New York Governor Andrew Cuomo announced Monday that the New York State Intelligence Center has relocated to the Center for Internet Security in East Greenbush, New York, putting the state’s primary cyber security protection agency under the same roof as a leading nonprofit organization dedicated to enhancing cyber security readiness and response around the globe, according to a Long Island press release.
The legal consequences of cyberattacks, such as class-action lawsuits on behalf of victim third-parties, are a growing worry of business owners, and businesses without cyber insurance are vulnerable to cybercrime and any consequential litigation, according to Solace Insurance.
Amid calls for stronger cyber security laws, the Department of Homeland Security is working on getting its threat-tracking system to work across its own operations and the Department of Defense. An October 24 memo from the Office of the Inspector General found that although the DHS can keep track of threats and provide updates on ongoing issues, “federal cyber operations center do not have a common incident management system tool that tracks, updates, shares, and coordinates cyber information with each other.”
Microsoft has expanded its $100,000 bounty program Monday, and will accept reports of in-the-wild attacks that demonstrate new techniques of bypassing Windows’ anti-exploit technologies, Computerworld reports.
Judging by today’s headlines, it is only a matter of time until every company – yours included – is going to experience a computer intrusion, or perhaps another computer intrusion. When that happens, you may find yourself working with law enforcement. Sometimes, they will be the ones calling you.
Ever since the days of Jesse James, banks have always been a target of those after fast cash, but now, cybercrime is becoming the new Wild West of quiet, quick theft. Find out what the enterprise can do to mitigate cyber risks to its financial assets.
“Being satisfied with a program now does not mean you will be satisfied with it tomorrow. The threats, attacks, types of attackers are always changing.”
November 5, 2013
“Leadership isabout making the team better than the sum of its parts. Leaders look for people who will bring out the best from others and make the whole team better. Great leaders are force multipliers,” shares Stephen Scharf, the leader at Experian entrusted with protecting the business’ brand and customer information from ever changing and expanding threats.
The holiday shopping season is fast approaching, and it’s prime time for cyber attackers who hope to catch enterprises at their weakest moments.
According to a new survey of 1,100 retail companies conducted by the Ponemon Institute and sponsored by RSA, daily revenue surges by an average of 55 percent during the holiday season. However, if a retail site is hacked or disabled, average losses could amount to as much as $500,000 per hour, or $8,000 per minute, according to a Dark Reading report.
Close to 1.5 percent of the Internet’s top websites track users without their knowledge or consent, even when visitors enable their browser’s Do Not Track options, according to a research team in Europe.
This month, Security magazine highlights John McClurg, Senior VP and CISO at Blackberry, and the evolving role of the CISO. Also, we highlight Tim McCreight, Acting CSO for the city of Calgary, Alberta, and discuss if civilians can truly Stop the Bleed and how to calculate ROI for better security. Industry leaders discuss public references and their impact on security careers, information security frameworks and convergence trends in 2020.