cyberattacks

My recent trip to Moscow and meetings with experts there suggest that Ukraine, which is both historically and geographically
If you're like most Americans, the idea that our country doesn't have a unified cyber defense agency is about as unthinkable as a presidential contest between Donald Trump and Hillary Clinton.
As more organizations here in North America and overseas increasingly utilize third party vendors with a global presence to perform critical functions, process key transactions and provide exposure to sensitive proprietary information, those organizations with mature third party risk (TPR) programs are receiving a loud call to provide assistance to those new to the TPR field.
The concept of a supply chain as it is now understood borrows heavily from military strategy, where those armies that could assure the supply of critical materiel when it was needed won wars and spared lives.
1. Most notably: Third Party Relationships: Risk Management Guidance. Bulletin OCC-2013-29. Office of the Comptroller of
Yet another massive data break example, the TalkTalk data breach of "significant and sustained proportions" as quoted from the CEO Chief Executive Dido Harding, is cold comfort for customers, but what lessons must we keep learning?
How can your company learn from the U.S. Secret Service's mistakes? Start by developing basic information security guidelines with respect to who can access sensitive data (such as personnel files or other confidential data) within your organization.
the hard lesson learned from this exercise is the ability to identify those people whom I can add to my short list of truly trusted advisors and add myself to my superior's list of truly trusted advisors.
http://www.psmag.com/health-and-behavior/identity-is-lost-without-a-moral-compass References: Let's try a business scenario
The U.S. and several Southeast Asian nations have been harshly critical of China for expanding several coral reefs through dredging in the South China Sea, and building a runway on one of them, actions that the Americans fear may be used for military operations.
There are three reasons why the situation is so dire and why it was a piece of cake for hackers to rip off more than 4 million personnel records from the little known but important Office of Personnel Management (OPM).
More than ever before, journalists who work in dangerous zones understand the importance of technology to improve safety and reduce risk. Orellana, an investigative reporter for La Prensa, Honduras, works in San Pedro Sula, which has the highest murder rate in the world, with 186 murders per 100,000 people. Unwilling to investigate stories with only phone interviews, she enters the turf of drug cartels to interview victims of violence.
The Premera breach was uncovered on Jan. 29, the day that insurer Anthem Inc disclosed a cyberattack involving records of
Anthem does not know the exact number of Anthem versus non-Anthem customers affected by the breach because of those incomplete
By Jeff Mason PALO ALTO, Ca., Feb 13 (Reuters) - President Barack Obama asked tech industry executives on Friday for closer
If the first 15 years of the 21st century were defined by the so-called Axis of Evil -- the phrase George W. Bush applied to Iraq, Iran, and North Korea for their support of terrorists -- the next 15 years will likely be defined by the Access of Evil, as state and non-state cyberterrorists use technology to bypass our defenses in ways that damage businesses, lives, and nations.
"We hope and expect to work in close coordination with other attorneys general," said Jaclyn Falkowski, a spokeswoman for
Despite precautions, cyber attackers can often stay one step ahead of protection mechanisms. Sony, of course, had little in the way of cyber security protections, making it an easy soft target for hackers. But even better protected systems can be penetrated.
Einstein was wrong. World War IV will not be fought with sticks or rocks. It will be fought with bits and bytes, Trojans and bots, APTs and zero-days -- it's already started and we're already losing.
The campaign to stop cyber-crime begins with educating the next wave of professionals, but ongoing education and idea exchange are the ultimate keys to confronting cybercrime on the ground and in the boardroom.