How Biden’s EO Impacts Cybersecurity Players

On May 12, the Biden Administration released an executive order aimed at government agencies, vendors and developers, who all will have to design their products with a greater focus on security. The EO on “Improving the Nation’s Cybersecurity” comes i… Continue reading How Biden’s EO Impacts Cybersecurity Players

Colonial’s Ransom Payment Indicates Severity of Threats

Last week Joseph Blount, the CEO of Colonial Pipeline, told The Wall Street Journal that he authorized the ransom payment of $4.4. million to the hackers who broke into computer systems and caused major disruption to the East Coast’s gas supply. In th… Continue reading Colonial’s Ransom Payment Indicates Severity of Threats

FBI Logs Rapid Increase in Email Scams, Investment Fraud

The FBI reported complaints concerning online scams and investment fraud have now reached a record-breaking level. The FBI’s Internet Crime Complaint Center (IC3) received its six millionth complaint on May 15, 2021. It took nearly seven years for the… Continue reading FBI Logs Rapid Increase in Email Scams, Investment Fraud

Chatbots, Maintenance and Monitoring: Security Automation

Last week the Identity Theft Resource Center (ITRC) unveiled its virtual victim assistant, ViViAN, to serve identity crime victims after-hours and on weekends. Developed in partnership with the SAS Institute, an anti-fraud software and services compan… Continue reading Chatbots, Maintenance and Monitoring: Security Automation

Pipeline Ransomware Shows Dangers of Unsecured Infrastructure

The ransomware attack against the Colonial Pipeline is the latest incident targeting critical infrastructure in the United States with severe potential in terms of business continuity and energy disruption. The May 7 attack happened on Friday, a busy … Continue reading Pipeline Ransomware Shows Dangers of Unsecured Infrastructure

The Evolution of Ransomware Attacks

As ransomware behaviors change from mass attacks to highly targeted incidents and from file-based to fileless and in-memory attacks, IT leaders also need to adapt to these changing behaviors. A recent Sophos survey, The State of Ransomware in 2021, re… Continue reading The Evolution of Ransomware Attacks

Neurodiversity in IT Security

Neurodiversity, the term for the range of differences in individual brain function and behavioral traits, with regard to sociability, learning, attention, mood and other mental functions in a non-pathological sense, is important to foster in any indus… Continue reading Neurodiversity in IT Security

LinkedIn Attacks Show Dangers of Professional Networking

Leveraging the human factor via social media to launch cyberattacks is a tried-and-true method, and one that will be with us for many more years to come. The recent LinkedIn attacks, where malicious actors used fake profiles linked to hostile states t… Continue reading LinkedIn Attacks Show Dangers of Professional Networking

Use of Defensive AI Against Cyberattacks Grows

Security leaders are increasingly turning to AI and ML-based defenses against cyberattacks as pessimism grows over the efficacy of human-based cybersecurity defense efforts. A recent survey from MIT Technology Review Insights, sponsored by Darktrace, … Continue reading Use of Defensive AI Against Cyberattacks Grows