Zeltser: How to meet future cybersecurity challenges

lenny-zelster

Cybersecurity is one of the most fluid and changing fields of the tech industry. Every year, new threats and challenges emerge, outpacing past records and expectations. In this respect 2016 was no different. But as online services become more and more prominent and critical to our daily lives and businesses, being able to respond to threats before they deal their damage becomes more critical.

Case in point: The October 21 DDoS attack against Dyn cut millions of users from popular services such as Twitter and Netflix. That is something that most people can shrug off. But what happens when our cars, homes, hospitals and power grids depend on the correct functionality of our digital and online systems?

Cybersecurity expert Lenny Zeltser believes that new approaches to fighting malware can give a leg up in fighting cyberattacks and help organizations stay ahead of cybercriminals. Continue reading

Advertisements

These hacks and data breaches broke records in 2016

cybersecurity data breach hack

We’ve been saying this for many years: This year’s cyberattacks dwarfed last year’s. And in this regard, 2016 was no exception. From online fraud to account takeovers and data breaches, and everything else, attacks were dished out in bigger sizes and higher frequencies than before.

Some trends such as ransomware and DDoS attacks dominated the headlines, but that was not all 2016 had in stock. While experts might differ on which were the biggest hacks of the year, there’s no denying that the following four cases were really unprecedented in their own kind. Continue reading

The threat within: Understanding how to defend against the insider threat

Insider threat

By Gary Southwell, Seceon

The insider threat has become one of today’s most pressing cyber security concerns. In 2016, the Insider Threat Report Spotlight found seventy-four percent of organizations feel vulnerable to insider threats—a dramatic year-over-year increase. However, less than half of all organizations (42 percent) have the appropriate controls in place to prevent an insider attack. The survey also provides greater insight on the source of the threats:  “Privileged users, such as managers with access to sensitive information, pose the biggest insider threat to organizations (60 percent). This is followed by contractors and consultants (57 percent), and regular employees (51 percent).” Continue reading

6 common misconceptions about computer security

computer security

By Ken Wilson, ThePCDoctor

The world today is more connected than ever, and it will keep going that way. This leaves us open to cyber-attacks and our personal data at risk more than ever. There are myths about security that you should not believe because it leaves you open to these attacks. Continue reading

What Bruce Schneier teaches us about IoT and cybersecurity

Bruce Schneier, cybersecurity expert, cryptologist

As if I haven’t said it a million times, IoT security is critical.

But just when I thought I had it all figured out, somebody comes along and sheds new light on this very important topic in a different way.

At a November 16 hearing held by the Congress Committee on Energy and Commerce in light of the devastating October 21 Dyn DDoS attack, famous cryptologist and computer security expert Bruce Schneier offered a new perspective on IoT security, which makes it easier for everyone to understand the criticality of the issue. Continue reading

Social media security can no longer be an afterthought

8583949219_d565d18edf_o

By Mike Raggo, Chief Research Scientist at ZeroFOX

In today’s threatening age, it’s impossible to navigate the web without crossing paths with some sort of virus, threat or scam. In the past few months especially, we’ve seen social media become a prime vector for scammers to target individuals, going after everyone from the CEO of Twitter (through his own platform mind you) to 117 million innocent LinkedIn individuals. In fact, in just May and June of 2016, five major social networks – LinkedIn, Tumblr, Myspace, Twitter and Russia’s VK – all suffered leaked user credentials. Continue reading