LaLisha Hurt – Deputy CISO, General Dynamics Information Technology

​ Passion for growing cyber talent, risk-based transformative decision making and alignment to business outcomes as well as customer mission are three traits successful Chief Information Security Officers (CISO) must possess.  LaLisha Hurt embodies these traits and over the course of her varied career, she has held progressive roles as a regulatory examiner, auditor, consultant,…

The post LaLisha Hurt – Deputy CISO, General Dynamics Information Technology appeared first on SecurityCurrent.

Continue reading LaLisha Hurt – Deputy CISO, General Dynamics Information Technology

Angel Redoble – PLDT Group, ePLDT Group & Smart Communications FVP & Group CISO

Chief Information Security Officers (CISO) are driven. Angel Redoble, the First Vice President and Group CISO for PLDT Group, ePLDT Group, and Smart Communications, epitomizes that attribute. In addition to his position at PLDT Group, the largest telecommunications company in the Philippines and the only Philippine company listed on the New York Stock Exchange, Redoble…

The post Angel Redoble – PLDT Group, ePLDT Group & Smart Communications FVP & Group CISO appeared first on SecurityCurrent.

Continue reading Angel Redoble – PLDT Group, ePLDT Group & Smart Communications FVP & Group CISO

National intelligence strategy seeks better insight into adversaries’ cyber capabilities

A national intelligence strategy released Tuesday calls on U.S. spy agencies to improve their understanding of what is driving foreign adversaries’ growing cyber capabilities. The strategy, published by the Office of the Director of National Intelligence, pledges that intelligence agencies will “increase our awareness and understanding of adversaries’ use of cyber operations—including leadership plans, intentions, capabilities, and operations— to inform decisions and enable action.” The stakes are high; America’s spies must keep pace with growing list of hacking capabilities at adversaries’ disposal, according to the ODNI. “As the cyber capabilities of our adversaries grow, they will pose increasing threats to U.S. security, including critical infrastructure, public health and safety, economic prosperity, and stability,” the document says. There has been no shortage of recent foreign hacking threats to U.S. public and private organizations, from suspected Iranian targeting of domain name systems to alleged Chinese economic espionage. The new strategy recognizes that the […]

The post National intelligence strategy seeks better insight into adversaries’ cyber capabilities appeared first on CyberScoop.

Continue reading National intelligence strategy seeks better insight into adversaries’ cyber capabilities

‘Highly active’ Hamas-linked hackers found spying on Palestinian political group

A “highly active” group of hackers, which some analysts believe may be linked to Hamas, are spying on Palestinian government employees, security services, university students and Fatah party politicians by infecting smartphones with malware, according to research conducted by mobile security firm Lookout. The espionage campaign is part of a broader effort by the hacker group, previously dubbed “Two-tailed Scorpion” by security researchers, to remotely collect information about Palestinians related in some way to the political process, including those individuals who may discuss, share or otherwise receive sensitive material on their mobile phones. Fatah and Hamas represent the two largest political parties of the State of Palestine, a contested territory that spans two separate areas, the West Bank and Gaza Strip — bordering on Israel, Jordan and Egypt. The two political organizations continuously clash with one another to control the state. Between 2006 and 2007, their rivalry led to an armed conflict […]

The post ‘Highly active’ Hamas-linked hackers found spying on Palestinian political group appeared first on Cyberscoop.

Continue reading ‘Highly active’ Hamas-linked hackers found spying on Palestinian political group