This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Consumers flocked to Amazon to indulge in Prime Day deals and start their holiday shopping early this year – specifically, home office gadgets and home connected devices like smart assistants, tablets, doorbells and more. And overall, retail sales continue to grow to near pre-pandemic levels with electronics a big part of it as consumers stock their home office and arm their kids with devices now needed for virtual school.
But are consumers thinking about their “home cybersecurity?”
What are the critical issues and trends in your sector this year, and how does your enterprise compare to your peers? These 17 Security 500 Sector Reports provide benchmarking data about budget changes, security leadership responsibilities, reporting structure and more.
Cybercriminals are taking notice of the seemingly endless vulnerabilities schools face. Take the explosive ransomware attack on the University of Utah from earlier this summer, or the malware attack on the Rialto school district in California, for example. Even with a rapidly increasing attack surface, schools aren’t exactly able to drain their already-limited funding on transforming their IT infrastructure in the midst of a global pandemic. However, it is possible for schools to reduce risk by understanding where they are most vulnerable, taking the time to educate teachers, parents and students, and adopting certain tools and strategies to prevent targeted attacks on remote learning networks.
The University of West Florida will lead a coalition of 10 institutions designated as National Centers of Academic Excellence in Cybersecurity in establishing a program to address the critical national shortage of qualified cybersecurity professionals in the U.S. The National Security Agency selected UWF to oversee the program, which will launch in the spring and be funded by a two-year, $6 million grant.
Last month, in this column, we advanced a discussion of the hermeneutics involved in the interpretations we make daily and of our growing propensity to commit Group Attribution Error.
A couple of months ago, I described in this column how security professionals could unify a divided country. I chose a mask as a symbol of that cohesiveness. But that thin piece of fabric worn around the mouth and nose can also be a gag — a barrier that distances leaders and stifles communication.
In past articles, I have written about behaviors and style characteristics that tend not to be valued by organizations and that have proven often to be the underpinnings of why some security leaders fail in their roles. The counterbalance to that are leadership attributes and behaviors that are essential for success.
It’s the season of ghouls, ghosts and outrageous costumes. But for CISOs and cybersecurity professionals, a bump in the night on Halloween is more likely to be a notification warning them of data breach than a spooky ghostly visitation. In the COVID-19 era, spookiness-as-a-service providers who rent out costumes or sell party products are likely to have a difficult time as lockdowns and home-working play havoc with businesses focused on in-person interaction. Yet for hackers, the dawn of a socially-distanced new normal has opened up vast numbers of attack vectors and given them new opportunities to target businesses or individuals. So what should you be worried about this Halloween? To help you work out the answer to that question, here are some of the scariest cybersecurity stories and trends of 2020:
Digital Shadows, throughout the years, has tracked SandWorm, and has now revisited the tactics, techniques and procedures (TTPs) behind the SandWorm APT.