disciplinary approach. At PMR, we unite various data streams from multi-dimensional sources. By deploying real-time data collection, big data, and customer experience analytics, we deliver business intelligence for organizations of all sizes.

Contact

Rajendra Singh Persistence Market Research U.S. Sales Office:305 Broadway, 7th FloorNew York City, NY 10007+1-646-568-7751United StatesUSA - Canada Toll-Free: 800-961-0353Email: sales@persistencemarketresearch.com Visit Our Website: https://www.persistencemarketresearch.com

Cision

View original content:http://www.prnewswire.com/news-releases/security-as-a-service-market-is-poised-to-surge-at-a-cagr-of-over-18-through-2031-301261938.html

SOURCE Persistence Market Research Pvt. Ltd.

See more here:
Security-as-a-Service Market is poised to surge at a CAGR of over 18% through 2031 - Yahoo Finance

Read More..

WatchGuard uncovers top cyber threat trends of Q4 2020 – SecurityBrief New Zealand

Fireless malware attacks and cryptominers are coming back in force, while ransomware attacks are on the decline.

This is according to WatchGuard Technologies new Internet Security Report for Q4 2020.

Among its most notable findings, the report reveals that fileless malware and cryptominer attack rates grew by nearly 900% and 25% respectively, while unique ransomware payloads plummeted by 48% in 2020 compared to 2019.

Additionally, the WatchGuard Threat Lab found that Q4 2020 brought a 41% increase in encrypted malware detections over the previous quarter and network attacks hit their highest levels since 2018.

WatchGuard's report looked more closely at various trends and attack types, including fileless malware, cryptominers, ransomware, encrypted and evasive malware, botnet malware, supply chain attacks, trojan dupes and network attacks.

Fileless malware

Fileless malware rates in 2020 increased by 888% over 2019.

According to WatchGuard, these threats can be particularly dangerous due to their ability to evade detection by traditional endpoint protection clients and because they can succeed without victims doing anything beyond clicking a malicious link or unknowingly visiting a compromised website.

Toolkits such as PowerSploit and CobaltStrike allow threat actors to easily inject malicious code into other running processes and remain operational even if the victims defences identify and remove the original script.

Deploying endpoint detection and response solutions alongside preventative anti-malware can help identify these threats.

Cryptominers

After virtually all cryptocurrency prices crashed in early 2018, cryptominer infections became far less prevalent and reached a low of 633 unique variant detections in 2019.

According to the researchers, attackers continued adding cryptominer modules to existing botnet infections and extract passive income from victims while abusing their networks for other cyber crime.

As a result, and with prices trending upward again in Q4 2020, the volume of cryptominer malware detections climbed more than 25% over 2019 levels to reach 850 unique variants last year.

Ransomware

For the second year in a row, the number of unique ransomware payloads trended downward in 2020, falling to 2,152 unique payloads from 4,131 in 2019 and the all-time-high of 5,489 in 2018.

These figures represent individual variants of ransomware that may have infected hundreds or thousands of endpoints worldwide.

The majority of these detections resulted from signatures originally implemented in 2017 to detect WannaCry and its related variants, showing that ransomworm tactics are still thriving over three years after WannaCry burst onto the scene.

The steady decline in ransomware volume indicates the attackers continued shift away from the unfocused, widespread campaigns of the past toward highly targeted attacks against healthcare organisations, manufacturing firms and other victims for which downtime is unacceptable, WatchGuard states.

Encrypted, evasive malware

Despite being the fourth consecutive quarter of decreasing malware volumes overall, nearly half (47%) of all attacks WatchGuard detected at the network perimeter in Q4 were encrypted.

Additionally, malware delivered via HTTPS connections increased by 41%, while encrypted zero day malware (variants that circumvent antivirus signatures) grew by 22% over Q3.

Botnet malware targeting IoT devices and routers

In Q4, the Linux.Generic virus (also known as The Moon) made its debut on WatchGuards list of top 10 malware detections.

This malware is part of a network of servers that directly targets IoT devices and consumer-grade network devices like routers to exploit any open vulnerabilities.

WatchGuard's investigation uncovered Linux-specific malware designed for ARM processors and another payload designed for MIPS processors within the attackers infrastructure, indicating a clear focus on evasive attacks against IoT devices.

Supply chain attacks

The sophisticated, allegedly state-sponsored SolarWinds supply chain breach will have wide implications throughout the security industry for years to come, WatchGuard states.

Its effects spread far beyond SolarWinds to almost 100 companies, including some major Fortune 500s, big security companies, and even the U.S. government.

WatchGuard's detailed incident breakdown showcases the importance of defending against supply chain attacks in todays interconnected digital ecosystem.

New trojan dupes

Trojan.Script.1026663 made its way onto WatchGuard's top five most-widespread malware detections list in Q4.

The attack begins with an email asking victims to review an order list attachment. The document triggers a series of payloads and malicious code that ultimately lead the victim machine to load the final attack: the Agent Tesla remote access trojan (RAT) and keylogger.

Network attacks

Total network attack detections grew by 5% in Q4, reaching their highest level in over two years, the report shows.

Additionally, total unique network attack signatures showed steady growth as well with a 4% increase over Q3.

This shows that even as the world continues to operate remotely, the corporate network perimeter is still very much in play as threat actors continue to target on-premises assets.

WatchGuard chief technology officer Corey Nachreiner says, The rise in sophisticated, evasive threat tactics last quarter and throughout 2020 showcases how vital it is to implement layered, end-to-end security protections.

"The attacks are coming on all fronts, as cyber criminals increasingly leverage fileless malware, cryptominers, encrypted attacks and more, and target users both at remote locations as well as corporate assets behind the traditional network perimeter.

"Effective security today means prioritising endpoint detection and response, network defences and foundational precautions such as security awareness training and strict patch management.

See the original post here:
WatchGuard uncovers top cyber threat trends of Q4 2020 - SecurityBrief New Zealand

Read More..