Posts

Showing posts from October, 2017

Cybersecurity center at Bedford moves into stage for programming

The Bedford Advanced Cybersecurity Development Center is officially past the planning stage into the programming stage. BEDFORD TOWNSHIP — The Bedford Advanced Cybersecurity Development Center is officially past the planning stage into the programming stage. A ribbon-cutting ceremony is slated for Oct. 27 at the Whitman Center campus of Monroe County Community College; but the team has wasted no time getting details in place. The college courses that are a core component of this program begin with MCCC’s January semester. And in an unusual step for mid-year, Bedford High School students will be allowed to revise their academic schedules to take the courses under dual enrollment starting in January. Cybersecurity center at Bedford moves into stage for programming: http://www.monroenews.com/news/20171021/cybersecurity-center-at-bedford-moves-into-stage-for-programming

Open source components remain vulnerable to malicious or unauthorized activity

Image
2017 State of Software Security Report Veracode announced findings from the 2017 State of Software Security Report , a comprehensive review of application security testing data from scans conducted by a base of more than 1,400 customers. Among other industry trends such as vulnerability fix rates and percent of applications with vulnerabilities, the report exposes the pervasive risk from vulnerable open source components. Researchers found that 88 percent of Java applications contain at least one vulnerable component, making them susceptible to widespread attacks. This is in part because fewer than 28 percent of companies conduct regular composition analysis to understand which components are built into their applications. “The universal use of components in application development means that when a single vulnerability in a single component is disclosed, that vulnerability now has the potential to impact thousands of applications – making many of them breachable with a single e

The Three Elements of Cyber Security

Image
What problem costs $1.6 million, takes 170 days to discover, and requires 45 days to fix? Give up? It’s the average cyber-attack on a business. Is cyber security too expensive? An effective cybersecurity initiative that costs at least a dollar less than $1.6 million is, by definition, cheaper than the alternative. End of discussion. What about the 170 days that a cyber-attack can go undetected? That’s 24 weeks! For comparison, the U.S. Bureau of Labor Statistics says that, as of September 2016, the median job search takes 10.3 weeks. That means you could lose your job, find a new one, lose that job, and find a new one all in the time it takes for the average organization to discover its network has been breached. I didn’t pick the duration of the median job search at random. Among small and medium-sized businesses (SMBs), 60% go out of business within six months of being victimized by a cyber-attack. So if you work at an SMB that is attacked, when you detect the intrusion 170 da

SDR Success Stories with ProntoForms

I’m really having an internal struggle when it comes to choosing a career path. I thought I was on the right track but I find myself in the same position I was in 7 months ago. That being said, I know my biggest strength is my ability to sell myself which in turn, sells the company. I say this hoping no one misinterprets my message because I will never work for a company that doesn’t have a product I truly believe in. I was browsing the web and found a company who shares stories from successful Sales Development Representatives with different companies. Here is more info (because they are hiring too!): ProntoForms Careers : ProntoForms is a publicly traded company specializing in mobile solutions. Based in Ottawa, Canada, and publicly traded, the organization produces a leading mobile form solution that's deployed by over 2,500 business customers.

Experian Data Breach Resolution And Ponemon Institute Find Organizations Are Not Ready For Global Security Risks And Regulations

Image
Only 9 percent of companies are prepared for the Global Data Protection Regulation (GDPR) half don't know where to begin. Contacts: Jeanine Takala Edelman 1 206 664 7805 Jeanine.Takala@edelman.com Mark Pepping Experian Data Breach Resolution 1 949 567 6505 Mark.Pepping@experianinteractive.com Learn more at www.experianplc.com or visit our global content hub at our global news blog for the latest news and insights from the Group. Experian and the Experian marks used herein are trademarks or registered trademarks of Experian Information Solutions, Inc. Other product and company names mentioned herein are the property of their respective owners. Experian. (PRNewsFoto/Experian) To view the original version on PR Newswire, visit: http://www.prnewswire.com/news-releases/experian-data-breach-resolution-and-ponemon-institute-find-organizations-are-not-ready-for-global-security-risks-and-regulations-300479869.html SOURCE Experian

FORBES: Why CIOs Might Be Thinking About GDPR Compliance All Wrong

Image
With the GDPR deadline less than one year away, many CIOs are frantically trying to get their data houses in order. But as IT leaders struggle to put together the many pieces of the GDPR puzzle, it's probable that too many are taking a defense-only approach to compliance. And it’s no wonder: One of the first things to go through my own mind as well with any new regulation is, “What is the shortest path to get the box checked?” Read more here at Forbes: Why CIOs Might Be Thinking About GDPR Compliance All Wrong

63% of SMBs increased security spending, but more than 50% still experienced breaches

Ransomware, phishing, and data breaches top IT security managers' list of concerns this year, according to a new report from Cyren and Osterman Research. 63% of SMB IT managers increased security spending in the past year, by an average of 27%. -Cyren and Osterman Research, 2017 IT managers are most concerned by threats of ransomware (62%), phishing (61%), and data breaches (54%) -Cyren and Osterman Research, 2017 68% of IT managers suffered one or more serious security breaches in the past, with 29% reporting a successful phishing attack, and 18% reporting a successful ransomware attack. -Cyren and Osterman Research, 2017 Read More Here on Tech Republic:  63% of SMBs increased security spending, but more than 50% still experienced breaches           

Logical Operations' CFR Certification Made the DoD Approved List

Image
Logical Operations' CFR Certification Made the DoD Approved List This may not be news to you but it is important to know in your pursuit to validate your skillsets, I recommend you get certified and get ahead with accredited organizations like Logical Operations. The important accreditation/standardization authorities are International Organization for Standardization ( ISO ), American National Standards Institute ( ANSI ), National Institute of Standards and Technology ( NIST ), and for sake of this post, DOD Directive 8570.01 .  Logical Operations has two flagship program, CyberSAFE (End-User Security Awareness) and CyberSec First Responder (Incident Response and Threat Analysis). YOU are the first line of defense your organization has against a cyber security attack. Don't leave it to chance, become CFR certified. By taking an approach where an understanding of the anatomy of an attack is developed, the CyberSec First Responder (CFR) cyber security certifica

From 1 Billion Compromised to 3 Billion? Yep, it's true. The Yahoo! Breach

Image
Your Yahoo account was definitely hacked-here's what happened and what to do A massive data breach at Yahoo in 2013 was far more extensive than previously disclosed, affecting every last user, all 3 billion of them. Parent company Verizon Communications Inc. disclosed this news earlier today, Tuesday, October 3, 2017, according to the Wall Street Journal . Here is Insight from Matt O'Brien, AP Contributor for WRAL :  Yahoo: 3 billion accounts breached in 2013. Yes, 3 billion   The breach now affects a number that represents nearly "half the world," said Sam Curry, chief security officer for Boston-based firm Cybereason, though there's likely to be more accounts than actual users. "Whether it's 1 billion or 3 billion is largely immaterial. Assume it affects you," Curry said. "Privacy is really the victim here." Yahoo first disclosed the breach in December . The stolen information included names, email addresses, phone number

Reuter's Exclusive: SEC forensics unit sought resources, cyber training ahead of 2016 hack

Reuter's Exclusive: SEC forensics unit sought resources, cyber training ahead of 2016 hack WASHINGTON (Reuters) - In August 2016, just two months before the U.S. Securities and Exchange Commission discovered its corporate filing system had been hacked, the SEC’s internal watchdog, Carl Hoecker, received a plea for help from his new forensics investigative unit. In a three-page memo that was shared with U.S. Congressional staff and seen by Reuters, the head of the forensics unit complained of “serious deficiencies” in equipment, inadequate cyber defense training, and a lack of communication with the SEC’s Office of Information Technology (OIT). The forensics unit’s staff were told to use equipment due for disposal when they asked for supplies and ended up repurposing computer hard drives instead. Their hardware budget for the fiscal 2017 year at $100,000 was about half a million dollars short of what was needed, the memo said. “Even though the (Digital Forensics and Investigations U